Patents by Inventor Kameshwar Jayaraman

Kameshwar Jayaraman has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20210216622
    Abstract: A computer implemented method is used for changing a password in a multi-domain environment. The method includes obtaining a private key and a public key from a security card at a user device in a user domain, transferring the public key to a controller in a secure domain, requesting a password change, receiving a public key encrypted new password from the secure domain, and decrypting the new password using the private key.
    Type: Application
    Filed: April 1, 2021
    Publication date: July 15, 2021
    Inventors: Kameshwar JAYARAMAN, Nicholas Elliot CLAUNCH, Priyanshu Kumar JHA, Shankaranand ARUNACHALAM
  • Patent number: 11044079
    Abstract: Systems, methods, and software technology for managing keys used to encrypt data at-rest and decrypt the data when serving requests for the data. In an implementation, a data service receives a request for data that has been encrypted at rest using a data key, wherein the data key has been encrypted using a policy key, and wherein the policy key has been encrypted using a root key. When the root key is unavailable, the data service requests a key service to decrypt the policy key using an alternative root key. When the data service receives the policy key in an unencrypted state from the key service, it decrypts the data key using the policy key and decrypts the data using the data key.
    Type: Grant
    Filed: April 19, 2019
    Date of Patent: June 22, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ayla Kol, Kameshwar Jayaraman, Yoganand Rajasekaran, Jaclynn Hiranaka, Girish Nagaraja, Nikhil Aggarwal, Paul Howard Rich
  • Patent number: 11023573
    Abstract: A computer implemented method is used for changing a password in a multi-domain environment. The method includes obtaining a private key and a public key from a security card at a user device in a user domain, transferring the public key to a controller in a secure domain, requesting a password change, receiving a public key encrypted new password from the secure domain, and decrypting the new password using the private key.
    Type: Grant
    Filed: April 20, 2018
    Date of Patent: June 1, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Kameshwar Jayaraman, Nicholas Elliot Claunch, Priyanshu Kumar Jha, Shankaranand Arunachalam
  • Publication number: 20210117561
    Abstract: Access to data and resources in a multi-tenant computing system is managed by tagging the data and resources with attributes, as well as by tagging users with attributes. Tenant-specific access policies are configured. When an access request is received from a workload, a policy decision engine processes the attributes that are tagged to the requesting workload (e.g., user, application, etc.) as well as those tagged to the requested data or resource, given a relevant tenant-specific policy. An access decision is provided in response to the access request, and the access decision can be enforced by a tenant-specific enforcement system.
    Type: Application
    Filed: October 22, 2019
    Publication date: April 22, 2021
    Inventors: Daniel John CARROLL, JR., Kameshwar Jayaraman, Stuart Kwan, Kartik Tirunelveli Kanakasabesan, Shefali Gulati, Charles Glenn Jeffries, Ganesh Pandey, Roberto Carlos Taboada, Parul Manek, Steven Mark Silverberg
  • Publication number: 20210044597
    Abstract: A request to perform a command or operation on a computing system is received from a support user. A clearance level needed to perform that requested command or operation is identified, and a data store that has a pool of cleared users is accessed to identify a cleared user that has an adequate clearance level. The secured user is assigned to the request. A risk level, corresponding to the requested command or operation is identified and surfaced for the secured user. The requested command or operation can be automatically executed, after it is authorized by the secured user.
    Type: Application
    Filed: August 7, 2019
    Publication date: February 11, 2021
    Inventors: Soumit Rahman, Ganesh Pandey, Curtis Thibault, Kameshwar Jayaraman, Ajay Kalidindi, Ayla Kol, Yeshua Garcia, Priyanshu Kumar Jha, Parul Manek, Yoganand Rajasekaran
  • Publication number: 20210029142
    Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The control message processing system performs investigation tasks within the workspace. A secure log generation system captures information corresponding to the tasks and generates an event record based on the captured information.
