Patents by Inventor Kedarnath Dubhashi
Kedarnath Dubhashi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20100212016Abstract: Various embodiments provide content protection interoperability techniques which support secure distribution of content for multiple content protection technologies. In one or more embodiments a source digital rights management (DRM) system can associate trust data with content to be exported to a target digital rights management (DRM) system. The trust data describes a trust state for the content to enable the target DRM system to maintain the trust state for the exported content. In at least some embodiments, the source DRM system can also associate tracing data with the content to, in the event of a breach in the chain of trust, enable an identification to be made of a source of the exported content and/or a party responsible for exporting the content.Type: ApplicationFiled: February 18, 2009Publication date: August 19, 2010Applicant: Microsoft CorporationInventors: Kedarnath A. Dubhashi, Kenneth S. Reneris, John C. Simmons
-
Publication number: 20100191974Abstract: Various embodiments for software application verification are disclosed. Software application verification applies digital rights management to applications that run protected content on a playback device. In this way, protected content may be provided to approved applications and withheld from applications that have not been approved to run the protected content.Type: ApplicationFiled: January 28, 2009Publication date: July 29, 2010Applicant: MICROSOFT CORPORATIONInventors: Kedarnath A. Dubhashi, John Bocharov, Hany Farag, Gilles Khouzam, Kiran Kumar
-
Patent number: 7636851Abstract: An operating system for a computing device has a first session for a user that includes a first base process that has a first privileges token attached thereto. The first privileges token includes substantially a full set of privileges of the user on the operating system. The operating system also has a second session for the user that includes a second base process that has a second privileges token attached thereto. The second privileges token is derived from the first privileges token and includes only a minimum set of privileges of the user on the operating system. Thus, the second, limited token does not have all privileges associated with the first, full token but instead has a limited set of privileges and not extra privileges that could be employed to take actions that would be harmful, deceptive, or malicious.Type: GrantFiled: June 30, 2005Date of Patent: December 22, 2009Assignee: Microsoft CorporationInventors: Jeffrey B. Hamblin, Jonathan Schwartz, Kedarnath A. Dubhashi, Klaus U. Schutz, Peter T. Brundrett, Richard B. Ward, Thomas C. Jones
-
Publication number: 20090310789Abstract: Various embodiments enable so-called extended data to be added to a signed digital certificate without having a private key of a Certification Authority available. In at least some embodiments, a digital certificate can be issued and signed off line by the Certification Authority, and then later extended data can be added and signed using another key, whose public key was earlier embedded and signed in the certificate.Type: ApplicationFiled: June 11, 2008Publication date: December 17, 2009Applicant: MICROSOFT CORPORATIONInventors: Yu Lin Sie, Kedarnath A. Dubhashi, Anand D. Paka
-
Publication number: 20090307780Abstract: Various embodiments utilize a third party, such as a trusted third-party, to perform DRM operations such as “move” operations. In at least some embodiments, the trusted third-party is utilized for both “move” operations as well as local content access such as playback and the like. In at least some embodiments, a third-party maintains a database that includes an association of clients, content, and move version numbers. A client—termed a “source client” maintains at least a move version number locally in a secure fashion. The version number is incremented each time the source client performs a move operation. Both the source client and the third-party increment the version number each time a piece of content is moved. When the client attempts to perform a move operation, it contacts the third-party to ascertain the third-party's move version number. If the move version numbers match and the source client owns the license/content, then, in at least some embodiments, a move operation is permitted.Type: ApplicationFiled: June 4, 2008Publication date: December 10, 2009Applicant: MICROSOFT CORPORATIONInventors: Kedarnath A. Dubhashi, Kenneth S. Reneris
-
Publication number: 20090307254Abstract: Various embodiments provide a mapping layer to translate DRM system requirements from one DRM system, such as a source system, to another DRM system, such as a target system. In at least some embodiments, DRM system requirement translation is performed using a signed data structure that maps DRM system requirements from one DRM system to one or more other DRM systems. By mapping DRM system requirements from one system to another, licenses associated with DRM-protected content and associated content can be safely transferred between systems.Type: ApplicationFiled: June 4, 2008Publication date: December 10, 2009Applicant: MICROSOFT CORPORATIONInventors: Kedarnath A. Dubhashi, Sumedh N. Barde, Hany Farag
-
Publication number: 20090265178Abstract: Various embodiments described above can enable referral lists to be used in connection with distributed content to protect a referral infrastructure that is used with such content. In at least some embodiments, referral lists are protected using digital rights management (DRM) techniques. The DRM techniques can be used for a number of purposes including securely establishing a referring consumer, securely maintaining a chain of referring entities through distribution tracking, and maintaining control over the referral lists associated with distributed content. In at least some embodiments, DRM techniques are utilized to protect referral lists that are used in multi-level marketing networks.Type: ApplicationFiled: April 16, 2008Publication date: October 22, 2009Applicant: MICROSOFT CORPORATIONInventors: Clifford P. Strom, Quintin S. Burns, Kedarnath A. Dubhashi, Shalendra Chhabra
-
