Patents by Inventor Ganesh Pandey
Ganesh Pandey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12079655Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. An investigation pack, which includes investigative resources used in the investigation, is identified and the workspace is pre-configured with the identified investigation pack. The control message processing system performs investigation tasks within the workspace using the investigation pack.Type: GrantFiled: March 7, 2023Date of Patent: September 3, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Parul Manek, Ganesh Pandey
-
Publication number: 20240256967Abstract: A classifier is trained to classify business supplier relationships using synthetic training data samples. Real training data samples are collected and transformed into sample encodings using an encoder. The real training data samples include feature data associated with health class indicators indicative of relationships between suppliers and service providers. A set of synthetic training data samples is generated from the sample encodings using a generator and discrimination feedback data is generated using a discriminator based on the real training data samples and the synthetic training data samples. The discrimination feedback data is used to train the generator. A classifier model is trained to classify suppliers with health class indicators using the set of synthetic training data samples. The use of the encoder, generator, and discriminator enables the generation of accurate synthetic training data that represents the source distribution of real data which are often partially observed.Type: ApplicationFiled: January 31, 2024Publication date: August 1, 2024Inventors: Anubha Pandey, Aman Gupta, Deepak Bhatt, Emmanuel Gama Ibarra, Ganesh Nagendra Prasad, Harsimran Bhasin, Ross Harris, Srinivasan Chandrasekharan, Tanmoy Bhowmik
-
Patent number: 11930016Abstract: A client application is specified by a target tenant and represented in an OAuth provider, along with a corresponding secret. A source tenant consents to permissions to be executed by the client application on a resource of the source tenant. A target service uses the secret to obtain an access token from an authorization server coupled to the source tenant and uses the access token to obtain access, specified by the permissions, to the resource served by a source service acting on behalf of the source tenant.Type: GrantFiled: May 20, 2022Date of Patent: March 12, 2024Assignee: Microsoft Technology Licensing, LLC.Inventors: Anshul Dube, Parul Manek, Steven Mark Silverberg, Shankaranand Arunachalam, Jason Craig Nelson, Andrew Burke Ryan, Robert A. Lowe, Ganesh Pandey
-
Patent number: 11750612Abstract: A service computing system receives an API call in which an authorization token, that contains an identifier in the content of the authorization token, is included in a header of the API call. The identifier is also included as a parameter passed in with the API call. The service computing system parses the API call to obtain the authorization token, and the identifier included in the authorization token. It also obtains the identifier passed in as a parameter of the API call. The service computing system compares the identifier obtained from the authorization token to the identifier passed in as a parameter of the API call to determine whether they match. If they do not match, the API call is processed as an unauthorized API call. A security system in the service computing system authorizes the API call based on the comparison.Type: GrantFiled: October 27, 2021Date of Patent: September 5, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Anshul Dube, Xiaoqin Zhu, Andrew Burke Ryan, Shankaranand Arunachalam, Gokay Hurmali, Dmitri Gavrilov, Ganesh Pandey, Parul Manek
-
Publication number: 20230205572Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. An investigation pack, which includes investigative resources used in the investigation, is identified and the workspace is pre-configured with the identified investigation pack. The control message processing system performs investigation tasks within the workspace using the investigation pack.Type: ApplicationFiled: March 7, 2023Publication date: June 29, 2023Inventors: Yoganand RAJASEKARAN, Raquibur RAHMAN, Ayla KOL, Philip Ross MOYER, Brijesh Bhupendra DESAI, Zijun HAO, Mainul MIZAN, Kameshwar JAYARAMAN, Benjamin DU, PARUL MANEK, GANESH PANDEY
-
Patent number: 11665183Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The control message processing system performs investigation tasks within the workspace. A secure log generation system captures information corresponding to the tasks and generates an event record based on the captured information.Type: GrantFiled: November 17, 2021Date of Patent: May 30, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Ganesh Pandey, Parul Manek
-
Patent number: 11630684Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. An investigation pack, which includes investigative resources used in the investigation, is identified and the workspace is pre-configured with the identified investigation pack. The control message processing system performs investigation tasks within the workspace using the investigation pack.Type: GrantFiled: July 26, 2019Date of Patent: April 18, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Parul Manek, Ganesh Pandey
