Patents by Inventor Jonathan Roshan Tuliani

Jonathan Roshan Tuliani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10666602
    Abstract: In one example, an edge server including a processor, memory, and a domain name system (DNS) edge application stored in the memory and executed by the processor is provided. The DNS edge application is configured to: receive a first DNS query requesting a first DNS record; forward the first DNS query to an origin server; receive a response to the first DNS query from the origin server; store the response on the edge server; receive a second DNS query requesting a second DNS record; determine that the second DNS record is not stored on the edge server; and generate a new response to the second DNS query based on the stored response. The first DNS query and the second DNS query may be the same DNS query, and the second DNS query is not forwarded to the origin server.
    Type: Grant
    Filed: May 5, 2017
    Date of Patent: May 26, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Jonathan Roshan Tuliani
  • Patent number: 10182127
    Abstract: Techniques are provided for the caching of content prior to the content being requested. A request for desired content may be received from a client application at a caching server. The request may also indicate additional content related to the desired content that may be subsequently requested by the client application. The indicated additional content (and the desired content, if not already cached) is retrieved from an origin server. The desired content is transmitted to the client application at the user device, and the additional content is cached at the caching server. Subsequently, a second request may be received from the client application that includes a request for the additional content. The additional content, which is now cached at the caching server, is served to the client application by the caching server in response to the second request (rather than being retrieved from the origin server).
    Type: Grant
    Filed: February 22, 2016
    Date of Patent: January 15, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jonathan Roshan Tuliani, Nicholas Leonard Holt, Cheng Huang
  • Publication number: 20180324137
    Abstract: In one example, an edge server including a processor, memory, and a domain name system (DNS) edge application stored in the memory and executed by the processor is provided. The DNS edge application is configured to: receive a first DNS query requesting a first DNS record; forward the first DNS query to an origin server; receive a response to the first DNS query from the origin server; store the response on the edge server; receive a second DNS query requesting a second DNS record; determine that the second DNS record is not stored on the edge server; and generate a new response to the second DNS query based on the stored response. The first DNS query and the second DNS query may be the same DNS query, and the second DNS query is not forwarded to the origin server.
    Type: Application
    Filed: May 5, 2017
    Publication date: November 8, 2018
    Inventor: Jonathan Roshan TULIANI
  • Patent number: 9544266
    Abstract: A method includes receiving, at a server, a request from a DNS client. The request identifies a domain name to be resolved that is not able to be resolved by the server. The method includes identifying a hash of the domain name as being part of a set of hashes. The hash of the domain name identified at the server was computed using a first cryptographic technique. However, the hash can be computed by an external system using a second cryptographic technique. The first cryptographic technique is able to compute the hash in substantially fewer or substantially less complex operations than the operations required to compute the hash using the second cryptographic technique. The method further includes returning a result indicating that the domain name cannot be resolved, including returning an indicator identifying the set of hashes.
    Type: Grant
    Filed: June 27, 2014
    Date of Patent: January 10, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Jonathan Roshan Tuliani
  • Publication number: 20160173639
    Abstract: Techniques are provided for the caching of content prior to the content being requested. A request for desired content may be received from a client application at a caching server. The request may also indicate additional content related to the desired content that may be subsequently requested by the client application. The indicated additional content (and the desired content, if not already cached) is retrieved from an origin server. The desired content is transmitted to the client application at the user device, and the additional content is cached at the caching server. Subsequently, a second request may be received from the client application that includes a request for the additional content. The additional content, which is now cached at the caching server, is served to the client application by the caching server in response to the second request (rather than being retrieved from the origin server).
    Type: Application
    Filed: February 22, 2016
    Publication date: June 16, 2016
    Inventors: Jonathan Roshan Tuliani, Nicholas Leonard Holt, Cheng Huang
  • Patent number: 9294582
    Abstract: Techniques are provided for the caching of content prior to the content being requested. A request for desired content may be received from a client application at a caching server. The request may also indicate additional content related to the desired content that may be subsequently requested by the client application. The indicated additional content (and the desired content, if not already cached) is retrieved from an origin server. The desired content is transmitted to the client application at the user device, and the additional content is cached at the caching server. Subsequently, a second request may be received from the client application that includes a request for the additional content. The additional content, which is now cached at the caching server, is served to the client application by the caching server in response to the second request (rather than being retrieved from the origin server).