Publication number: 20090192943Abstract: This document describes tools capable of renewing an expired license to entertainment content. The tools, in some embodiments, may repeatedly renew a license using very little resources, such as by forgoing retention of the license, encryption keys, or the entertainment content between renewals. The tools, for example, may provide a license to a particular content receiver (e.g., a laptop computer), and, when that license expires, renew the license with as little as a single retained secret. By so doing the tools enable, among other things, fewer computing resources to be used in renewing a license while maintaining the security of that license's entertainment content.Type: ApplicationFiled: January 28, 2008Publication date: July 30, 2009Applicant: MICROSOFT CORPORATIONInventors: Kedarnath A. Dubhashi, Kenneth S. Reneris
-
Publication number: 20090183010Abstract: This document describes tools capable of enabling cloud-based movable-component binding. The tools, in some embodiments, bind protected media content to a movable component in a mobile computing device in a cryptographically secure manner without requiring the movable component to perform a complex cryptographic function. By so doing the mobile computing device may request access to content and receive permission to use the content quickly and in a cryptographically robust way.Type: ApplicationFiled: January 14, 2008Publication date: July 16, 2009Applicant: Microsoft CorporationInventors: Patrik Schnell, Alexandre V. Grigorovitch, Kedarnath A. Dubhashi
-
Patent number: 7464270Abstract: The restriction of particular resources includes providing a digital signature for unauthorized resources based on a structure-related parameter of the resource. Thus, attempts at circumventing recognition of such resource will likely result in altering the overall functionality of the resource. Further, such digital signatures are encoded in a critical file required for loading of a resource, thus ensuring that the identity of the resource is considered before execution thereof. Enforcement of the resource restriction includes generating a verification signature for a resource that requests loading. The verification signature is compared to the signature coded into the critical file, and a positive match results in the resource being blocked from loading.Type: GrantFiled: July 23, 2003Date of Patent: December 9, 2008Assignee: Microsoft CorporationInventors: Vishnu A. Patankar, Robert Reichel, John J. Lambert, Kedarnath A. Dubhashi, Jim E. Thatcher
-
Publication number: 20080294894Abstract: Systems, methods, and/or techniques (“tools”) for binding content licenses to portable storage devices are described. In connection with binding the content licenses to the portable storage devices (“stores”), a host may perform authentication protocols that include generating a nonce, sending the nonce to a store, and receiving a session key from the store, with the session key being generated using the nonce. The store may perform authentication protocols that include receiving the nonce from the host, generating a random session key based on the nonce, and sending the session key to the host.Type: ApplicationFiled: May 24, 2007Publication date: November 27, 2008Applicant: Microsoft CorporationInventors: Kedarnath A. Dubhashi, James M. Alkove, Patrik Schnell, Alexandre V. Grigorovitch, Vikram Mangalore
-
Publication number: 20080256646Abstract: Techniques enable seamless movement and consumption of licensed digital content amongst multiple devices. In some embodiments, these techniques allow establishment of a domain capable of having multiple member devices. Each member device of the domain typically comprises a content-consuming device such as a personal computer, a portable media player, or the like. These techniques enable a license associated with digital content to bind to a domain rather than an individual device. As such, each member device of the domain may contain a domain identity and, with the identity, may consume the content with use of the license and in accordance with policy described in the license. These tools may also enable a member device to join multiple domains and to contain an identification of each of these multiple domains.Type: ApplicationFiled: April 12, 2007Publication date: October 16, 2008Applicant: Microsoft CorporationInventors: Clifford P. Strom, Patrik Schnell, Benjamin Brooks Cutter, Quintin S. Burns, Milan M. Gada, Kevin Lau, Adrian J. Oney, Kedarnath A. Dubhashi
-
Publication number: 20080256592Abstract: Techniques enable building a collection of data that defines an asset, with the data possibly having differing data types. These techniques are then capable of assigning arbitrary policy to that asset, regardless of which data types are present within the asset. In addition, these techniques enable packaging of this first asset with one or more additional assets in a self-contained envelope. Each asset within the envelope may similarly include data of differing data types. Furthermore, each of these assets may be assigned a policy that may be different than the policy assigned to the first asset. This envelope, or a collection of envelopes, may then be provided to a content-consuming device to consume the assets in accordance with each asset's specified policy.Type: ApplicationFiled: April 12, 2007Publication date: October 16, 2008Applicant: Microsoft CorporationInventors: Patrik Schnell, Clifford P. Strom, Kedarnath A. Dubhashi, Daniel Rosenstein, Mark L. Beaubien, Alex McKelvey, Alexandre V. Grigorovitch, Anand Paka, Satvir Randhawa
-
Patent number: 7434257Abstract: A dynamic authorization callback mechanism is provided that implements a dynamic authorization model. An application can thus implement virtually any authorization policy by utilizing dynamic data and flexible policy algorithms inherent in the dynamic authorization model. Dynamic data, such as client operation parameter values, client attributes stored in a time-varying or updateable data store, run-time or environmental factors such as time-of-day, and any other static or dynamic data that is managed or retrievable by the application may be evaluated in connection with access control decisions. Hence, applications may define and implement business rules that can be expressed in terms of run-time operations and dynamic data. An application thus has substantial flexibility in defining and implementing custom authorization policy, and at the same time provides standard definitions for such dynamic data and policy.Type: GrantFiled: May 4, 2001Date of Patent: October 7, 2008Assignee: Microsoft CorporationInventors: Praerit Garg, Robert P. Reichel, Richard B. Ward, Kedarnath A. Dubhashi, Jeffrey B. Hamblin, Anne C. Hopkins
