Patents by Inventor Sai Vinayak
Sai Vinayak has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11887589Abstract: Techniques for voice-based interactions are described. In an example, a device presents a user interface on a display. The device starts an operational mode of the device. The operational mode restricts voice-based interactions with the user interface to a set of commands. The set of commands is defined in a language model that is stored on the device. Further, the device receives, at a microphone of the device, audio data corresponding to a natural language utterance and generates, from the audio data, text data that corresponds to the natural language utterance. The device determines, based at least in part on the language model, that semantics of the text data correspond to a command from the set of commands and presents, on the display, an outcome of performing the command.Type: GrantFiled: June 17, 2020Date of Patent: January 30, 2024Assignee: Amazon Technologies, Inc.Inventors: Senthil Kumar Dayalan, Manikandan Thangarathnam, Sai Vinayak, Suraj Gopalakrishnan
-
Patent number: 9811682Abstract: Techniques for providing security policy for device data are described. In implementations, data on a device is stored in an encrypted form. To protect the encrypted data from being decrypted by an unauthorized entity, techniques enable a decryption key to be occluded if an attempt to gain unauthorized access to device data is detected. In implementations, a decryption key can be occluded in a variety of ways, such as by deleting the decryption key, overwriting the encryption key in memory, encrypting the encryption key, and so on. Embodiments enable an occluded decryption key to be recovered via a recovery experience. For example, a recovery experience can include an authentication procedure that requests a recovery password. If a correct recovery password is provided, the occluded decryption key can be provided.Type: GrantFiled: January 25, 2016Date of Patent: November 7, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Dustin Michael Ingalls, Nathan J. Ide, Christopher R. Macaulay, Octavian T. Ureche, Michael J. Grass, Sai Vinayak, Preston Derek Adam
-
Patent number: 9703684Abstract: Embodiments of methods, systems and storage media associated with a unified UI element query interface (“UEI”) configured to facilitate provisioning of UI element information are described. A view server may be configured to respond to queries made using the UEI to provide indications of UI elements that are being rendered by one or more rendering engines. The view server may also be configured to respond to queries about specific UI elements to provide properties for the UI elements. The UEI may provide a single point of interaction for an application that wishes to interact with UI elements rendered by different rendering engines. Other embodiments may be described and/or claimed.Type: GrantFiled: October 1, 2013Date of Patent: July 11, 2017Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Ezekiel Wade Sanborn de Asis, Prasanna Venkatanarayanan, Sai Vinayak
-
Patent number: 9507964Abstract: Described herein are techniques for regulating access to a remote resource using two-factor authentication based on information regarding a host machine of a portable storage drive that stores an operating system that is booted by the host machine. The information regarding the host machine of a portable storage drive may be used as a second factor in a two-factor authentication. Such information regarding the host machine may include, in some embodiments, information retrieved from a secure storage of the host machine, such as from a cryptoprocessor of the host machine. The information may include an identifier for the host machine or may be a user credential pre-provisioned to the host machine to be used in two-factor authentication.Type: GrantFiled: December 15, 2011Date of Patent: November 29, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Preston Derek Adam, Sai Vinayak, Octavian T. Ureche, Stefan Thom, Himanshu Soni, Nicolae Voicu
-
Publication number: 20160154973Abstract: Techniques for providing security policy for device data are described. In implementations, data on a device is stored in an encrypted form. To protect the encrypted data from being decrypted by an unauthorized entity, techniques enable a decryption key to be occluded if an attempt to gain unauthorized access to device data is detected. In implementations, a decryption key can be occluded in a variety of ways, such as by deleting the decryption key, overwriting the encryption key in memory, encrypting the encryption key, and so on. Embodiments enable an occluded decryption key to be recovered via a recovery experience. For example, a recovery experience can include an authentication procedure that requests a recovery password. If a correct recovery password is provided, the occluded decryption key can be provided.Type: ApplicationFiled: January 25, 2016Publication date: June 2, 2016Inventors: Dustin Michael Ingalls, Nathan J. Ide, Christopher R. Macaulay, Octavian T. Ureche, Michael J. Grass, Sai Vinayak, Preston Derek Adam
-
Patent number: 9280452Abstract: This disclosure relates to systems and methods for generating test cases. In one embodiment, a method is provided that may include identifying, by a computer including one or more processors, a first test event associated with a first user interaction with a first test device. The first user interaction may include interaction with a first display displaying a plurality of applications on the first test device. The method may also include determining, by the computer, at least one first view in which the first test event occurs. Furthermore, the method may include determining, based at least in part on the first test event, a first state of the first test device. Additionally, the method may include storing information about the first test event, the at least one first view, and the first state of the first test device in a first test case.Type: GrantFiled: June 26, 2013Date of Patent: March 8, 2016Assignee: Amazon Technologies, Inc.Inventors: Prasad Ramani Mahadevan, Venkatesh Kancharla, Sai Vinayak, Deepa Subramanian Iyer