    Type: Grant
    Filed: December 16, 2011
    Date of Patent: March 22, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jonathan Roshan Tuliani, Nicholas Leonard Holt, Cheng Huang
  • Publication number: 20160028847
    Abstract: Embodiments are directed to establishing caches that provide authoritative domain name system (DNS) answers to DNS requests. In one scenario, a computer system establishes a cache that stores authoritative DNS answers to DNS queries. The cache corresponds to a specified DNS zone that includes authoritative DNS answers for a subset of DNS queries. The cache is configured to store the authoritative DNS answers for at least a specified period of time during which the authoritative DNS answers are updatable. The cache then receives an update indicating that at least one cached DNS answer is out-of-date and the computer system purges the out-of-date DNS answer from the cache, ensuring that the cache continually provides authoritative DNS answers for DNS queries assigned to the specified DNS zone.
    Type: Application
    Filed: July 23, 2014
    Publication date: January 28, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Gareth R. Bradshaw, Ashley Ryan Flavel, Kumar Ashutosh, Jonathan Roshan Tuliani, Pradeepkumar Mani, Tushar Gupta, Vithalprasad Jayendra Gaitonde, V R Kishore Chintalapati, Benjamin J. Black, William J. Griffin, David A. Maltz, Levon Hayrapetyan, Kresimir Bozic, Rajesh Kumar Maskara, Sourav Sain, Andrew Lientz
  • Publication number: 20150381558
    Abstract: A method includes receiving, at a server, a request from a DNS client. The request identifies a domain name to be resolved that is not able to be resolved by the server. The method includes identifying a hash of the domain name as being part of a set of hashes. The hash of the domain name identified at the server was computed using a first cryptographic technique. However, the hash can be computed by an external system using a second cryptographic technique. The first cryptographic technique is able to compute the hash in substantially fewer or substantially less complex operations than the operations required to compute the hash using the second cryptographic technique. The method further includes returning a result indicating that the domain name cannot be resolved, including returning an indicator identifying the set of hashes.
    Type: Application
    Filed: June 27, 2014
    Publication date: December 31, 2015
    Inventor: Jonathan Roshan Tuliani
  • Patent number: 8635457
    Abstract: This invention generally relates methods, computer program code, data processing apparatus, and signals for certifying data, in particular by means of an electronic signature. Embodiments of the invention can be implemented on a user terminal without the need for dedicated hardware or software and may be termed “zero-footprint” data certification methods. A method of providing an electronic signature to-a-server; the method including receiving data for said server at a proxy system for said server; reading said received data to identify a signature request; obtaining a signature for a portion of said received data associated with said request responsive to said request, and providing said signature from said proxy system to said server. The use of a signature-enabled reverse proxy enables the use of a zero footprint user terminal, that is without the need to add additional functionality to the terminal for the purposes of signature creation in the context of a distributed application architecture.
    Type: Grant
    Filed: August 16, 2005
    Date of Patent: January 21, 2014
    Assignee: Cryptomathic Ltd.
    Inventors: Jonathan Roshan Tuliani, Michael Bursell
  • Patent number: 8549308
    Abstract: A data certification system and method for signing electronic data with a digital signature in which a central server comprises a signature server and an authentication server. The signature server securely stores the private cryptographic keys of a number of users. The user contacts the central server using a workstation through the secure tunnel which is set up for the purpose. The user supplies a password or other token based on information previously supplied to the user by the authentication server through a separate authentication channel. The authentication server provides the signature server with a derived version of the same information through a permanent secure tunnel between the servers, which is compared with the one supplied by the user. If they match, data received from the user is signed with the user's private key.
    Type: Grant
    Filed: November 16, 2011
    Date of Patent: October 1, 2013
    Assignee: Cryptomathic Ltd.
    Inventors: Peter Landrock, Jonathan Roshan Tuliani
  • Publication number: 20130159383
    Abstract: Techniques are provided for the caching of content prior to the content being requested. A request for desired content may be received from a client application at a caching server. The request may also indicate additional content related to the desired content that may be subsequently requested by the client application. The indicated additional content (and the desired content, if not already cached) is retrieved from an origin server. The desired content is transmitted to the client application at the user device, and the additional content is cached at the caching server. Subsequently, a second request may be received from the client application that includes a request for the additional content. The additional content, which is now cached at the caching server, is served to the client application by the caching server in response to the second request (rather than being retrieved from the origin server).
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Jonathan Roshan Tuliani, Nicholas Leonard Holt, Cheng Huang
  • Patent number: 8358778
    Abstract: This invention is generally concerned with methods, apparatus and computer program code for a computationally asymmetric hash function, in particular for use with symmetric cryptographic algorithms. We describe a method of determining a computationally asymmetric hash function value, the method including: receiving input data to be hashed; computing an asymmetric value from said input data, said asymmetric value being computable by two methods, a first method employing at least one first parameter and a second method employing at least one second parameter, computation of said asymmetric value by said second method being faster than by said first method; and determining a computationally asymmetric hash function value using said asymmetric value. We also describe methods of providing a computationally asymmetric electronic signature from a symmetric cryptographic signature.
