Patents by Inventor Santosh BALASUBRAMANIAN

Santosh BALASUBRAMANIAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11960564
    Abstract: Data processing systems and methods, according to various embodiments, are adapted for determining a categorization for each tracking tool that executes on a particular webpage based on a variety of criteria, such as the purpose of the tracking tool and its source script. The system may compare the characteristics of tracking tools on a webpage to a database of known tracking tools to determine the appropriate categorization. When a user visits the webpage, the system analyzes these categories and determines whether the tracking tool should be permitted to run based on the categories and/or other criteria, such as whether the user has consented to the use of that type of tracking tool.
    Type: Grant
    Filed: February 2, 2023
    Date of Patent: April 16, 2024
    Assignee: OneTrust, LLC
    Inventors: Patrick Whitney, Kevin Jones, Brian Kelly, Subramanian Viswanathan, Casey Hill, Jeffrey Baucom, Madhusudhan Kunhambu, Mithun Babu, Rajneesh Kesavan, Santosh Kumar Koti, Sathish Gopalakrishnan, Anand Balasubramanian, Mohamed Kabad, Jayamohan Puthenveetil, Jonathan Blake Brannon
  • Patent number: 11822675
    Abstract: Providing a method and a corresponding system for encrypting customer workload data through a trusted entity such as a self-boot engine (SBE). More specifically, there is a method and a corresponding system for securely extracting out customer centric data in a manner that requires the customer payloads and/or workloads to register with the SBE and share the encryption key.
    Type: Grant
    Filed: June 24, 2021
    Date of Patent: November 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Raja Das, Sachin Gupta, Santosh Balasubramanian, Sandeep Korrapati
  • Patent number: 11743058
    Abstract: Authenticating a host computer and NVDIMM pair using lookup tables for a challenge/response exchange between the pair of devices. The NVDIMM is challenged by the host computer for which a response associated with the physically unclonable function of a NVDIMM component is provided. The NVDIMM challenges the host computer for which a response associated with the physically unclonable function of a host computer component is provided. Additional security stores a modified response associated with run-time physically unclonable functions associated with the host computer and NVDIMM pair for use in future challenge/response exchanges.
    Type: Grant
    Filed: March 5, 2020
    Date of Patent: August 29, 2023
    Assignee: International Business Machines Corporation
    Inventors: Janani Swaminathan, Trinadhachari Kosuru, Anand Haridass, Santosh Balasubramanian
  • Patent number: 11556646
    Abstract: A method for managing memory within a computing system. The method includes one or more computer processors identifying a range of physical memory addresses that store a first data. The method further includes determining whether a second data is stored within the range of physical memory addresses that stores the first data. The method further includes responding to determining that the second data is stored within the range of physical memory addresses that store the first data, by determining whether a process accessing the second data is identified as associated with a side-channel attack. The method further includes responding to determining that the process accessing the second data is associated with the side-channel attack, by initiating a response associated with the process accessing the second data.
    Type: Grant
    Filed: May 31, 2019
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Srinivas Bangalore Purushotham, Santosh Balasubramanian
  • Publication number: 20220414233
    Abstract: Providing a method and a corresponding system for encrypting customer workload data through a trusted entity such as a self-boot engine (SBE). More specifically, there is a method and a corresponding system for securely extracting out customer centric data in a manner that requires the customer payloads and/or workloads to register with the SBE and share the encryption key.
    Type: Application
    Filed: June 24, 2021
    Publication date: December 29, 2022
    Inventors: Raja Das, Sachin Gupta, Santosh Balasubramanian, Sandeep Korrapati
  • Patent number: 11194913
    Abstract: Embodiments provide a mutable CRTM schema for ensuring the integrity of a client workload on a single system as updates are made to the firmware used to initialize and run that system by booting a computing system in a secure mode; when successfully validating a boot image for the computing system via a secure verification code that is blocked from write access when the system is booted in a unsecure mode, allowing write access to the secure verification code; and continuing to boot the computing system in the secure mode according to the boot image. When booting the system and unseccessfully validating the boot image at the third time, the system boot is failed.
    Type: Grant
    Filed: March 12, 2019
    Date of Patent: December 7, 2021
    Assignee: International Business Machines Corporation
    Inventors: Sachin Gupta, Sandeep Korrapati, Santosh Balasubramanian, Raja Das, Shakeeb Pasha B.K.
  • Publication number: 20210281431
    Abstract: Authenticating a host computer and NVDIMM pair using lookup tables for a challenge/response exchange between the pair of devices. The NVDIMM is challenged by the host computer for which a response associated with the physically unclonable function of a NVDIMM component is provided. The NVDIMM challenges the host computer for which a response associated with the physically unclonable function of a host computer component is provided. Additional security stores a modified response associated with run-time physically unclonable functions associated with the host computer and NVDIMM pair for use in future challenge/response exchanges.
