Patents by Inventor Kedarnath A. Dubhashi

Kedarnath A. Dubhashi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100212016
    Abstract: Various embodiments provide content protection interoperability techniques which support secure distribution of content for multiple content protection technologies. In one or more embodiments a source digital rights management (DRM) system can associate trust data with content to be exported to a target digital rights management (DRM) system. The trust data describes a trust state for the content to enable the target DRM system to maintain the trust state for the exported content. In at least some embodiments, the source DRM system can also associate tracing data with the content to, in the event of a breach in the chain of trust, enable an identification to be made of a source of the exported content and/or a party responsible for exporting the content.
    Type: Application
    Filed: February 18, 2009
    Publication date: August 19, 2010
    Applicant: Microsoft Corporation
    Inventors: Kedarnath A. Dubhashi, Kenneth S. Reneris, John C. Simmons
  • Publication number: 20100191974
    Abstract: Various embodiments for software application verification are disclosed. Software application verification applies digital rights management to applications that run protected content on a playback device. In this way, protected content may be provided to approved applications and withheld from applications that have not been approved to run the protected content.
    Type: Application
    Filed: January 28, 2009
    Publication date: July 29, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Kedarnath A. Dubhashi, John Bocharov, Hany Farag, Gilles Khouzam, Kiran Kumar
  • Patent number: 7636851
    Abstract: An operating system for a computing device has a first session for a user that includes a first base process that has a first privileges token attached thereto. The first privileges token includes substantially a full set of privileges of the user on the operating system. The operating system also has a second session for the user that includes a second base process that has a second privileges token attached thereto. The second privileges token is derived from the first privileges token and includes only a minimum set of privileges of the user on the operating system. Thus, the second, limited token does not have all privileges associated with the first, full token but instead has a limited set of privileges and not extra privileges that could be employed to take actions that would be harmful, deceptive, or malicious.
    Type: Grant
    Filed: June 30, 2005
    Date of Patent: December 22, 2009
    Assignee: Microsoft Corporation
    Inventors: Jeffrey B. Hamblin, Jonathan Schwartz, Kedarnath A. Dubhashi, Klaus U. Schutz, Peter T. Brundrett, Richard B. Ward, Thomas C. Jones
  • Publication number: 20090310789
    Abstract: Various embodiments enable so-called extended data to be added to a signed digital certificate without having a private key of a Certification Authority available. In at least some embodiments, a digital certificate can be issued and signed off line by the Certification Authority, and then later extended data can be added and signed using another key, whose public key was earlier embedded and signed in the certificate.
    Type: Application
    Filed: June 11, 2008
    Publication date: December 17, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Yu Lin Sie, Kedarnath A. Dubhashi, Anand D. Paka
  • Publication number: 20090307780
    Abstract: Various embodiments utilize a third party, such as a trusted third-party, to perform DRM operations such as “move” operations. In at least some embodiments, the trusted third-party is utilized for both “move” operations as well as local content access such as playback and the like. In at least some embodiments, a third-party maintains a database that includes an association of clients, content, and move version numbers. A client—termed a “source client” maintains at least a move version number locally in a secure fashion. The version number is incremented each time the source client performs a move operation. Both the source client and the third-party increment the version number each time a piece of content is moved. When the client attempts to perform a move operation, it contacts the third-party to ascertain the third-party's move version number. If the move version numbers match and the source client owns the license/content, then, in at least some embodiments, a move operation is permitted.
    Type: Application
    Filed: June 4, 2008
    Publication date: December 10, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Kedarnath A. Dubhashi, Kenneth S. Reneris
  • Publication number: 20090307254
    Abstract: Various embodiments provide a mapping layer to translate DRM system requirements from one DRM system, such as a source system, to another DRM system, such as a target system. In at least some embodiments, DRM system requirement translation is performed using a signed data structure that maps DRM system requirements from one DRM system to one or more other DRM systems. By mapping DRM system requirements from one system to another, licenses associated with DRM-protected content and associated content can be safely transferred between systems.
    Type: Application
    Filed: June 4, 2008
    Publication date: December 10, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Kedarnath A. Dubhashi, Sumedh N. Barde, Hany Farag
  • Publication number: 20090265178
    Abstract: Various embodiments described above can enable referral lists to be used in connection with distributed content to protect a referral infrastructure that is used with such content. In at least some embodiments, referral lists are protected using digital rights management (DRM) techniques. The DRM techniques can be used for a number of purposes including securely establishing a referring consumer, securely maintaining a chain of referring entities through distribution tracking, and maintaining control over the referral lists associated with distributed content. In at least some embodiments, DRM techniques are utilized to protect referral lists that are used in multi-level marketing networks.
