Patents by Inventor Grigory V. Kaplin
Grigory V. Kaplin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11968303Abstract: Techniques of keyless authentication of computing services in distributed computing systems are disclosed herein. One example technique includes upon receiving a command to instantiate a computing service, transmitting a request to an authentication service for an identity assertion token corresponding to an application execution of which instantiates the computing service. The example technique can also include upon receiving the requested identity assertion token, storing the received identity assertion token in the container and modifying an entry of a configuration file in the container that allows the instantiated computing service to access the stored identity assertion token and authenticate to the authentication service using the identity assertion token.Type: GrantFiled: February 9, 2023Date of Patent: April 23, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Paranthaman Saravanan, Marc Andrew Power, Yang Zhang, Matthias Adam Leibmann, Grigory V. Kaplin, Yi Zeng
-
Publication number: 20230188352Abstract: Techniques of keyless authentication of computing services in distributed computing systems are disclosed herein. One example technique includes upon receiving a command to instantiate a computing service, transmitting a request to an authentication service for an identity assertion token corresponding to an application execution of which instantiates the computing service. The example technique can also include upon receiving the requested identity assertion token, storing the received identity assertion token in the container and modifying an entry of a configuration file in the container that allows the instantiated computing service to access the stored identity assertion token and authenticate to the authentication service using the identity assertion token.Type: ApplicationFiled: February 9, 2023Publication date: June 15, 2023Inventors: Paranthaman SARAVANAN, Marc Andrew POWER, Yang ZHANG, Matthias Adam LEIBMANN, Grigory V. KAPLIN, Yi ZENG
-
Patent number: 11658983Abstract: An authorization policy defines permissions that are exposed by a microservice. When a call is made to the microservice, it includes an access token. An application identifier uniquely identifying the calling application is extracted from the token. An access pattern, used by the calling application to obtain the access token and make the call to the microservice, is identified. Permissions that may be granted to the calling application are identified in the authorization policy based upon the application identifier and the access pattern that is identified. An authorization decision is made as to whether to authorize the call, based upon the granted permissions.Type: GrantFiled: February 7, 2020Date of Patent: May 23, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Matthias Leibmann, Grigory V. Kaplin, Vikas Ahuja, Kapil Kumar Jain, Qinxiao Zhou, Ran Cheng
-
Patent number: 11606208Abstract: Techniques of keyless authentication of computing services in distributed computing systems are disclosed herein. One example technique includes upon receiving a command to instantiate a computing service, transmitting a request to an authentication service for an identity assertion token corresponding to an application execution of which instantiates the computing service. The example technique can also include upon receiving the requested identity assertion token, storing the received identity assertion token in the container and modifying an entry of a configuration file in the container that allows the instantiated computing service to access the stored identity assertion token and authenticate to the authentication service using the identity assertion token.Type: GrantFiled: April 17, 2020Date of Patent: March 14, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Paranthaman Saravanan, Marc Andrew Power, Yang Zhang, Matthias Adam Leibmann, Grigory V. Kaplin, Yi Zeng
-
Patent number: 11595220Abstract: A routing plane includes an authentication packaging system that receives client authentication information, as part of a request from a requesting client that is to be routed to a target service. The authentication packaging system combines the authentication information with assertion information indicative of an assertion as to the identity of the routing plane, using an entropy, such as a signing key. The authentication package is attached to the request and is sent to the target service. The target service validates the authentication package based on the entropy and authenticates the routing plane based on the assertion information and performs authentication processing based on the authentication information.Type: GrantFiled: November 29, 2021Date of Patent: February 28, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Matthias Leibmann, Grigory V. Kaplin, Chun-Hung Lin
-
Patent number: 11310059Abstract: Techniques of data authentication in a distributed computing system are disclosed herein. One example technique includes receiving a request for performing an operation along with a data package that includes a security token, a first digital signature of the security token generated using an ephemeral private key, and an ephemeral public key with a second digital signature generated using a master private key stored at a secure location. The example technique can also include initially validating the second digital signature using a public key corresponding to the master private key, and upon validating the second digital signature, validating the first digital signature of the security token using the ephemeral public key included in the data package. Upon validating that the first digital signature of the security token, the request can be authenticated, and the requested operation can be performed.Type: GrantFiled: June 2, 2020Date of Patent: April 19, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Matthias Adam Leibmann, Victor Boctor, Grigory V. Kaplin, Liang Zou, Paranthaman Saravanan
-
Publication number: 20220086014Abstract: A routing plane includes an authentication packaging system that receives client authentication information, as part of a request from a requesting client that is to be routed to a target service. The authentication packaging system combines the authentication information with assertion information indicative of an assertion as to the identity of the routing plane, using an entropy, such as a signing key. The authentication package is attached to the request and is sent to the target service. The target service validates the authentication package based on the entropy and authenticates the routing plane based on the assertion information and performs authentication processing based on the authentication information.Type: ApplicationFiled: November 29, 2021Publication date: March 17, 2022Inventors: Matthias LEIBMANN, Grigory V. KAPLIN, Chun-Hung LIN