    Type: Application
    Filed: March 5, 2020
    Publication date: September 9, 2021
    Inventors: Janani Swaminathan, Trinadhachari Kosuru, Anand Haridass, Santosh Balasubramanian
  • Publication number: 20200380130
    Abstract: A method for managing memory within a computing system. The method includes one or more computer processors identifying a range of physical memory addresses that store a first data. The method further includes determining whether a second data is stored within the range of physical memory addresses that stores the first data. The method further includes responding to determining that the second data is stored within the range of physical memory addresses that store the first data, by determining whether a process accessing the second data is identified as associated with a side-channel attack. The method further includes responding to determining that the process accessing the second data is associated with the side-channel attack, by initiating a response associated with the process accessing the second data.
    Type: Application
    Filed: May 31, 2019
    Publication date: December 3, 2020
    Inventors: Srinivas Bangalore Purushotham, Santosh Balasubramanian
  • Publication number: 20200293662
    Abstract: Embodiments provide a mutable CRTM schema for ensuring the integrity of a client workload on a single system as updates are made to the firmware used to initialize and run that system by booting a computing system in a secure mode; when successfully validating a boot image for the computing system via a secure verification code that is blocked from write access when the system is booted in a unsecure mode, allowing write access to the secure verification code; and continuing to boot the computing system in the secure mode according to the boot image. When booting the system and unseccessfully validating the boot image at the third time, the system boot is failed.
    Type: Application
    Filed: March 12, 2019
    Publication date: September 17, 2020
    Inventors: Sachin GUPTA, Sandeep KORRAPATI, Santosh BALASUBRAMANIAN, Raja DAS, Shakeeb PASHA B.K.
  • Patent number: 10635681
    Abstract: The present invention extends to methods, systems, and computer program products for forming data responsive to a query. Responding to a query can include selecting data views on top of data sources. A data catalog stores data elements from different data sources and stores links between data elements from the different data sources. A view can be selected for a query based on one or more of: classification of data included in the data catalog or prior usage of data included in the data catalog. A selected data view is populated with data elements from the data catalog using the links to determine that data elements spanning multiple data sources satisfy the query. The data catalog can be used to identify relationships between data elements from different data sources that would not otherwise be identified.
    Type: Grant
    Filed: May 25, 2017
    Date of Patent: April 28, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Christian Liensberger, Ziv Kasperski, Stéphane Nyombayire, Venkatesh Krishnan, Santosh Balasubramanian, Kunal Mukerjee, Shankar L. Regunathan
  • Patent number: 9886408
    Abstract: A protection circuit can be used with a computer system having a master device and at least one slave device that are connected by an inter-integrated circuit (I2C) bus. A first access request is received that includes an address that identifies a first slave device. In response to a permissible mode, the first access request is communicated to the first slave device using the I2C bus. A sticky protection bit can be set. In response to the sticky protection bit being set, the protection circuit can be placed in a protected mode. A second access request is received. The second access request can be determined to be a protected access to the first slave device. In response to the determining and the protected mode, the second access request to the first slave device can be denied.
    Type: Grant
    Filed: October 26, 2015
    Date of Patent: February 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Santosh Balasubramanian, Pradeep N. Chatnahalli, Andreas Koenig, Cedric Lichtenau
  • Patent number: 9858229
    Abstract: A protection circuit can be used with a computer system having a master device and at least one slave device that are connected by an inter-integrated circuit (I2C) bus. A first access request is received that includes an address that identifies a first slave device. In response to a permissible mode, the first access request is communicated to the first slave device using the I2C bus. A sticky protection bit can be set. In response to the sticky protection bit being set, the protection circuit can be placed in a protected mode. A second access request is received. The second access request can be determined to be a protected access to the first slave device. In response to the determining and the protected mode, the second access request to the first slave device can be denied.
    Type: Grant
    Filed: September 30, 2014
    Date of Patent: January 2, 2018
    Assignee: International Business Machines Corporation
    Inventors: Santosh Balasubramanian, Pradeep N. Chatnahalli, Andreas Koenig, Cedric Lichtenau
  • Publication number: 20170262510
    Abstract: The present invention extends to methods, systems, and computer program products for forming data responsive to a query. Responding to a query can include selecting data views on top of data sources. A data catalog stores data elements from different data sources and stores links between data elements from the different data sources. A view can be selected for a query based on one or more of: classification of data included in the data catalog or prior usage of data included in the data catalog. A selected data view is populated with data elements from the data catalog using the links to determine that data elements spanning multiple data sources satisfy the query. The data catalog can be used to identify relationships between data elements from different data sources that would not otherwise be identified.
    Type: Application
    Filed: May 25, 2017
    Publication date: September 14, 2017
    Inventors: Christian Liensberger, Ziv Kasperski, Stéphane Nyombayire, Venkatesh Krishnan, Santosh Balasubramanian, Kunal Mukerjee, Shankar L. Regunathan
  • Patent number: 9690687
    Abstract: A processor determines a timestamp for a signal based on a number of consecutive cycles that the signal is present on a trace bus. The processor writes a first part of the timestamp to a memory that is allocated for a timestamp of a trace entry. The processor overwrites one or more identified free bits with a second part of the timestamp of the trace entry.
