Patents by Inventor Kishore Kulkarni
Kishore Kulkarni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250055707Abstract: Technology is shown for establishing a chain of trust for an unknown root certificate in an isolated network that is verified using a chain of trust external to the network. A bootstrap executable and a leaf certificate rooted in the external chain of trust are configured with an OID. The leaf certificate is received in the isolated network and used to sign a new root certificate created in the isolated network to create a blob that is stored in a pre-determined location. The bootstrap executable is executed to instantiate a client machine, which retrieves the blob and verifies its signature using the leaf certificate. The client machine verifies that the OID values from the blob and bootstrap executable match. If the signature and OID checks are successful, then the new root certificate is distributed within the isolated network and installed in a PKI certificate chain of trust.Type: ApplicationFiled: October 21, 2024Publication date: February 13, 2025Inventors: Pu LIU, Yingchang Charley ZHANG, Sahil S. CHAVAN, Deyang GU, Lucius B. FLEUCHAUS, Akshay Kishor KULKARNI, David Nunuz TEJERINA
-
Publication number: 20250047506Abstract: Technology is shown for verifying a leaf certificate in a PKI chain of trust involving receiving a leaf certificate signed by an intermediate certificate embedded in the leaf certificate. The intermediate certificate is extracted from the received leaf certificate and its public key used to calculate a signature for the received leaf certificate. The calculated signature is compared to a signature included in the received leaf certificate. The received leaf certificate is verified when the calculated signature matches the signature included in the received leaf certificate. The intermediate certificate can be included as a X.509 property of the leaf certificate.Type: ApplicationFiled: October 21, 2024Publication date: February 6, 2025Inventors: Pu Liu, Yingchang Charley Zhang, Akshay Kishor Kulkarni, Deyang Gu, Lucius B. Fleuchaus, Philip Joseph Hallin
-
Patent number: 12143509Abstract: Technology is shown for verifying a leaf certificate in a PM chain of trust involving receiving a leaf certificate signed by an intermediate certificate embedded in the leaf certificate. The intermediate certificate is extracted from the received leaf certificate and its public key used to calculate a signature for the received leaf certificate. The calculated signature is compared to a signature included in the received leaf certificate. The received leaf certificate is verified when the calculated signature matches the signature included in the received leaf certificate. The intermediate certificate can be included as a X.509 property of the leaf certificate.Type: GrantFiled: January 26, 2022Date of Patent: November 12, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Pu Liu, Yingchang Charley Zhang, Akshay Kishor Kulkarni, Deyang Gu, Lucius B. Fleuchaus, Phililp Joseph Hallin
-
Patent number: 12143506Abstract: Technology is shown for establishing a chain of trust for an unknown root certificate in an isolated network that is verified using a chain of trust external to the network. A bootstrap executable and a leaf certificate rooted in the external chain of trust are configured with an OID. The leaf certificate is received in the isolated network and used to sign a new root certificate created in the isolated network to create a blob that is stored in a pre-determined location. The bootstrap executable is executed to instantiate a client machine, which retrieves the blob and verifies its signature using the leaf certificate. The client machine verifies that the OID values from the blob and bootstrap executable match. If the signature and OID checks are successful, then the new root certificate is distributed within the isolated network and installed in a PKI certificate chain of trust.Type: GrantFiled: January 26, 2022Date of Patent: November 12, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Pu Liu, Yingchang Charley Zhang, Sahil S. Chavan, Deyang Gu, Lucius B. Fleuchaus, Akshay Kishor Kulkarni, David Nunez Tejerina
-
Publication number: 20230239286Abstract: Technology is shown for dynamically attaching secure properties to an identity certificate. Claims determining secure properties for an identity are signed and embedded in an identity certificate. Both the identity certificate and the signed claims in the certificate are verified. When a service request is received from the identity, the signed claims from the identity certificate are checked to determine if the request is permitted. If the request is permitted, then the service request is processed. Some examples involve creating claims determining the secure properties for the remote machine, signing the claims to create the signed claims, distributing the signed claims to a certificate authority, embedding the signed claims in the remote machine identity certificate, and distributing the remote machine identity certificate. The claims can be embedded in the certificate as X.509 properties.Type: ApplicationFiled: January 26, 2022Publication date: July 27, 2023Inventors: Yingchang Charley ZHANG, Akshay Kishor KULKARNI, Deyang GU, Lucius B. FLEUCHAUS, Pu LIU, David Nunez TEJERINA
-
Publication number: 20230239164Abstract: Technology is shown for verifying a leaf certificate in a PM chain of trust involving receiving a leaf certificate signed by an intermediate certificate embedded in the leaf certificate. The intermediate certificate is extracted from the received leaf certificate and its public key used to calculate a signature for the received leaf certificate. The calculated signature is compared to a signature included in the received leaf certificate. The received leaf certificate is verified when the calculated signature matches the signature included in the received leaf certificate. The intermediate certificate can be included as a X.509 property of the leaf certificate.Type: ApplicationFiled: January 26, 2022Publication date: July 27, 2023Inventors: Pu LIU, Yingchang Charley ZHANG, Akshay Kishor KULKARNI, Deyang GU, Lucius B. FLEUCHAUS, Phililp Joseph HALLIN