-
Publication number: 20230093731Abstract: Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation.Type: ApplicationFiled: November 28, 2022Publication date: March 23, 2023Inventors: Anuj DHAWAN, Brijesh Bhupendra DESAI, Kameshwar JAYARAMAN, Ayla KOL, Amit A. BAPAT, Qi CAO, Steven Jay LIEBERMAN, Ganesh PANDEY, Parul MANEK
-
Patent number: 11580239Abstract: Access to data and resources in a multi-tenant computing system is managed by tagging the data and resources with attributes, as well as by tagging users with attributes. Tenant-specific access policies are configured. When an access request is received from a workload, a policy decision engine processes the attributes that are tagged to the requesting workload (e.g., user, application, etc.) as well as those tagged to the requested data or resource, given a relevant tenant-specific policy. An access decision is provided in response to the access request, and the access decision can be enforced by a tenant-specific enforcement system.Type: GrantFiled: October 22, 2019Date of Patent: February 14, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Daniel John Carroll, Jr., Kameshwar Jayaraman, Stuart Kwan, Kartik Tirunelveli Kanakasabesan, Shefali Gulati, Charles Glenn Jeffries, Ganesh Pandey, Roberto Carlos Taboada, Parul Manek, Steven Mark Silverberg
-
Patent number: 11520918Abstract: Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The of the service provider validates the DEP. The of the service provider stores the DEP based on the validation.Type: GrantFiled: February 3, 2021Date of Patent: December 6, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Anuj Dhawan, Brijesh Bhupendra Desai, Kameshwar Jayaraman, Ayla Kol, Amit A. Bapat, Qi Cao, Steven Jay Lieberman, Ganesh Pandey, Parul Manek
-
Patent number: 11436230Abstract: In a multi-tenant computing system, a cross-tenant user search system receives a user search input from a user using a client of a first tenant. The cross-tenant user search system accesses a policy that identifies one or more related tenants that are related to the first tenant. The policy also identifies directory records of users in the related tenant that can be searched by users of the first tenant. The cross-tenant user search system executes a search against a directory for the first tenant and executes a separate search against the directory records in the related tenants, identified in the policy. The search results from searching the directory for the first tenant and the related search results from searching the directory records in the tenant are aggregated into an aggregated set of search results which are then returned to the client.Type: GrantFiled: April 29, 2021Date of Patent: September 6, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Shankaranand Arunachalam, Robert Allen Lowe, Jason Craig Nelson, Paul Baecke, Xiaoqin Zhu, Ganesh Pandey, Parul Manek
-
Publication number: 20220278991Abstract: A client application is specified by a target tenant and represented in an OAuth provider, along with a corresponding secret. A source tenant consents to permissions to be executed by the client application on a resource of the source tenant. A target service uses the secret to obtain an access token from an authorization server coupled to the source tenant and uses the access token to obtain access, specified by the permissions, to the resource served by a source service acting on behalf of the source tenant.Type: ApplicationFiled: May 20, 2022Publication date: September 1, 2022Inventors: Anshul DUBE, Parul MANEK, Steven Mark SILVERBERG, Shankaranand ARUNACHALAM, Jason Craig NELSON, Andrew Burke RYAN, Robert A. LOWE, Ganesh PANDEY
-
Publication number: 20220245268Abstract: Methods, systems, and computer programs are presented for protecting restricted actions on encryption keys that control the management of data stored by a service provider. In some implementations, a system of the service provider receives a request to generate a data encryption policy (DEP) for data stored by the system of the service provider for a customer, the request including a reference to a customer key and an availability key. The customer key and the availability key are root keys for encrypting a data encryption key. The data encryption key is used to encrypt the data stored by the service provider for the customer. Further, destructive changes to the availability key require receiving an approval from an account of the service provider. The system of the service provider validates the DEP. The system of the service provider stores the DEP based on the validation.Type: ApplicationFiled: February 3, 2021Publication date: August 4, 2022Inventors: Anuj Dhawan, Brijesh Bhupendra DESAI, Kameshwar JAYARAMAN, Ayla KOL, Amit A. BAPAT, Qi CAO, Steven Jay LIEBERMAN, Ganesh PANDEY, Parul MANEK
-