-
Patent number: 11223488Abstract: A routing plane includes an authentication packaging system that receives client authentication information, as part of a request from a requesting client that is to be routed to a target service. The authentication packaging system combines the authentication information with assertion information indicative of an assertion as to the identity of the routing plane, using an entropy, such as a signing key. The authentication package is attached to the request and is sent to the target service. The target service validates the authentication package based on the entropy and authenticates the routing plane based on the assertion information and performs authentication processing based on the authentication information.Type: GrantFiled: May 28, 2020Date of Patent: January 11, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Matthias Leibmann, Grigory V. Kaplin, Chun-Hung Lin
-
Publication number: 20210377055Abstract: A routing plane includes an authentication packaging system that receives client authentication information, as part of a request from a requesting client that is to be routed to a target service. The authentication packaging system combines the authentication information with assertion information indicative of an assertion as to the identity of the routing plane, using an entropy, such as a signing key. The authentication package is attached to the request and is sent to the target service. The target service validates the authentication package based on the entropy and authenticates the routing plane based on the assertion information and performs authentication processing based on the authentication information.Type: ApplicationFiled: May 28, 2020Publication date: December 2, 2021Inventors: Matthias Leibmann, Grigory V. Kaplin, Chun-Hung Lin
-
Publication number: 20210377044Abstract: Techniques of data authentication in a distributed computing system are disclosed herein. One example technique includes receiving a request for performing an operation along with a data package that includes a security token, a first digital signature of the security token generated using an ephemeral private key, and an ephemeral public key with a second digital signature generated using a master private key stored at a secure location. The example technique can also include initially validating the second digital signature using a public key corresponding to the master private key, and upon validating the second digital signature, validating the first digital signature of the security token using the ephemeral public key included in the data package. Upon validating that the first digital signature of the security token, the request can be authenticated, and the requested operation can be performed.Type: ApplicationFiled: June 2, 2020Publication date: December 2, 2021Inventors: Matthias Adam Leibmann, Victor Boctor, Grigory V. Kaplin, Liang Zou, Paranthaman Saravanan
-
Publication number: 20210328793Abstract: Techniques of keyless authentication of computing services in distributed computing systems are disclosed herein. One example technique includes upon receiving a command to instantiate a computing service, transmitting a request to an authentication service for an identity assertion token corresponding to an application execution of which instantiates the computing service. The example technique can also include upon receiving the requested identity assertion token, storing the received identity assertion token in the container and modifying an entry of a configuration file in the container that allows the instantiated computing service to access the stored identity assertion token and authenticate to the authentication service using the identity assertion token.Type: ApplicationFiled: April 17, 2020Publication date: October 21, 2021Inventors: Paranthaman Saravanan, Marc Andrew Power, Yang Zhang, Matthias Adam Leibmann, Grigory V. Kaplin, Yi Zeng
-
Publication number: 20210250361Abstract: An authorization policy defines permissions that are exposed by a microservice. When a call is made to the microservice, it includes an access token. An application identifier uniquely identifying the calling application is extracted from the token. An access pattern, used by the calling application to obtain the access token and make the call to the microservice, is identified. Permissions that may be granted to the calling application are identified in the authorization policy based upon the application identifier and the access pattern that is identified. An authorization decision is made as to whether to authorize the call, based upon the granted permissions.Type: ApplicationFiled: February 7, 2020Publication date: August 12, 2021Inventors: Matthias Leibmann, Grigory V. Kaplin, Vikas Ahuja, Kapil Kumar Jain, Qinxiao Zhou, Ran Cheng
-
Patent number: 10623410Abstract: A computing system controls access between components. A token issuer issues an access token to a requesting component, that is requesting access to a requested service component, based at least in part on an access policy. The requesting component sends the token to the requested service component, which includes a token authentication module that validates the access token and authorizes the requesting component to access a requested service component, and receives the authorization to access the requested service component.Type: GrantFiled: April 24, 2017Date of Patent: April 14, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Matthias Leibmann, Joel T. Hendrickson, Grigory V. Kaplin, Corneliu Manescu
-
Publication number: 20180309759Abstract: A computing system controls access between components. A token issuer issues an access token to a requesting component, that is requesting access to a requested service component, based at least in part on an access policy. The requesting component sends the token to the requested service component, which includes a token authentication module that validates the access token and authorizes the requesting component to access a requested service component, and receives the authorization to access the requested service component.Type: ApplicationFiled: April 24, 2017Publication date: October 25, 2018Inventors: Matthias Leibmann, Joel T. Hendrickson, Grigory V. Kaplin, Corneliu Manescu