Patents by Inventor Kahren Tevosyan

Kahren Tevosyan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190288839
    Abstract: Various methods and systems are provided for autonomous orchestration of secrets renewal and distribution across scope boundaries. A cross-scope secrets management service (“SMS”) can be utilized to store, renew and distribute secrets across boundaries in a distributed computing environment such as regional boundaries. In some embodiments, locally scoped secrets management services subscribe to receive updates from the cross-scope secrets management service. As secrets are renewed, they are automatically propagated to a subscribing local scope and distributed by the local secrets management service. In various embodiments, SMS can autonomously rollover storage account keys, track delivery of updated secrets to secrets recipients, deliver secrets using a secure blob, and/or facilitate autonomous rollover using secrets staging. In some embodiments, a service is pinned to the path where the service's secrets are stored.
    Type: Application
    Filed: March 14, 2018
    Publication date: September 19, 2019
    Inventors: Brian S. LOUNSBERRY, Ashok CHANDRASEKARAN, Chandan R. REDDY, Chuang WANG, Kahren TEVOSYAN, Mark Eugene RUSSINOVICH, Srinivas S. NIDADAVOLU, Vyom P. MUNSHI
  • Publication number: 20190288859
    Abstract: Aspects of the technology described herein enable a client device to access a web service in a claims-based identity environment thorough an Internet Protocol (IP) address, rather than the web service's domain name service (DNS). In a claims-based identity environment, a client device will authenticate a relying party's server SSL certificate before providing the token to the relying party by following an authentication process. Current authentication processes include a name-chaining operation, which compares a subject field of a token provided with the Uniform Resource Identifier (URI) used to request the resource (e.g., RP application). When the IP address is used as the URI, then the URI in the certificate will not match the URI in the request and the authentication will fail. Accordingly, aspects of the technology use an alternative authentication method that allows access to a web service through an IP address, when the default client-side token validation is DNS-name based.
    Type: Application
    Filed: March 16, 2018
    Publication date: September 19, 2019
    Inventors: Chandan R. REDDY, Kahren TEVOSYAN, Hieu Trung NGUYEN
  • Patent number: 8990907
    Abstract: Embodiments are directed to establishing separate security identities for a shared service and shared service instances, and to managing shared and service instance credentials. In one scenario, a computer system establishes a shared credential for a shared service that includes multiple shared service instances, where the shared credential uniquely identifies the shared service. The computer system establishes a service instance credential for each shared service instance that uniquely identifies each shared service instance and maintains a relationship between the service instance and the shared service. The relationship provides service instance access to the shared credentials as the shared credentials are updated over time. Then, upon determining that the shared credentials have been updated and are no longer valid, the shared service instance accesses the updated shared credentials using the established relationship.
    Type: Grant
    Filed: November 9, 2012
    Date of Patent: March 24, 2015
    Assignee: Microsoft Corporation
    Inventors: David A. Matson, Kahren Tevosyan, Mark Russinovich
  • Patent number: 8990562
    Abstract: An invention is described for securely deploying a provable identity for virtual machines (VMs) in a dynamic environment. In an embodiment, a fabric controller instructs a VM host to create a VM and sends that VM a secret. The fabric controller sends that same secret (or a second secret, such as the private key of a public/private key pair) to the security token service along with an instruction to make an account for the VM. The VM presents proof that it possesses the secret to the security token service and in return receives a full token. When a client connects to the deployment, it receives the public key from the security token service, which it trusts, and the full token from the VM. It validates the full token with the public key to determine that the VM has the identity that it purports to have.
    Type: Grant
    Filed: October 8, 2010
    Date of Patent: March 24, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ian Jirka, Kahren Tevosyan, Corey Sanders, George M. Moore, Mohit Srivastava, Mark Eugene Russinovich
  • Publication number: 20140137218
    Abstract: Embodiments are directed to establishing separate security identities for a shared service and shared service instances, and to managing shared and service instance credentials. In one scenario, a computer system establishes a shared credential for a shared service that includes multiple shared service instances, where the shared credential uniquely identifies the shared service. The computer system establishes a service instance credential for each shared service instance that uniquely identifies each shared service instance and maintains a relationship between the service instance and the shared service. The relationship provides service instance access to the shared credentials as the shared credentials are updated over time. Then, upon determining that the shared credentials have been updated and are no longer valid, the shared service instance accesses the updated shared credentials using the established relationship.
    Type: Application
    Filed: November 9, 2012
    Publication date: May 15, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: David A. Matson, Kahren Tevosyan, Mark Russinovich
  • Patent number: 8245051
    Abstract: Systems and methods directed at enhancing the capability of a federated authentication system by configuring the system with extensibility points for adding new account stores and customizing claim transformations. The federated authentication system includes accounts stores, a security token service (STS), and custom claim transformation modules. The account stores are configured to maintain data associated with accounts and to provide security claims in an intermediate format. The STS is configured to retrieve the security claims provided by the account stores and includes built-in transformations for transforming each security claim from the intermediate format to formats associated with resource providers. The STS is further configured to provide extensibility points for custom claim transformations that are not available from the built-in transformations. The custom claim transformation modules are configured to perform at least one custom claim transformation.
