Patents by Inventor Venkatraman Kudallur

Venkatraman Kudallur has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8245270
    Abstract: Access to a resource by sandboxed code is dynamically authorized by a client security system based on a resource based policy. A sandboxed application running on a client is granted access to a resource based on a resource based policy despite denial of the access based on a static policy associated with the client security system. The granting of access coincides with the determination that the threat to a user or the user's information is not increased should the access be granted.
    Type: Grant
    Filed: September 1, 2005
    Date of Patent: August 14, 2012
    Assignee: Microsoft Corporation
    Inventors: Jeffrey M. Cooperstein, Aaron R. Goldfeder, Gregory D. Fee, John M. Hawkins, Venkatraman Kudallur
  • Publication number: 20070131865
    Abstract: Security identifiers are analyzed to mitigate the use of misleading characters. In some embodiments, a language-based character set determination is utilized and looks for characters that are different from those that a user and/or the user's system would expect to see.
    Type: Application
    Filed: November 21, 2005
    Publication date: June 14, 2007
    Applicant: Microsoft Corporation
    Inventors: Eric Lawrence, Venkatraman Kudallur, Roberto Franco, Anthony Chor, Michel Suignard, James Fox, Vishu Gupta
  • Publication number: 20070050854
    Abstract: Access to a resource by sandboxed code is dynamically authorized by a client security system based on a resource based policy. A sandboxed application running on a client is granted access to a resource based on a resource based policy despite denial of the access based on a static policy associated with the client security system. The granting of access coincides with the determination that the threat to a user or the user's information is not increased should the access be granted.
    Type: Application
    Filed: September 1, 2005
    Publication date: March 1, 2007
    Applicant: Microsoft Corporation
    Inventors: Jeffrey Cooperstein, Aaron Goldfeder, Gregory Fee, John Hawkins, Venkatraman Kudallur
  • Publication number: 20070006148
    Abstract: Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision.
    Type: Application
    Filed: June 10, 2005
    Publication date: January 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Govind Varshney, Marc Silbey, Shankar Ganesh, Robert Impollonia, Venkatraman Kudallur
  • Publication number: 20060230272
    Abstract: Described herein is a technique of protecting users against certain types of Internet attacks. The technique involves obtaining certificates from visited web sites and qualifying communications with those web sites based on the content of the certificates.
    Type: Application
    Filed: March 30, 2005
    Publication date: October 12, 2006
    Applicant: Microsoft Corporation
    Inventors: Eric Lawrence, Roberto Franco, Venkatraman Kudallur, Marc Silbey
  • Publication number: 20060010241
    Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.
    Type: Application
    Filed: June 22, 2004
    Publication date: January 12, 2006
    Applicant: Microsoft Corporation
    Inventors: Venkatraman Kudallur, Shankar Ganesh, Roberto Franco, Vishu Gupta, John Bedworth
  • Publication number: 20050246761
    Abstract: A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down.
    Type: Application
    Filed: April 30, 2004
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: David Ross, Roberto Franco, John Bedworth, Shankar Ganesh, Venkatraman Kudallur, Anantha Ganjam, Kurt Schmucker