    Type: Grant
    Filed: December 17, 2013
    Date of Patent: June 27, 2017
    Assignee: International Business Machines Corporation
    Inventors: Santosh Balasubramanian, Pradeep N. Chatnahalli, Rajeev Potharlanka
  • Patent number: 9672256
    Abstract: The present invention extends to methods, systems, and computer program products for creating data views. Embodiments of the invention allow automatic creation of data views/projections on top of data sources. A view can be created on one data source (by looking at one or multiple data elements within the data source) or by looking at multiple data sources (of the same or different data types) and combining elements into a view. Data sources can be any kind of data source, including but not limited to: databases, files, and Web services. Views can be picked from a set of predefined views, picked from views of another tenant (either statically or using fuzzy logic), selected based on data element classifications and/or data element relationship classifications, selected based on data usage (e.g., by looking at logs), etc.
    Type: Grant
    Filed: February 4, 2014
    Date of Patent: June 6, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Christian Liensberger, Ziv Kasperski, Stéphane Nyombayire, Venkatesh Krishnan, Santosh Balasubramanian, Kunal Mukerjee, Shankar L. Regunathan
  • Patent number: 9507898
    Abstract: A computer identifies a storage element in a simulation model of an integrated circuit design that, during simulation of the integrated circuit design using the simulation model, is subject to having its value forced. In response to identifying the storage element, an indication of the storage element and the associated clock signal are stored in a database. In response to receiving an input indicating the value of the storage element is to be forced during simulation, a determination is made by reference to the database whether or not forcing of the value is mistimed with reference to the associated clock signal. In response to a determination that the forcing of the value as indicated by the input is mistimed with reference to the associated clock signal, an indication that forcing of the value is mistimed is output.
    Type: Grant
    Filed: December 6, 2013
    Date of Patent: November 29, 2016
    Assignee: GLOBALFOUNDRIES INC.
    Inventors: Santosh Balasubramanian, Aaron C. Brown, David W. Cummings, Ambalath Matayambath Roopesh
  • Publication number: 20160092375
    Abstract: A protection circuit can be used with a computer system having a master device and at least one slave device that are connected by an inter-integrated circuit (I2C) bus. A first access request is received that includes an address that identifies a first slave device. In response to a permissible mode, the first access request is communicated to the first slave device using the I2C bus. A sticky protection bit can be set. In response to the sticky protection bit being set, the protection circuit can be placed in a protected mode. A second access request is received. The second access request can be determined to be a protected access to the first slave device. In response to the determining and the protected mode, the second access request to the first slave device can be denied.
    Type: Application
    Filed: October 26, 2015
    Publication date: March 31, 2016
    Inventors: Santosh Balasubramanian, Pradeep N. Chatnahalli, Andreas Koenig, Cedric Lichtenau
  • Publication number: 20160092387
    Abstract: A protection circuit can be used with a computer system having a master device and at least one slave device that are connected by an inter-integrated circuit (I2C) bus. A first access request is received that includes an address that identifies a first slave device. In response to a permissible mode, the first access request is communicated to the first slave device using the I2C bus. A sticky protection bit can be set. In response to the sticky protection bit being set, the protection circuit can be placed in a protected mode. A second access request is received. The second access request can be determined to be a protected access to the first slave device. In response to the determining and the protected mode, the second access request to the first slave device can be denied.
    Type: Application
    Filed: September 30, 2014
    Publication date: March 31, 2016
    Inventors: Santosh Balasubramanian, Pradeep N. Chatnahalli, Andreas Koenig, Cedric Lichtenau
  • Publication number: 20150220598
    Abstract: The present invention extends to methods, systems, and computer program products for creating data views. Embodiments of the invention allow automatic creation of data views/projections on top of data sources. A view can be created on one data source (by looking at one or multiple data elements within the data source) or by looking at multiple data sources (of the same or different data types) and combining elements into a view. Data sources can be any kind of data source, including but not limited to: databases, files, and Web services. Views can be picked from a set of predefined views, picked from views of another tenant (either statically or using fuzzy logic), selected based on data element classifications and/or data element relationship classifications, selected based on data usage (e.g., by looking at logs), etc.
    Type: Application
    Filed: February 4, 2014
    Publication date: August 6, 2015
    Applicant: Microsoft Corporation
    Inventors: Christian Liensberger, Ziv Kasperski, Stéphane Nyombayire, Venkatesh Krishnan, Santosh Balasubramanian, Kunal Mukerjee, Shankar L. Regunathan
  • Publication number: 20150169429
    Abstract: A processor determines a timestamp for a signal based on a number of consecutive cycles that the signal is present on a trace bus. The processor writes a first part of the timestamp to a memory that is allocated for a timestamp of a trace entry. The processor overwrites one or more identified free bits with a second part of the timestamp of the trace entry.
    Type: Application
    Filed: December 17, 2013
    Publication date: June 18, 2015
    Applicant: International Business Machines Corporation
    Inventors: Santosh Balasubramanian, Pradeep N. Chatnahalli, Rajeev Potharlanka