    Type: Application
    Filed: April 16, 2008
    Publication date: October 22, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Clifford P. Strom, Quintin S. Burns, Kedarnath A. Dubhashi, Shalendra Chhabra
  • Publication number: 20090192943
    Abstract: This document describes tools capable of renewing an expired license to entertainment content. The tools, in some embodiments, may repeatedly renew a license using very little resources, such as by forgoing retention of the license, encryption keys, or the entertainment content between renewals. The tools, for example, may provide a license to a particular content receiver (e.g., a laptop computer), and, when that license expires, renew the license with as little as a single retained secret. By so doing the tools enable, among other things, fewer computing resources to be used in renewing a license while maintaining the security of that license's entertainment content.
    Type: Application
    Filed: January 28, 2008
    Publication date: July 30, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Kedarnath A. Dubhashi, Kenneth S. Reneris
  • Publication number: 20090183010
    Abstract: This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing device in a cryptographically secure manner without requiring the movable component to perform a complex cryptographic function. By so doing the mobile computing device may request access to content and receive permission to use the content quickly and in a cryptographically robust way.
    Type: Application
    Filed: January 14, 2008
    Publication date: July 16, 2009
    Applicant: Microsoft Corporation
    Inventors: Patrik Schnell, Alexandre V. Grigorovitch, Kedarnath A. Dubhashi
  • Patent number: 7464270
    Abstract: The restriction of particular resources includes providing a digital signature for unauthorized resources based on a structure-related parameter of the resource. Thus, attempts at circumventing recognition of such resource will likely result in altering the overall functionality of the resource. Further, such digital signatures are encoded in a critical file required for loading of a resource, thus ensuring that the identity of the resource is considered before execution thereof. Enforcement of the resource restriction includes generating a verification signature for a resource that requests loading. The verification signature is compared to the signature coded into the critical file, and a positive match results in the resource being blocked from loading.
    Type: Grant
    Filed: July 23, 2003
    Date of Patent: December 9, 2008
    Assignee: Microsoft Corporation
    Inventors: Vishnu A. Patankar, Robert Reichel, John J. Lambert, Kedarnath A. Dubhashi, Jim E. Thatcher
  • Publication number: 20080294894
    Abstract: Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices (“stores”), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host.
    Type: Application
    Filed: May 24, 2007
    Publication date: November 27, 2008
    Applicant: Microsoft Corporation
    Inventors: Kedarnath A. Dubhashi, James M. Alkove, Patrik Schnell, Alexandre V. Grigorovitch, Vikram Mangalore
  • Publication number: 20080256646
    Abstract: Techniques enable seamless movement and consumption of licensed digital content amongst multiple devices. In some embodiments, these techniques allow establishment of a domain capable of having multiple member devices. Each member device of the domain typically comprises a content-consuming device such as a personal computer, a portable media player, or the like. These techniques enable a license associated with digital content to bind to a domain rather than an individual device. As such, each member device of the domain may contain a domain identity and, with the identity, may consume the content with use of the license and in accordance with policy described in the license. These tools may also enable a member device to join multiple domains and to contain an identification of each of these multiple domains.
    Type: Application
    Filed: April 12, 2007
    Publication date: October 16, 2008
    Applicant: Microsoft Corporation
    Inventors: Clifford P. Strom, Patrik Schnell, Benjamin Brooks Cutter, Quintin S. Burns, Milan M. Gada, Kevin Lau, Adrian J. Oney, Kedarnath A. Dubhashi
  • Publication number: 20080256592
    Abstract: Techniques enable building a collection of data that defines an asset, with the data possibly having differing data types. These techniques are then capable of assigning arbitrary policy to that asset, regardless of which data types are present within the asset. In addition, these techniques enable packaging of this first asset with one or more additional assets in a self-contained envelope. Each asset within the envelope may similarly include data of differing data types. Furthermore, each of these assets may be assigned a policy that may be different than the policy assigned to the first asset. This envelope, or a collection of envelopes, may then be provided to a content-consuming device to consume the assets in accordance with each asset's specified policy.
    Type: Application
    Filed: April 12, 2007
    Publication date: October 16, 2008
    Applicant: Microsoft Corporation
    Inventors: Patrik Schnell, Clifford P. Strom, Kedarnath A. Dubhashi, Daniel Rosenstein, Mark L. Beaubien, Alex McKelvey, Alexandre V. Grigorovitch, Anand Paka, Satvir Randhawa
  • Patent number: 7434257
    Abstract: A dynamic authorization callback mechanism is provided that implements a dynamic authorization model. An application can thus implement virtually any authorization policy by utilizing dynamic data and flexible policy algorithms inherent in the dynamic authorization model. Dynamic data, such as client operation parameter values, client attributes stored in a time-varying or updateable data store, run-time or environmental factors such as time-of-day, and any other static or dynamic data that is managed or retrievable by the application may be evaluated in connection with access control decisions. Hence, applications may define and implement business rules that can be expressed in terms of run-time operations and dynamic data. An application thus has substantial flexibility in defining and implementing custom authorization policy, and at the same time provides standard definitions for such dynamic data and policy.
