Patents by Inventor Arun Moorthy

Arun Moorthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8683207
    Abstract: The present invention extends to methods, systems, and computer program products for updating signature algorithms used for signing an assembly with a strong name without changing the identity of the assembly. The present invention enables an assembly that has already been given an identity (via strong name signing with an identity public/private key pair) to be resigned with a different public/private key pair without changing the original identity that was based on the identity public/private key pair. This is accomplished by including a counter signature within the assembly that links the original identity of the assembly to the new signature key pair.
    Type: Grant
    Filed: December 19, 2011
    Date of Patent: March 25, 2014
    Assignee: Microsoft Corporation
    Inventors: Shawn Farkas, Mueez Siddiqui, Reid Martin Borsuk, Andrew Dai, Arun Moorthy
  • Publication number: 20130159718
    Abstract: The present invention extends to methods, systems, and computer program products for updating signature algorithms used for signing an assembly with a strong name without changing the identity of the assembly. The present invention enables an assembly that has already been given an identity (via strong name signing with an identity public/private key pair) to be resigned with a different public/private key pair without changing the original identity that was based on the identity public/private key pair. This is accomplished by including a counter signature within the assembly that links the original identity of the assembly to the new signature key pair.
    Type: Application
    Filed: December 19, 2011
    Publication date: June 20, 2013
    Applicant: Microsoft Corporation
    Inventors: Shawn Farkas, Mueez Siddiqui, Reid Martin Borsuk, Andrew Dai, Arun Moorthy
  • Patent number: 8011008
    Abstract: Performing security sensitive operations with an application security model. Security agnostic code is executed. The security agnostic code is identified as not having authorization to perform a security sensitive operation. Executing the security agnostic code includes calling code identified as security safe critical code. In response to the security agnostic code calling the security safe critical code, the security safe critical code is executed. The security safe critical code includes functionality for performing validity checks. Executing the security safe critical code includes performing an validity check for the security agnostic code. When the security agnostic code passes the validity check, code identified as security critical code is called. In response to the security safe critical code calling the security critical code, the security critical code is executed. The security critical code is authorized to perform the security sensitive operation.
    Type: Grant
    Filed: November 13, 2007
    Date of Patent: August 30, 2011
    Assignee: Microsoft Corporation
    Inventors: Michael D. Downen, Raja Krishnaswamy, Arun Moorthy, Charles W. Kaufman
  • Patent number: 7930687
    Abstract: Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes. An “execution context” is a set of data and/or sub-procedures that might be useful at some point during a logical execution flow (to manage and control the execution flow and provide additional services to the execution flow) of computer-executable instructions though the often complex, intertwined, and interconnected conglomeration of procedures of software product(s).
    Type: Grant
    Filed: November 24, 2008
    Date of Patent: April 19, 2011
    Assignee: Microsoft Corporation
    Inventors: Arun Moorthy, Christopher W. Brumme, Jonathan C. Hawkins, Raja Krishnaswamy
  • Publication number: 20090126011
    Abstract: Performing security sensitive operations with an application security model. Security agnostic code is executed. The security agnostic code is identified as not having authorization to perform a security sensitive operation. Executing the security agnostic code includes calling code identified as security safe critical code. In response to the security agnostic code calling the security safe critical code, the security safe critical code is executed. The security safe critical code includes functionality for performing validity checks. Executing the security safe critical code includes performing an validity check for the security agnostic code. When the security agnostic code passes the validity check, code identified as security critical code is called. In response to the security safe critical code calling the security critical code, the security critical code is executed. The security critical code is authorized to perform the security sensitive operation.
    Type: Application
    Filed: November 13, 2007
    Publication date: May 14, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Michael D. Downen, Raja Krishnaswamy, Arun Moorthy, Charles W. Kaufman
  • Publication number: 20090077573
    Abstract: Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes.
    Type: Application
    Filed: November 24, 2008
    Publication date: March 19, 2009
    Applicant: Microsoft Corporation
    Inventors: Arun Moorthy, Christopher W. Brumme, Jonathan C. Hawkins, Raja Krishnaswamy
  • Patent number: 7458072
    Abstract: Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes. An “execution context” is a set of data and/or sub-procedures that might be useful at some point during a logical execution flow (to manage and control the execution flow and provide additional services to the execution flow) of computer-executable instructions though the often complex, intertwined, and interconnected conglomeration of procedures of software product(s).
    Type: Grant
    Filed: October 6, 2004
    Date of Patent: November 25, 2008
    Assignee: Microsoft Corporation
    Inventors: Arun Moorthy, Christopher W. Brumme, Jonathan C. Hawkins, Raja Krishnaswamy
  • Patent number: 7228412
    Abstract: A method for enabling secure communication between a client on an open network and a server apparatus on a secure network. The method is generally performed on a intermediary apparatus coupled to the secure network and the open network. The method includes the steps of negotiating a secure communications session with the client apparatus via the open network; negotiating an open communications session with the server via the secure network; receiving encrypted packet application data having a length greater than a packet length via multiple data packets; decrypting the encrypted packet application data in each data packet; forwarding decrypted, unauthenticated application data to the server via the secure network; and authenticating the decrypted packet data on receipt of a final packet of the segment.
    Type: Grant
    Filed: July 6, 2001
    Date of Patent: June 5, 2007
    Assignee: Juniper Networks, Inc.
    Inventors: Michael Freed, Elango Gannesan, Arun Moorthy
  • Publication number: 20060075383
    Abstract: Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes.
    Type: Application
    Filed: October 6, 2004
    Publication date: April 6, 2006
    Applicant: Microsoft Corporation
    Inventors: Arun Moorthy, Christopher Brumme, Jonathan Hawkins, Raja Krishnaswamy
  • Publication number: 20030014625
    Abstract: A method for enabling secure communication between a client on an open network and a server apparatus on a secure network. The method is generally performed on a intermediary apparatus coupled to the secure network and the open network. The method includes the steps of negotiating a secure communications session with the client apparatus via the open network; negotiating an open communications session with the server via the secure network; receiving encrypted packet application data having a length greater than a packet length via multiple data packets; decrypting the encrypted packet application data in each data packet; forwarding decrypted, unauthenticated application data to the server via the secure network; and authenticating the decrypted packet data on receipt of a final packet of the segment.
    Type: Application
    Filed: July 6, 2001
    Publication date: January 16, 2003
    Inventors: Michael Freed, Elango Gannesen, Arun Moorthy