Patent number: 11388172Abstract: A request to perform a command or operation on a computing system is received from a support user. A clearance level needed to perform that requested command or operation is identified, and a data store that has a pool of cleared users is accessed to identify a cleared user that has an adequate clearance level. The secured user is assigned to the request. A risk level, corresponding to the requested command or operation is identified and surfaced for the secured user. The requested command or operation can be automatically executed, after it is authorized by the secured user.Type: GrantFiled: August 7, 2019Date of Patent: July 12, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Soumit Rahman, Ganesh Pandey, Curtis Thibault, Kameshwar Jayaraman, Ajay Kalidindi, Ayla Kol, Yeshua Garcia, Priyanshu Kumar Jha, Parul Manek, Yoganand Rajasekaran
-
Patent number: 11381571Abstract: A client application is specified by a target tenant and represented in an OAuth provider, along with a corresponding secret. A source tenant consents to permissions to be executed by the client application on a resource of the source tenant. A target service uses the secret to obtain an access token from an authorization server coupled to the source tenant and uses the access token to obtain access, specified by the permissions, to the resource served by a source service acting on behalf of the source tenant.Type: GrantFiled: January 27, 2020Date of Patent: July 5, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Anshul Dube, Parul Manek, Steven Mark Silverberg, Shankaranand Arunachalam, Jason Craig Nelson, Andrew Burke Ryan, Robert A. Lowe, Ganesh Pandey
-
Publication number: 20220078200Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The control message processing system performs investigation tasks within the workspace. A secure log generation system captures information corresponding to the tasks and generates an event record based on the captured information.Type: ApplicationFiled: November 17, 2021Publication date: March 10, 2022Inventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Ganesh Pandey, Parul Manek
-
Publication number: 20220053000Abstract: A service computing system receives an API call in which an authorization token, that contains an identifier in the content of the authorization token, is included in a header of the API call. The identifier is also included as a parameter passed in with the API call. The service computing system parses the API call to obtain the authorization token, and the identifier included in the authorization token. It also obtains the identifier passed in as a parameter of the API call. The service computing system compares the identifier obtained from the authorization token to the identifier passed in as a parameter of the API call to determine whether they match. If they do not match, the API call is processed as an unauthorized API call. A security system in the service computing system authorizes the API call based on the comparison.Type: ApplicationFiled: October 27, 2021Publication date: February 17, 2022Inventors: Anshul DUBE, Xiaoqin ZHU, Andrew Burke RYAN, Shankaranand ARUNACHALAM, Gokay HURMALI, Dmitri GAVRILOV, Ganesh PANDEY, Parul MANEK
-
Patent number: 11212300Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The control message processing system performs investigation tasks within the workspace. A secure log generation system captures information corresponding to the tasks and generates an event record based on the captured information.Type: GrantFiled: July 26, 2019Date of Patent: December 28, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Ganesh Pandey, Parul Manek
-
Patent number: 11190514Abstract: A service computing system receives an API call in which an authorization token, that contains an identifier in the content of the authorization token, is included in a header of the API call. The identifier is also included as a parameter passed in with the API call. The service computing system parses the API call to obtain the authorization token, and the identifier included in the authorization token. It also obtains the identifier passed in as a parameter of the API call. The service computing system compares the identifier obtained from the authorization token to the identifier passed in as a parameter of the API call to determine whether they match. If they do not match, the API call is processed as an unauthorized API call. A security system in the service computing system authorizes the API call based on the comparison.Type: GrantFiled: June 17, 2019Date of Patent: November 30, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Anshul Dube, Xiaoqin Zhu, Andrew Burke Ryan, Shankaranand Arunachalam, Gokay Hurmali, Dmitri Gavrilov, Ganesh Pandey, Parul Manek
-
Patent number: 11153321Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that is a user-facing system and receives requests to prepare for an incident investigation. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The request processing system does not access the workspace and the control message processing system is not available for external access by a user. Data and functionality are ingested into the workspace. The control message processing system performs investigation preparation tasks within the workspace. The results of the investigation tasks are surfaced for user access.Type: GrantFiled: July 26, 2019Date of Patent: October 19, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Yoganand Rajasekaran, Raquibur Rahman, Ayla Kol, Philip Ross Moyer, Brijesh Bhupendra Desai, Zijun Hao, Mainul Mizan, Kameshwar Jayaraman, Benjamin Du, Ganesh Pandey, Parul Manek