    Type: Grant
    Filed: February 4, 2005
    Date of Patent: January 22, 2013
    Assignee: Cryptomathic Ltd.
    Inventors: Peter Landrock, Jonathan Roshan Tuliani
  • Publication number: 20120311321
    Abstract: A data certification system and method for signing electronic data with a digital signature in which a central server comprises a signature server and an authentication server. The signature server securely stores the private cryptographic keys of a number of users. The user contacts the central server using a workstation through the secure tunnel which is set up for the purpose. The user supplies a password or other token based on information previously supplied to the user by the authentication server through a separate authentication channel. The authentication server provides the signature server with a derived version of the same information through a permanent secure tunnel between the servers, which is compared with the one supplied by the user. If they match, data received from the user is signed with the user's private key.
    Type: Application
    Filed: November 16, 2011
    Publication date: December 6, 2012
    Applicant: Cryptomathic A/S
    Inventors: Peter Landrock, Jonathan Roshan Tuliani
  • Patent number: 7882553
    Abstract: An apparatus for generating intermediate cryptogram data corresponding to a dynamic password for a first cryptographic scheme, the intermediate cryptogram data being suitable for display using a device designed for a second, different cryptographic scheme, the apparatus including: a communications interface for communicating with a said device; and a processor coupled to a memory, the memory storing processor control code to control the processor, when running, to: generate a dynamic password according to the first cryptographic scheme; and generate intermediate cryptogram data corresponding to said dynamic password, the intermediate cryptogram data being suitable for outputting to the said device so that, when the said device processes said intermediate cryptogram data according to the second cryptographic scheme, the said device generates data suitable for displaying said dynamic password.
    Type: Grant
    Filed: March 6, 2007
    Date of Patent: February 1, 2011
    Assignee: Cryptomathic A/S
    Inventor: Jonathan Roshan Tuliani
  • Patent number: 7725723
    Abstract: An apparatus and method for signing electronic data with a digital signature in which a central server comprises a signature server (110) and an authentication server (120). The signature server (110) securely stores the private cryptographic keys of a number of users (102). The user (102) contacts the central server using a workstation (101) through a secure channel which is setup for the purpose. The user (102) supplies a password or other token (190), based on information previously supplied to the user by the authentication server (120) through a separate authentication channel. The authentication server provides the signature server with a derived version of the same information through a permanent secure channel between the servers, which is compared with the one supplied by the user (102). If they match, data received from the user (102) is signed with the user's private key.
    Type: Grant
    Filed: August 12, 2002
    Date of Patent: May 25, 2010
    Inventors: Peter Landrock, Jonathan Roshan Tuliani
  • Publication number: 20080285746
    Abstract: This invention is generally concerned with methods, apparatus and computer program code for a computationally asymmetric hash function, in particular for use with symmetric cryptographic algorithms. We describe a method of determining a computationally asymmetric hash function value, the method including: receiving input data to be hashed; computing an asymmetric value from said input data, said asymmetric value being computable by two methods, a first method employing at least one first parameter and a second method employing at least one second parameter, computation of said asymmetric value by said second method being faster than by said first method; and determining a computationally asymmetric hash function value using said asymmetric value. We also describe methods of providing a computationally asymmetric electronic signature from a symmetric cryptographic signature.
    Type: Application
    Filed: February 4, 2005
    Publication date: November 20, 2008
    Inventors: Peter Landrock, Jonathan Roshan Tuliani
  • Publication number: 20080201577
    Abstract: An apparatus for generating intermediate cryptogram data corresponding to a dynamic password for a first cryptographic scheme, the intermediate cryptogram data being suitable for display using a device designed for a second, different cryptographic scheme, the apparatus including: a communications interface for communicating with a said device; and a processor coupled to a memory, the memory storing processor control code to control the processor, when running, to: generate a dynamic password according to the first cryptographic scheme; and generate intermediate cryptogram data corresponding to said dynamic password, the intermediate cryptogram data being suitable for outputting to the said device so that, when the said device processes said intermediate cryptogram data according to the second cryptographic scheme, the said device generates data suitable for displaying said dynamic password.
    Type: Application
    Filed: March 6, 2007
    Publication date: August 21, 2008
    Inventor: Jonathan Roshan Tuliani