Patents by Inventor Jack Pullikottil

Jack Pullikottil has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230412602
    Abstract: Methods, systems, and computer programs are presented for managing access to resources using scenarios. One method includes an operation for storing first scenario data received for a first control scenario. The first scenario data comprises a control scenario identifier, a first resource, an authorization control, and a scenario trigger that defines an event that causes an activation of the first control scenario for providing access to the first resource. Further, the method includes operations for monitoring for an occurrence of the scenario trigger and detecting an occurrence of the event associated with the scenario trigger. Further, the method determines, in response to the occurrence of the event, a set of users authorized to access the first resource, including accessing the first scenario data to determine the set of users associated with the authorization control. Furthermore, access is provided to the set of users based on the determining.
    Type: Application
    Filed: October 22, 2021
    Publication date: December 21, 2023
    Inventors: James Paul GYARMATHY, Ali ALAM, Amanda HOLCOMB, Alka GARG, Ayyappan BALASUBRAMANIAN, Mansi SINGHAL, Gerardo BODEGAS MARTINEZ, Michael TODD, Carrie Ann CULLEY, Hardeep KOHLI, Can ZHENG, Rohan KAMATH, Sandhya VANKAMAMIDI, Jing JING, Zhuang GAO, John Kingsly MASILAMANI, Jack PULLIKOTTIL
  • Patent number: 8424072
    Abstract: Described herein are techniques for operating a security server to determine behavioral profiles for entities in a network and to detect attacks or unauthorized traffic in a network based on those behavioral profiles. In one technique, a behavioral profile may be generated based on requests for security operations to be performed that are received at a security server from an entity in a network. The behavioral profile may be generated using learning techniques, including artificial intelligence techniques such as neural networks. When the security server receives from an entity one or more requests for security operations to be performed, the security server may compare properties of the requests to the behavioral profile for the entity and properties of requests commonly sent by the entity. The security server may determine a similarity score indicating how similar the request are to the behavioral profile and to requests commonly received from the entity.
    Type: Grant
    Filed: March 9, 2010
    Date of Patent: April 16, 2013
    Assignee: Microsoft Corporation
    Inventors: Jack Pullikottil, Mitica Manu
  • Publication number: 20110225644
    Abstract: Described herein are techniques for operating a security server to determine behavioral profiles for entities in a network and to detect attacks or unauthorized traffic in a network based on those behavioral profiles. In one technique, a behavioral profile may be generated based on requests for security operations to be performed that are received at a security server from an entity in a network. The behavioral profile may be generated using learning techniques, including artificial intelligence techniques such as neural networks. When the security server receives from an entity one or more requests for security operations to be performed, the security server may compare properties of the requests to the behavioral profile for the entity and properties of requests commonly sent by the entity. The security server may determine a similarity score indicating how similar the request are to the behavioral profile and to requests commonly received from the entity.
    Type: Application
    Filed: March 9, 2010
    Publication date: September 15, 2011
    Applicant: Microsoft Corporation
    Inventors: Jack Pullikottil, Mitica Manu
  • Publication number: 20110225133
    Abstract: Described herein are various principles that may be used together or separately to implement a search engine to retrieve and use metadata information in performing a search. In one embodiment described herein, a search engine accepts input from a user that describes a search the user desires to be performed. The search engine may then examine the input to determine whether the input relates to an artifact and to what artifact the input relates. The search engine may then retrieve metadata information from a source related to the determined artifact and use the metadata information in performing the search requested by the user.
    Type: Application
    Filed: March 9, 2010
    Publication date: September 15, 2011
    Applicant: Microsoft Corporation
    Inventors: Mitica Manu, Jack Pullikottil