    Type: Application
    Filed: July 26, 2019
    Publication date: January 28, 2021
    Inventors: Yoganand RAJASEKARAN, Raquibur RAHMAN, Ayla KOL, Philip Ross MOYER, Brijesh Bhupendra DESAI, Zijun HAO, Mainul MIZAN, Kameshwar JAYARAMAN, Benjamin DU, Ganesh PANDEY, Parul MANEK
  • Publication number: 20210029128
    Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that is a user-facing system and receives requests to prepare for an incident investigation. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. The request processing system does not access the workspace and the control message processing system is not available for external access by a user. Data and functionality are ingested into the workspace. The control message processing system performs investigation preparation tasks within the workspace. The results of the investigation tasks are surfaced for user access.
    Type: Application
    Filed: July 26, 2019
    Publication date: January 28, 2021
    Inventors: Yoganand RAJASEKARAN, Raquibur RAHMAN, Ayla KOL, Philip Ross MOYER, Brijesh Bhupendra DESAI, Zijun HAO, Mainul MIZAN, Kameshwar JAYARAMAN, Benjamin DU, Ganesh PANDEY, Parul MANEK
  • Publication number: 20210026674
    Abstract: A secure investigation platform in a sovereign cloud includes a request processing system that receives requests to investigate an incident. A control message processing system creates a workspace, within the sovereign cloud, so that an investigation can be conducted within that workspace. An investigation pack, which includes investigative resources used in the investigation, is identified and the workspace is pre-configured with the identified investigation pack. The control message processing system performs investigation tasks within the workspace using the investigation pack.
    Type: Application
    Filed: July 26, 2019
    Publication date: January 28, 2021
    Inventors: YOGANAND RAJASEKARAN, RAQUIBUR RAHMAN, AYLA KOL, PHILIP ROSS MOYER, BRIJESH BHUPENDRA DESAI, ZIJUN HAO, MAINUL MIZAN, KAMESHWAR JAYARAMAN, BENJAMIN DU, PARUL MANEK, GANESH PANDEY
  • Publication number: 20200099519
    Abstract: Systems, methods, and software technology for managing keys used to encrypt data at-rest and decrypt the data when serving requests for the data. In an implementation, a data service receives a request for data that has been encrypted at rest using a data key, wherein the data key has been encrypted using a policy key, and wherein the policy key has been encrypted using a root key. When the root key is unavailable, the data service requests a key service to decrypt the policy key using an alternative root key. When the data service receives the policy key in an unencrypted state from the key service, it decrypts the data key using the policy key and decrypts the data using the data key.
    Type: Application
    Filed: April 19, 2019
    Publication date: March 26, 2020
    Inventors: Ayla Kol, Kameshwar Jayaraman, Yoganand Rajasekaran, Jaclynn Hiranaka, Girish Nagaraja, Nikhil Aggarwal, Paul Howard Rich
  • Publication number: 20190325130
    Abstract: A computer implemented method is used for changing a password in a multi-domain environment. The method includes obtaining a private key and a public key from a security card at a user device in a user domain, transferring the public key to a controller in a secure domain, requesting a password change, receiving a public key encrypted new password from the secure domain, and decrypting the new password using the private key.
    Type: Application
    Filed: April 20, 2018
    Publication date: October 24, 2019
    Inventors: Kameshwar Jayaraman, Nicholas Elliot Claunch, Priyanshu Kumar Jha, Shankaranand Arunachalam
  • Patent number: 9996618
    Abstract: Technologies are described herein for locating relevant content items across multiple disparate content sources. Query parameters are received from a user interface for defining a query for searching a number of content sources located on multiple, disparate content servers. A native search is executed on each of the content servers based on the received query parameters, and query statistics and other data regarding content items in the content sources matching the query parameters are received. The query statistics are aggregated across the content servers and presented in the user interface. The presentation of the query statistics may be broken out by each content source, by each query phrase segmented from the query, and the like. In addition, a preview of a number of content items matching the query parameters is presented based on the data received.