    Type: Grant
    Filed: May 13, 2005
    Date of Patent: August 14, 2012
    Assignee: Microsoft Corporation
    Inventors: Ryan D. Johnson, Donald E. Schmidt, Jeffrey F. Spelman, Kahren Tevosyan, Vijayavani Nori
  • Publication number: 20120089833
    Abstract: An invention is described for securely deploying a provable identity for virtual machines (VMs) in a dynamic environment. In an embodiment, a fabric controller instructs a VM host to create a VM and sends that VM a secret. The fabric controller sends that same secret (or a second secret, such as the private key of a public/private key pair) to the security token service along with an instruction to make an account for the VM. The VM presents proof that it possesses the secret to the security token service and in return receives a full token. When a client connects to the deployment, it receives the public key from the security token service, which it trusts, and the full token from the VM. It validates the full token with the public key to determine that the VM has the identity that it purports to have.
    Type: Application
    Filed: October 8, 2010
    Publication date: April 12, 2012
    Applicant: Microsoft Corporation
    Inventors: Ian Jirka, Kahren Tevosyan, Corey Sanders, George M. Moore, Mohit Srivastava, Mark Eugene Russinovich
  • Patent number: 8108920
    Abstract: A system provides single sign-on capabilities for accessing a Web application through a passive client across multiple realms within a federation. A federation refers to different organizations or realms that have employed agreements, standards, and/or cooperative technologies to make user identity and entitlements portable between the organizations. Communications are redirected through a client in one realm to obtain a security token that can allow the resource server in the other realm to authenticate the user for access to the Web application.
    Type: Grant
    Filed: May 12, 2003
    Date of Patent: January 31, 2012
    Assignee: Microsoft Corporation
    Inventors: Jeffrey F. Spelman, Yordan Rouskov, Brendan W. Dixon, Matthew Hur, Josh Thomas Gray, Michael S. Dusche, Ryan D. Johnson, John Kahren Tevosyan
  • Patent number: 7748046
    Abstract: Systems and methods directed at transforming security claims in a federated authentication system using an intermediate format. The systems and methods described herein are directed at transforming security claims in a federated authentication system using an intermediate format. The federated authentication system includes an identity provider and a resource provider. The identity provider receives a request for information from the resource provider to authenticate an account by an application associated with the resource provider. A security claim associated with the account is retrieved where the security claim is provided by an account store in a format specific to the account store. The security claim is transformed from the account store specific format to an intermediate format. The security claim is then transformed from the intermediate format to a federated format recognized by the resource provider. The transformed security claim is provided in a security token to the resource provider.
    Type: Grant
    Filed: April 29, 2005
    Date of Patent: June 29, 2010
    Assignee: Microsoft Corporation
    Inventors: Ryan D. Johnson, Donald E. Schmidt, Jeffrey F. Spelman, Kahren Tevosyan, Vijayavani Nori
  • Patent number: 7702917
    Abstract: The described systems, methods, and data structures are directed at data transfer using Hyper-Text Transfer Protocol (HTTP) query strings. A block of data is partitioned into sections. Each section is encoded in a query string of a HTTP message. Each HTTP message is sent to a server by redirecting through a client. Multiple redirected messages are sent until the entire block of data is transferred to the server. The data block may be stored as a cookie on the client so that the data block does not have to persist on any server. Data transfer using HTTP query strings may be implemented to transfer a security token from a security token service (STS) server to an application server.
    Type: Grant
    Filed: November 19, 2004
    Date of Patent: April 20, 2010
    Assignee: Microsoft Corporation
    Inventors: Kahren Tevosyan, Matthew Hur, Ryan D Johnson, Donald E Schmidt, Jeffrey F Spelman
  • Patent number: 7603555
    Abstract: A system for authenticating computer users comprising a single active directory disposed in an intranet, a web server disposed in a DMZ associated with the intranet, and a web client coupled to the web server through an internet connection that is capable of signing on to the web server.
    Type: Grant
    Filed: June 30, 2005
    Date of Patent: October 13, 2009
    Assignee: Microsoft Corporation
    Inventors: Donald E. Schmidt, Ryan D. Johnson, Kahren Tevosyan, Jeffrey F. Spelman, Krishnanand Shenoy, Harini Raghavan, David R. Mowers, Matthew Hur
  • Publication number: 20070255958
    Abstract: This disclosure relates to the ability to use multiple claim transformation modules in a trust relationship. Claim transformation modules transform a claim or claim set into a transformed claim or claim set for use by a trusted partner and/or application. Multiple claim transformation modules may be given the opportunity to act on a claim or claim set in a pipelined fashion. In another embodiment, multiple claim transformation modules may exist, but only the proper claim transformation module(s) is(are) given the opportunity to act on a claim or claim set. In an embodiment, the claims involved are security claims used for authentication purposes between trust partners in a federated authentication system.
