Patents by Inventor Arun Moorthy
Arun Moorthy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8683207Abstract: The present invention extends to methods, systems, and computer program products for updating signature algorithms used for signing an assembly with a strong name without changing the identity of the assembly. The present invention enables an assembly that has already been given an identity (via strong name signing with an identity public/private key pair) to be resigned with a different public/private key pair without changing the original identity that was based on the identity public/private key pair. This is accomplished by including a counter signature within the assembly that links the original identity of the assembly to the new signature key pair.Type: GrantFiled: December 19, 2011Date of Patent: March 25, 2014Assignee: Microsoft CorporationInventors: Shawn Farkas, Mueez Siddiqui, Reid Martin Borsuk, Andrew Dai, Arun Moorthy
-
Publication number: 20130159718Abstract: The present invention extends to methods, systems, and computer program products for updating signature algorithms used for signing an assembly with a strong name without changing the identity of the assembly. The present invention enables an assembly that has already been given an identity (via strong name signing with an identity public/private key pair) to be resigned with a different public/private key pair without changing the original identity that was based on the identity public/private key pair. This is accomplished by including a counter signature within the assembly that links the original identity of the assembly to the new signature key pair.Type: ApplicationFiled: December 19, 2011Publication date: June 20, 2013Applicant: Microsoft CorporationInventors: Shawn Farkas, Mueez Siddiqui, Reid Martin Borsuk, Andrew Dai, Arun Moorthy
-
Patent number: 8011008Abstract: Performing security sensitive operations with an application security model. Security agnostic code is executed. The security agnostic code is identified as not having authorization to perform a security sensitive operation. Executing the security agnostic code includes calling code identified as security safe critical code. In response to the security agnostic code calling the security safe critical code, the security safe critical code is executed. The security safe critical code includes functionality for performing validity checks. Executing the security safe critical code includes performing an validity check for the security agnostic code. When the security agnostic code passes the validity check, code identified as security critical code is called. In response to the security safe critical code calling the security critical code, the security critical code is executed. The security critical code is authorized to perform the security sensitive operation.Type: GrantFiled: November 13, 2007Date of Patent: August 30, 2011Assignee: Microsoft CorporationInventors: Michael D. Downen, Raja Krishnaswamy, Arun Moorthy, Charles W. Kaufman
-
Patent number: 7930687Abstract: Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes. An “execution context” is a set of data and/or sub-procedures that might be useful at some point during a logical execution flow (to manage and control the execution flow and provide additional services to the execution flow) of computer-executable instructions though the often complex, intertwined, and interconnected conglomeration of procedures of software product(s).Type: GrantFiled: November 24, 2008Date of Patent: April 19, 2011Assignee: Microsoft CorporationInventors: Arun Moorthy, Christopher W. Brumme, Jonathan C. Hawkins, Raja Krishnaswamy
-
Publication number: 20090126011Abstract: Performing security sensitive operations with an application security model. Security agnostic code is executed. The security agnostic code is identified as not having authorization to perform a security sensitive operation. Executing the security agnostic code includes calling code identified as security safe critical code. In response to the security agnostic code calling the security safe critical code, the security safe critical code is executed. The security safe critical code includes functionality for performing validity checks. Executing the security safe critical code includes performing an validity check for the security agnostic code. When the security agnostic code passes the validity check, code identified as security critical code is called. In response to the security safe critical code calling the security critical code, the security critical code is executed. The security critical code is authorized to perform the security sensitive operation.Type: ApplicationFiled: November 13, 2007Publication date: May 14, 2009Applicant: MICROSOFT CORPORATIONInventors: Michael D. Downen, Raja Krishnaswamy, Arun Moorthy, Charles W. Kaufman
-
Publication number: 20090077573Abstract: Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes.Type: ApplicationFiled: November 24, 2008Publication date: March 19, 2009Applicant: Microsoft CorporationInventors: Arun Moorthy, Christopher W. Brumme, Jonathan C. Hawkins, Raja Krishnaswamy
-
Patent number: 7458072Abstract: Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes. An “execution context” is a set of data and/or sub-procedures that might be useful at some point during a logical execution flow (to manage and control the execution flow and provide additional services to the execution flow) of computer-executable instructions though the often complex, intertwined, and interconnected conglomeration of procedures of software product(s).Type: GrantFiled: October 6, 2004Date of Patent: November 25, 2008Assignee: Microsoft CorporationInventors: Arun Moorthy, Christopher W. Brumme, Jonathan C. Hawkins, Raja Krishnaswamy
-
Patent number: 7228412Abstract: A method for enabling secure communication between a client on an open network and a server apparatus on a secure network. The method is generally performed on a intermediary apparatus coupled to the secure network and the open network. The method includes the steps of negotiating a secure communications session with the client apparatus via the open network; negotiating an open communications session with the server via the secure network; receiving encrypted packet application data having a length greater than a packet length via multiple data packets; decrypting the encrypted packet application data in each data packet; forwarding decrypted, unauthenticated application data to the server via the secure network; and authenticating the decrypted packet data on receipt of a final packet of the segment.Type: GrantFiled: July 6, 2001Date of Patent: June 5, 2007Assignee: Juniper Networks, Inc.Inventors: Michael Freed, Elango Gannesan, Arun Moorthy
-
Publication number: 20060075383Abstract: Described herein is an implementation for exposing an “execution context” to a logical execution flow of procedures as it executes.Type: ApplicationFiled: October 6, 2004Publication date: April 6, 2006Applicant: Microsoft CorporationInventors: Arun Moorthy, Christopher Brumme, Jonathan Hawkins, Raja Krishnaswamy
-
Publication number: 20030014625Abstract: A method for enabling secure communication between a client on an open network and a server apparatus on a secure network. The method is generally performed on a intermediary apparatus coupled to the secure network and the open network. The method includes the steps of negotiating a secure communications session with the client apparatus via the open network; negotiating an open communications session with the server via the secure network; receiving encrypted packet application data having a length greater than a packet length via multiple data packets; decrypting the encrypted packet application data in each data packet; forwarding decrypted, unauthenticated application data to the server via the secure network; and authenticating the decrypted packet data on receipt of a final packet of the segment.Type: ApplicationFiled: July 6, 2001Publication date: January 16, 2003Inventors: Michael Freed, Elango Gannesen, Arun Moorthy