-
Patent number: 7370050Abstract: A system that generates a per user abstraction of a store from a connection point. Filtering a view set of a hierarchically secured containment hierarchy based on the access permissions of the principal is one of the novel features of the invention. The invention can offer a collection of primitives that can operate on this aggregation that span multiple container hierarchies with potentially heterogeneous security descriptors. The model can reduce the necessity to traverse the container hierarchy to discover all the accessible items in a domain.Type: GrantFiled: June 28, 2005Date of Patent: May 6, 2008Assignee: Microsoft CorporationInventors: Jason T. Hunter, Simon Skaria, Kedarnath A. Dubhashi
-
Publication number: 20080021901Abstract: Various mechanisms are provided for the lockdown of an item store. For example, a method is provided that comprises of disabling access to a relational engine for a set of users associated with a filing system utilizing the relational engine to manipulate data in an item store. Following such disabling of access, an exception is created by allowing access to the relational engine for users of the filing system based on a set of privileges the users have been assigned. The disabling of access can be accomplished by removing system users from ownership roles, and the allowing of access can be accomplished by providing certificates to users that have associated set of privileges granted to the users.Type: ApplicationFiled: July 19, 2006Publication date: January 24, 2008Applicant: Microsoft CorporationInventors: Simon Skaria, Jason T. Hunter, Kedarnath A. Dubhashi
-
Patent number: 7248691Abstract: A hashing structure including multiple sub-hashes is used to determine whether an input value matches one or more of multiple target values. These values can be of any form, such as security identifiers in an access control system. To make the determination, a hash key is obtained from the input value and multiple sub-hash indexes (one for each of the multiple sub-hashes) are generated based on the key. Values are identified from the multiple sub-hashes by indexing into the sub-hashes using respective ones of the sub-hash indexes. These values are then combined to generate a resultant hash value. Each of the multiple target values corresponds to one of multiple portions of the resultant hash value. If the portion corresponding to one of the target values has a particular value, then that target value is a likely match and is compared to the input value to determine if indeed the two match.Type: GrantFiled: October 31, 2000Date of Patent: July 24, 2007Assignee: Microsoft CorporationInventors: Bhalchandra S. Pandit, Robert P. Reichel, Jeffrey B. Hamblin, Kedarnath A. Dubhashi
-
Publication number: 20070136578Abstract: An item inheritance system and method are provided. The item inheritance system can be employed to propagate access control information (e.g., an access control list) to one or more item(s), thus facilitating security of item(s). At least one of the item(s) is a compound item. The item inheritance system includes an input component that receives information associated with one or more items. The items can include container(s), object(s) and/or compound item(s). The system can be triggered by a change in security policy to the item(s), for example, adding and/or deleting a user's access to the item(s). Additionally, moving and/or copying a collection of items can further trigger the system. The system further includes a propagation component that propagates access control information to the item(s). For example, the propagation component can enforce the ACL propagation policies when a change to the security descriptor takes place at the root of a hierarchy.Type: ApplicationFiled: December 13, 2005Publication date: June 14, 2007Applicant: Microsoft CorporationInventors: Kedarnath Dubhashi, Balan Raman, Paul Leach, Prasanna Krishnan
-
Publication number: 20070005961Abstract: An operating system for a computing device has a first session for a user that includes a first base process that has a first privileges token attached thereto. The first privileges token includes substantially a full set of privileges of the user on the operating system. The operating system also has a second session for the user that includes a second base process that has a second privileges token attached thereto. The second privileges token is derived from the first privileges token and includes only a minimum set of privileges of the user on the operating system. Thus, the second, limited token does not have all privileges associated with the first, full token but instead has a limited set of privileges and not extra privileges that could be employed to take actions that would be harmful, deceptive, or malicious.Type: ApplicationFiled: June 30, 2005Publication date: January 4, 2007Applicant: Microsoft CorporationInventors: Jeffrey Hamblin, Jonathan Schwartz, Kedarnath Dubhashi, Klaus Schutz, Peter Brundrett, Richard Ward, Thomas Jones
-
Publication number: 20060195449Abstract: A system that generates a per user abstraction of a store from a connection point. Filtering a view set of a hierarchically secured containment hierarchy based on the access permissions of the principal is one of the novel features of the invention. The invention can offer a collection of primitives that can operate on this aggregation that span multiple container hierarchies with potentially heterogeneous security descriptors. The model can reduce the necessity to traverse the container hierarchy to discover all the accessible items in a domain.Type: ApplicationFiled: June 28, 2005Publication date: August 31, 2006Applicant: Microsoft CorporationInventors: Jason Hunter, Simon Skaria, Kedarnath Dubhashi