    Type: Grant
    Filed: July 1, 2016
    Date of Patent: June 12, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Bradley Stevenson, Adam David Harmetz, Quentin Gary Christensen, Julian Zbogar Smith, Anupama Janardhan, Carlos David Argott Hernandez, Ramanathan Somasundaram, Benjamin Joseph Rinaca, Fan Mao, Graham Lee McMynn, Jessica Anne Alspaugh, Michal Piaseczny, Tudor Baraboi, Ashish Shrikrishna Malgi, Thottam R. Sriram, Zainal Arifin, John D. Fan, Kameshwar Jayaraman
  • Patent number: 9817898
    Abstract: Technologies are described herein for locating relevant content items across multiple disparate content sources. Query parameters are received from a user interface for defining a query for searching a number of content sources located on multiple, disparate content servers. A native search is executed on each of the content servers based on the received query parameters, and query statistics and other data regarding content items in the content sources matching the query parameters are received. The query statistics are aggregated across the content servers and presented in the user interface. The presentation of the query statistics may be broken out by each content source, by each query phrase segmented from the query, and the like. In addition, a preview of a number of content items matching the query parameters is presented based on the data received.
    Type: Grant
    Filed: November 14, 2011
    Date of Patent: November 14, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Bradley Stevenson, Adam David Harmetz, Quentin Gary Christensen, Julian Zbogar Smith, Anupama Janardhan, Carlos David Argott Hernandez, Ramanathan Somasundaram, Benjamin Joseph Rinaca, Fan Mao, Graham Lee McMynn, Jessica Anne Alspaugh, Michal Piaseczny, Tudor Baraboi, Ashish Shrikrishna Malgi, Thottam R. Sriram, Zainal Arifin, John D. Fan, Kameshwar Jayaraman
  • Publication number: 20170032039
    Abstract: Technologies are described herein for locating relevant content items across multiple disparate content sources. Query parameters are received from a user interface for defining a query for searching a number of content sources located on multiple, disparate content servers. A native search is executed on each of the content servers based on the received query parameters, and query statistics and other data regarding content items in the content sources matching the query parameters are received. The query statistics are aggregated across the content servers and presented in the user interface. The presentation of the query statistics may be broken out by each content source, by each query phrase segmented from the query, and the like. In addition, a preview of a number of content items matching the query parameters is presented based on the data received.
    Type: Application
    Filed: July 1, 2016
    Publication date: February 2, 2017
    Inventors: Bradley Stevenson, Adam David Harmetz, Quentin Gary Christensen, Julian Zbogar Smith, Anupama Janardhan, Carlos David Argott Hernandez, Ramanathan Somasundaram, Benjamin Joseph Rinaca, Fan Mao, Graham Lee McMynn, Jessica Anne Alspaugh, Michal Piaseczny, Tudor Baraboi, Ashish Shrikrishna Malgi, Thottam R. Sriram, Zainal Arifin, John D. Fan, Kameshwar Jayaraman
  • Publication number: 20130124552
    Abstract: Technologies are described herein for locating relevant content items across multiple disparate content sources. Query parameters are received from a user interface for defining a query for searching a number of content sources located on multiple, disparate content servers. A native search is executed on each of the content servers based on the received query parameters, and query statistics and other data regarding content items in the content sources matching the query parameters are received. The query statistics are aggregated across the content servers and presented in the user interface. The presentation of the query statistics may be broken out by each content source, by each query phrase segmented from the query, and the like. In addition, a preview of a number of content items matching the query parameters is presented based on the data received.
    Type: Application
    Filed: November 14, 2011
    Publication date: May 16, 2013
    Applicant: Microsoft Corporation
    Inventors: Bradley Stevenson, Adam David Harmetz, Quentin Gary Christensen, Julian Zbogar Smith, Anupama Janardhan, Carlos David Argott Hernandez, Ramanathan Somasundaram, Benjamin Joseph Rinaca, Fan Mao, Graham Lee McMynn, Jessica Anne Alspaugh, Michal Piaseczny, Tudor Baraboi, Ashish Shrikrishna Malgi, Thottam R. Sriram, Zainal Arifin, John D. Fan, Kameshwar Jayaraman