-
Patent number: 9245143Abstract: Techniques for providing security policy for device data are described. In implementations, data on a device is stored in an encrypted form. To protect the encrypted data from being decrypted by an unauthorized entity, techniques enable a decryption key to be occluded if an attempt to gain unauthorized access to device data is detected. In implementations, a decryption key can be occluded in a variety of ways, such as by deleting the decryption key, overwriting the encryption key in memory, encrypting the encryption key, and so on. Embodiments enable an occluded decryption key to be recovered via a recovery experience. For example, a recovery experience can include an authentication procedure that requests a recovery password. If a correct recovery password is provided, the occluded decryption key can be provided.Type: GrantFiled: February 9, 2012Date of Patent: January 26, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Dustin Michael Ingalls, Nathan J. Ide, Christopher R. Macaulay, Octavian T. Ureche, Michael J. Grass, Sai Vinayak, Preston Derek Adam
-
Patent number: 9183415Abstract: Described herein are techniques for regulating access to a portable storage drive, that stores an operating system securely, using information regarding a host machine. In accordance with some of the techniques described herein, when a portable storage drive that stores an operating system securely is to be accessed by a host machine, information regarding the host machine, such as information regarding the hardware of the host machine, may be retrieved and evaluated to determine whether to grant access to the host machine. When the host machine is granted access, the host machine may access secured data stored on the portable storage drive in any suitable manner. In some cases, accessing the secured data may include decrypting the secured data and transferring decrypted data to another storage of the host machine. The decrypted information may include an operating system that is booted by the host machine.Type: GrantFiled: December 1, 2011Date of Patent: November 10, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Preston Derek Adam, Sai Vinayak, Octavian T. Ureche, Stefan Thom, Himanshu Soni, Nicolae Voicu
-
Patent number: 8914874Abstract: A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security characteristic of the communication channel. The security claims are stored, as is a digital signature generated over the set of security claims by an entity. The security claims and digital signature are subsequently accessed when a computing device is to transfer data to and/or from the communication channel. The set of security claims is compared to a security policy of the computing device, and the entity that digitally signed the set of security claims is identified. One or more security precautions that the computing device is to use in transferring data to and/or from the communication channel are determined based at least in part on the comparing and the entity that has digitally signed the set of security claims.Type: GrantFiled: July 21, 2009Date of Patent: December 16, 2014Assignee: Microsoft CorporationInventors: Octavian T. Ureche, Alex M. Semenko, Sai Vinayak, Carl M. Ellison
-
Patent number: 8838981Abstract: A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication channel is used, and a digital signature over the channel identifier and use policy. The identifier of the communication channel and the use policy can be verified by a computing device, and a check made as to whether a current security policy of the computing device is satisfied by the use policy. An access that the computing device is allowed to have to the communication channel is determined based at least in part on both whether the current security policy is satisfied by the use policy and whether the identifier of the communication channel and the use policy are verified.Type: GrantFiled: September 13, 2012Date of Patent: September 16, 2014Assignee: Microsoft CorporationInventors: Octavian T. Ureche, Alex M. Semenko, Sai Vinayak, Carl M. Ellison
-
Publication number: 20130212367Abstract: Techniques for providing security policy for device data are described. In implementations, data on a device is stored in an encrypted form. To protect the encrypted data from being decrypted by an unauthorized entity, techniques enable a decryption key to be occluded if an attempt to gain unauthorized access to device data is detected. In implementations, a decryption key can be occluded in a variety of ways, such as by deleting the decryption key, overwriting the encryption key in memory, encrypting the encryption key, and so on. Embodiments enable an occluded decryption key to be recovered via a recovery experience. For example, a recovery experience can include an authentication procedure that requests a recovery password. If a correct recovery password is provided, the occluded decryption key can be provided.Type: ApplicationFiled: February 9, 2012Publication date: August 15, 2013Inventors: Dustin Michael Ingalls, Nathan J. Ide, Christopher R. Macaulay, Octavian T. Ureche, Michael J. Grass, Sai Vinayak, Preston Derek Adam
-
Publication number: 20130145440Abstract: Described herein are techniques for regulating access to a remote resource using two-factor authentication based on information regarding a host machine of a portable storage drive that stores an operating system that is booted by the host machine. The information regarding the host machine of a portable storage drive may be used as a second factor in a two-factor authentication. Such information regarding the host machine may include, in some embodiments, information retrieved from a secure storage of the host machine, such as from a cryptoprocessor of the host machine. The information may include an identifier for the host machine or may be a user credential pre-provisioned to the host machine to be used in two-factor authentication.Type: ApplicationFiled: December 15, 2011Publication date: June 6, 2013Applicant: MICROSOFT CORPORATIONInventors: Preston Derek Adam, Sai Vinayak, Octavian T. Ureche, Stefan Thom, Himanshu Soni, Nicolae Voicu
