Patents by Inventor Akhilesh Kaza

Akhilesh Kaza has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7926105
    Abstract: Described is a technology including an evaluation methodology by which a set of privileged code such as a platform's API method may be marked as being security critical and/or safe for being called by untrusted code. The set of code is evaluated to determine whether the code is security critical code, and if so, it is identified as security critical. Such code is further evaluated to determine whether the code is safe with respect to being called by untrusted code, and if so, is marked as safe. To determine whether the code is safe, a determination is made as to whether the first set of code leaks criticality, including by evaluating one or more code paths corresponding to one or more callers of the first set of code, and by evaluating one or more code paths corresponding to one or more callees of the first set of code.
    Type: Grant
    Filed: February 28, 2006
    Date of Patent: April 12, 2011
    Assignee: Microsoft Corporation
    Inventors: Karen Elizabeth Corby, Mark Alcazar, Viresh Ramdatmisier, Ariel Jorge Kirsman, Andre A. Needham, Akhilesh Kaza, Raja Krishnaswamy, Jeff Cooperstein, Charles W Kaufman, Chris Anderson, Venkata Rama Prasad Tammana, Aaron R Goldfeder, John Hawkins
  • Publication number: 20100146379
    Abstract: Described is a technology in which one application running in a browser can host another application (e.g., an advertisement) in an isolated manner that prevents the hosted application from accessing browser data, or data of any other hosted application (including the host). The host and/or hosted application may be a browser plug-in (e.g., Microsoft® Silverlight™) application. The host application privately instantiates a hidden plug-in, with that hidden plug-in's access to browser data disabled, and loads the hosted application in the hidden plug-in. A XAML tag element may be used to identify the hosted application, along with a rendering area for the hosted application. Content from the hosted application is composited with content from the host application when rendering. The host application may provide keywords to the hosted application, such as for selecting relevant advertisements, and/or may allow the hosted application to open a browser window to display associated website content.
    Type: Application
    Filed: December 9, 2008
    Publication date: June 10, 2010
    Applicant: Microsoft Corporation
    Inventors: Sam George, Akhilesh Kaza, Michael R. Harsh
  • Publication number: 20090328066
    Abstract: In a computing environment, one may wish to have interoperability between trusted and untrusted controls/plug-ins allowing for richer expression of content and control within a platform. This can be accomplished by allowing an untrusted plug-in to communicate with a trusted plug-in, while having the trusted plug-in exercise control over the platform. This allows for the creation of a layered secure approach of communication with a platform, thus allowing for increased application richness in untrusted third party applications.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Ashraf A. Michail, Akhilesh Kaza, Kevin T. Gallo, Sam J. George, Joseph P. Stegman, Michael R. Harsh, Mark Alcazar
  • Publication number: 20090300597
    Abstract: Extensions or additional software programs that are requested by a computer application running on an application platform are handled in an efficient manner by, among other things, regulating and tracking extensions that are downloaded. This allows the size of the application platform upon which the application is running to remain relatively small so as to mitigate strain on resources when the platform is initially deployed over a network (e.g., the Internet), thus making it easier and more likely for a user to install the application platform (and/or updates thereto). Requested extensions are subsequently added to and/or removed from the (already deployed) application platform based on, among other things, download metrics.
    Type: Application
    Filed: June 2, 2008
    Publication date: December 3, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Sam J. George, Akhilesh Kaza, Thomas D. Taylor, Michael R. Harsh
  • Publication number: 20080028442
    Abstract: Various embodiments are disclosed relating to performing a trusted copy and paste operations between a source application and a target application. For example, a trust system may receive a paste request for pasting copied source content, and may compare a source trust level associated with the source content to a target trust level associated with a target application. In this way, for example, harmful or disruptive code may be prevented from being pasted into the target application.
    Type: Application
    Filed: July 28, 2006
    Publication date: January 31, 2008
    Applicant: Microsoft Corporation Microsoft Patent Group
    Inventors: Akhilesh Kaza, Benjamin M. Westbrook, Jeffrey M. Cooperstein, Karen E. Corby, Mark A. Alcazar
  • Publication number: 20070209073
    Abstract: Described is a technology including an evaluation methodology by which a set of privileged code such as a platform's API method may be marked as being security critical and/or safe for being called by untrusted code. The set of code is evaluated to determine whether the code is security critical code, and if so, it is identified as security critical. Such code is further evaluated to determine whether the code is safe with respect to being called by untrusted code, and if so, is marked as safe. To determine whether the code is safe, a determination is made as to whether the first set of code leaks criticality, including by evaluating one or more code paths corresponding to one or more callers of the first set of code, and by evaluating one or more code paths corresponding to one or more callees of the first set of code.
    Type: Application
    Filed: February 28, 2006
    Publication date: September 6, 2007
    Applicant: Microsoft Corporation
    Inventors: Karen Corby, Mark Alcazar, Viresh Ramdatmisier, Ariel Kirsman, Andre Needham, Akhilesh Kaza, Raja Krishnaswamy, Jeff Cooperstein, Charles Kaufman, Chris Anderson, Venkata Prasad, Aaron Goldfeder, John Hawkins