    Type: Application
    Filed: May 1, 2006
    Publication date: November 1, 2007
    Applicant: Microsoft Corporation
    Inventors: Donald Schmidt, Danver Hartop, Derek Del Conte, Jagadeesh Kalki, Jeffrey Spelman, Kahren Tevosyan, Ryan Johnson, Vijayavani Nori
  • Publication number: 20060259776
    Abstract: Systems and methods directed at enhancing the capability of a federated authentication system by configuring the system with extensibility points for adding new account stores and customizing claim transformations. The federated authentication system includes accounts stores, a security token service (STS), and custom claim transformation modules. The account stores are configured to maintain data associated with accounts and to provide security claims in an intermediate format. The STS is configured to retrieve the security claims provided by the account stores and includes built-in transformations for transforming each security claim from the intermediate format to formats associated with resource providers. The STS is further configured to provide extensibility points for custom claim transformations that are not available from the built-in transformations. The custom claim transformation modules are configured to perform at least one custom claim transformation.
    Type: Application
    Filed: May 13, 2005
    Publication date: November 16, 2006
    Applicant: Microsoft Corporation
    Inventors: Ryan Johnson, Donald Schmidt, Jeffrey Spelman, Kahren Tevosyan, Vijayavani Nori
  • Publication number: 20060248598
    Abstract: Systems and methods directed at transforming security claims in a federated authentication system using an intermediate format. The systems and methods described herein are directed at transforming security claims in a federated authentication system using an intermediate format. The federated authentication system includes an identity provider and a resource provider. The identity provider receives a request for information from the resource provider to authenticate an account by an application associated with the resource provider. A security claim associated with the account is retrieved where the security claim is provided by an account store in a format specific to the account store. The security claim is transformed from the account store specific format to an intermediate format. The security claim is then transformed from the intermediate format to a federated format recognized by the resource provider. The transformed security claim is provided in a security token to the resource provider.
    Type: Application
    Filed: April 29, 2005
    Publication date: November 2, 2006
    Applicant: Microsoft Corporation
    Inventors: Ryan Johnson, Donald Schmidt, Jeffrey Spelman, Kahren Tevosyan, Vijayavani Nori
  • Publication number: 20060123234
    Abstract: A system for authenticating computer users comprising a single active directory disposed in an intranet, a web server disposed in a DMZ associated with the intranet, and a web client coupled to the web server through an internet connection that is capable of signing on to the web server.
    Type: Application
    Filed: June 30, 2005
    Publication date: June 8, 2006
    Applicant: Microsoft Corporation
    Inventors: Donald Schmidt, Ryan Johnson, Kahren Tevosyan, Jeffrey Spelman, Krishnanand Shenoy, Harini Raghavan, David Mowers, Matthew Hur
  • Publication number: 20060123472
    Abstract: A system for authenticating computer users comprising, a single active directory disposed in a federated partner, a web server disposed in a DMZ associated with the intranet; and a client disposed in the federated partner coupled to the web server through an internet connection that is capable of signing on to the web server.
    Type: Application
    Filed: June 30, 2005
    Publication date: June 8, 2006
    Applicant: Microsoft Corporation
    Inventors: Donald Schmidt, Ryan Johnson, Kahren Tevosyan, Jeffrey Spelman, Krishnanand Shenoy, Harini Raghavan, David Mowers, Matthew Hur
  • Publication number: 20060112422
    Abstract: The described systems, methods, and data structures are directed at data transfer using Hyper-Text Transfer Protocol (HTTP) query strings. A block of data is partitioned into sections. Each section is encoded in a query string of a HTTP message. Each HTTP message is sent to a server by redirecting through a client. Multiple redirected messages are sent until the entire block of data is transferred to the server. The data block may be stored as a cookie on the client so that the data block does not have to persist on any server. Data transfer using HTTP query strings may be implemented to transfer a security token from a security token service (STS) server to an application server.
    Type: Application
    Filed: November 19, 2004
    Publication date: May 25, 2006
    Applicant: Microsoft Corporation
    Inventors: Kahren Tevosyan, Matthew Hur, Ryan Johnson, Donald Schmidt, Jeffrey Spelman
  • Publication number: 20040230831
    Abstract: A system provides single sign-on capabilities for accessing a Web application through a passive client across multiple realms within a federation. A federation refers to different organizations or realms that have employed agreements, standards, and/or cooperative technologies to make user identity and entitlements portable between the organizations. Communications are redirected through a client in one realm to obtain a security token that can allow the resource server in the other realm to authenticate the user for access to the Web application.
    Type: Application
    Filed: May 12, 2003
    Publication date: November 18, 2004
    Applicant: MICROSOFT CORPORATION
    Inventors: Jeffrey F. Spelman, Yordan Rouskov, Brendan W. Dixon, Matthew Hur, Josh Thomas Gray, Michael S. Dusche, Ryan D. Johnson, John Kahren Tevosyan