-
Publication number: 20130145139Abstract: Described herein are techniques for regulating access to a portable storage drive, that stores an operating system securely, using information regarding a host machine. In accordance with some of the techniques described herein, when a portable storage drive that stores an operating system securely is to be accessed by a host machine, information regarding the host machine, such as information regarding the hardware of the host machine, may be retrieved and evaluated to determine whether to grant access to the host machine. When the host machine is granted access, the host machine may access secured data stored on the portable storage drive in any suitable manner. In some cases, accessing the secured data may include decrypting the secured data and transferring decrypted data to another storage of the host machine. The decrypted information may include an operating system that is booted by the host machine.Type: ApplicationFiled: December 1, 2011Publication date: June 6, 2013Applicant: MICROSOFT CORPORATIONInventors: Preston Derek Adam, Sai Vinayak, Octavian T. Ureche, Stefan Thom, Himanshu Soni, Nicolae Voicu
-
Patent number: 8387109Abstract: In accordance with one or more aspects, a current security policy for accessing a device or volume of a computing device is identified. A secondary access control state for the device or volume is also identified. An access state for the device is determined based on both the current security policy and the secondary access control state.Type: GrantFiled: October 23, 2008Date of Patent: February 26, 2013Assignee: Microsoft CorporationInventors: Octavian T. Ureche, Alex M. Semenko, Ping Xie, Sai Vinayak
-
Publication number: 20130007463Abstract: A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication channel is used, and a digital signature over the channel identifier and use policy. The identifier of the communication channel and the use policy can be verified by a computing device, and a check made as to whether a current security policy of the computing device is satisfied by the use policy. An access that the computing device is allowed to have to the communication channel is determined based at least in part on both whether the current security policy is satisfied by the use policy and whether the identifier of the communication channel and the use policy are verified.Type: ApplicationFiled: September 13, 2012Publication date: January 3, 2013Applicant: Microsoft CorporationInventors: Octavian T. Ureche, Alex M. Semenko, Sai Vinayak, Carl M. Ellison
-
Patent number: 8296564Abstract: A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication channel is used, and a digital signature over the channel identifier and use policy. The identifier of the communication channel and the use policy can be verified by a computing device, and a check made as to whether a current security policy of the computing device is satisfied by the use policy. An access that the computing device is allowed to have to the communication channel is determined based at least in part on both whether the current security policy is satisfied by the use policy and whether the identifier of the communication channel and the use policy are verified.Type: GrantFiled: February 17, 2009Date of Patent: October 23, 2012Assignee: Microsoft CorporationInventors: Octavian T. Ureche, Alex M. Semenko, Sai Vinayak, Carl M. Ellison
-
Publication number: 20110019820Abstract: A set of security claims for a communication channel are obtained, the set of security claims including one or more security claims each identifying a security characteristic of the communication channel. The security claims are stored, as is a digital signature generated over the set of security claims by an entity. The security claims and digital signature are subsequently accessed when a computing device is to transfer data to and/or from the communication channel. The set of security claims is compared to a security policy of the computing device, and the entity that digitally signed the set of security claims is identified. One or more security precautions that the computing device is to use in transferring data to and/or from the communication channel are determined based at least in part on the comparing and the entity that has digitally signed the set of security claims.Type: ApplicationFiled: July 21, 2009Publication date: January 27, 2011Applicant: MICROSOFT CORPORATIONInventors: Octavian T. Ureche, Alex M. Semenko, Sai Vinayak, Carl M. Ellison
-
Publication number: 20100211792Abstract: A communication channel has an associated channel authenticator that includes a channel identifier, a use policy identifying how an owner of the communication channel indicates the communication channel is used, and a digital signature over the channel identifier and use policy. The identifier of the communication channel and the use policy can be verified by a computing device, and a check made as to whether a current security policy of the computing device is satisfied by the use policy. An access that the computing device is allowed to have to the communication channel is determined based at least in part on both whether the current security policy is satisfied by the use policy and whether the identifier of the communication channel and the use policy are verified.Type: ApplicationFiled: February 17, 2009Publication date: August 19, 2010Applicant: MICROSOFT CORPORATIONInventors: Octavian T. Ureche, Alex M. Semenko, Sai Vinayak, Carl M. Ellison
-
Publication number: 20100107213Abstract: In accordance with one or more aspects, a current security policy for accessing a device or volume of a computing device is identified. A secondary access control state for the device or volume is also identified. An access state for the device is determined based on both the current security policy and the secondary access control state.Type: ApplicationFiled: October 23, 2008Publication date: April 29, 2010Applicant: Microsoft CorporationInventors: Octavian T. Ureche, Alex M. Semenko, Ping Xie, Sai Vinayak