    Type: Grant
    Filed: May 4, 2001
    Date of Patent: October 7, 2008
    Assignee: Microsoft Corporation
    Inventors: Praerit Garg, Robert P. Reichel, Richard B. Ward, Kedarnath A. Dubhashi, Jeffrey B. Hamblin, Anne C. Hopkins
  • Patent number: 7370050
    Abstract: A system that generates a per user abstraction of a store from a connection point. Filtering a view set of a hierarchically secured containment hierarchy based on the access permissions of the principal is one of the novel features of the invention. The invention can offer a collection of primitives that can operate on this aggregation that span multiple container hierarchies with potentially heterogeneous security descriptors. The model can reduce the necessity to traverse the container hierarchy to discover all the accessible items in a domain.
    Type: Grant
    Filed: June 28, 2005
    Date of Patent: May 6, 2008
    Assignee: Microsoft Corporation
    Inventors: Jason T. Hunter, Simon Skaria, Kedarnath A. Dubhashi
  • Publication number: 20080021901
    Abstract: Various mechanisms are provided for the lockdown of an item store. For example, a method is provided that comprises of disabling access to a relational engine for a set of users associated with a filing system utilizing the relational engine to manipulate data in an item store. Following such disabling of access, an exception is created by allowing access to the relational engine for users of the filing system based on a set of privileges the users have been assigned. The disabling of access can be accomplished by removing system users from ownership roles, and the allowing of access can be accomplished by providing certificates to users that have associated set of privileges granted to the users.
    Type: Application
    Filed: July 19, 2006
    Publication date: January 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Simon Skaria, Jason T. Hunter, Kedarnath A. Dubhashi
  • Patent number: 7248691
    Abstract: A hashing structure including multiple sub-hashes is used to determine whether an input value matches one or more of multiple target values. These values can be of any form, such as security identifiers in an access control system. To make the determination, a hash key is obtained from the input value and multiple sub-hash indexes (one for each of the multiple sub-hashes) are generated based on the key. Values are identified from the multiple sub-hashes by indexing into the sub-hashes using respective ones of the sub-hash indexes. These values are then combined to generate a resultant hash value. Each of the multiple target values corresponds to one of multiple portions of the resultant hash value. If the portion corresponding to one of the target values has a particular value, then that target value is a likely match and is compared to the input value to determine if indeed the two match.
    Type: Grant
    Filed: October 31, 2000
    Date of Patent: July 24, 2007
    Assignee: Microsoft Corporation
    Inventors: Bhalchandra S. Pandit, Robert P. Reichel, Jeffrey B. Hamblin, Kedarnath A. Dubhashi
  • Publication number: 20070136578
    Abstract: An item inheritance system and method are provided. The item inheritance system can be employed to propagate access control information (e.g., an access control list) to one or more item(s), thus facilitating security of item(s). At least one of the item(s) is a compound item. The item inheritance system includes an input component that receives information associated with one or more items. The items can include container(s), object(s) and/or compound item(s). The system can be triggered by a change in security policy to the item(s), for example, adding and/or deleting a user's access to the item(s). Additionally, moving and/or copying a collection of items can further trigger the system. The system further includes a propagation component that propagates access control information to the item(s). For example, the propagation component can enforce the ACL propagation policies when a change to the security descriptor takes place at the root of a hierarchy.
    Type: Application
    Filed: December 13, 2005
    Publication date: June 14, 2007
    Applicant: Microsoft Corporation
    Inventors: Kedarnath Dubhashi, Balan Raman, Paul Leach, Prasanna Krishnan
  • Publication number: 20070005961
    Abstract: An operating system for a computing device has a first session for a user that includes a first base process that has a first privileges token attached thereto. The first privileges token includes substantially a full set of privileges of the user on the operating system. The operating system also has a second session for the user that includes a second base process that has a second privileges token attached thereto. The second privileges token is derived from the first privileges token and includes only a minimum set of privileges of the user on the operating system. Thus, the second, limited token does not have all privileges associated with the first, full token but instead has a limited set of privileges and not extra privileges that could be employed to take actions that would be harmful, deceptive, or malicious.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Jeffrey Hamblin, Jonathan Schwartz, Kedarnath Dubhashi, Klaus Schutz, Peter Brundrett, Richard Ward, Thomas Jones
  • Publication number: 20060195449
    Abstract: A system that generates a per user abstraction of a store from a connection point. Filtering a view set of a hierarchically secured containment hierarchy based on the access permissions of the principal is one of the novel features of the invention. The invention can offer a collection of primitives that can operate on this aggregation that span multiple container hierarchies with potentially heterogeneous security descriptors. The model can reduce the necessity to traverse the container hierarchy to discover all the accessible items in a domain.
    Type: Application
    Filed: June 28, 2005
    Publication date: August 31, 2006
    Applicant: Microsoft Corporation
    Inventors: Jason Hunter, Simon Skaria, Kedarnath Dubhashi