-
Publication number: 20230239163Abstract: Technology is shown for establishing a chain of trust for an unknown root certificate in an isolated network that is verified using a chain of trust external to the network. A bootstrap executable and a leaf certificate rooted in the external chain of trust are configured with an OID. The leaf certificate is received in the isolated network and used to sign a new root certificate created in the isolated network to create a blob that is stored in a pre-determined location. The bootstrap executable is executed to instantiate a client machine, which retrieves the blob and verifies its signature using the leaf certificate. The client machine verifies that the OID values from the blob and bootstrap executable match. If the signature and OID checks are successful, then the new root certificate is distributed within the isolated network and installed in a PM certificate chain of trust.Type: ApplicationFiled: January 26, 2022Publication date: July 27, 2023Inventors: Pu LIU, Yingchang Charley ZHANG, Sahil S. CHAVAN, Deyang GU, Lucius B. FLEUCHAUS, Akshay Kishor KULKARNI, David Nunez TEJERINA
-
Patent number: 11381496Abstract: Embodiments include methods, systems and computer program products for performing a two-phase commit conformance test for a cloud based online transaction processing system (OLTP). Aspects include receiving, by a test case manager of the OLTP from a transaction manager of the OLTP, a transaction event including metadata regarding a transaction and determining a state of the transaction. Aspects also include identifying a test case based on the metadata and the state of the transaction and issuing state events to the transaction manager, wherein the state events are determined based on the test case. Aspects further include obtaining log information from the transaction manager and determining compliance by the transaction manager with the two-phase commit conformance test based at least in part on the log information.Type: GrantFiled: May 24, 2021Date of Patent: July 5, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Madhu B Ananthapadmanabh, Kishor Kulkarni, Reshmi George
-
Patent number: 11176121Abstract: A method, computer program product, and a system to globally serialize transactions where a processor(s) establishes a communications connection a (serialization) resource and a resource manager for a distributed computing system. The processor(s) obtains a first request from an application executing on the resource for access to a global resource managed by the resource manager, for executing a transaction. The processor(s) implements a lock for the global resource in an object store of the resource manager over the communications connection. The processor(s) communicates the lock to the application, which executes the transaction and the processor(s) updates a memory with a record comprising attributes of the lock. The processor(s) obtains a second request from the application to terminate the lock, obtains, identifies the lock for the transaction, in the object store, and updates the object store to delete the lock.Type: GrantFiled: May 28, 2019Date of Patent: November 16, 2021Assignee: International Business Machines CorporationInventors: Kishor Kulkarni, Sreejith Nalamvathukkal, Madhu B. Ananthapadmanabh
-
Publication number: 20200379975Abstract: A method, computer program product, and a system to globally serialize transactions where a processor(s) establishes a communications connection a (serialization) resource and a resource manager for a distributed computing system. The processor(s) obtains a first request from an application executing on the resource for access to a global resource managed by the resource manager, for executing a transaction. The processor(s) implements a lock for the global resource in an object store of the resource manager over the communications connection. The processor(s) communicates the lock to the application, which executes the transaction and the processor(s) updates a memory with a record comprising attributes of the lock. The processor(s) obtains a second request from the application to terminate the lock, obtains, identifies the lock for the transaction, in the object store, and updates the object store to delete the lock.Type: ApplicationFiled: May 28, 2019Publication date: December 3, 2020Inventors: Kishor Kulkarni, Sreejith Nalamvathukkal, Madhu B. Ananthapadmanabh
-
Patent number: 8977718Abstract: Existing network-based services can be reused by a new network service providing an updated interface to the existing services. A client request directed to the new network service triggers a back-end request from the new network service to the existing network service. The back-end request comprises aspects of the client's request and additional formatting rules and other information to override specific aspects of the existing network service. The existing network service generates a back-end response with its existing functionality that is being reused, and applies the specified overrides. Additional information to be utilized by the new network service in responding to the client can be added to the back-end response. The new network service can then form and transmit a response to the client by utilizing the central portion of the back-end response and appending additional information to it, including the information specified by the existing network-service.Type: GrantFiled: November 1, 2010Date of Patent: March 10, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Justin Ronco, Eric Michael Pierce, Vladimir P. Cabildo, Nazar Abdelrahman, Anjalika Sarupria Mitra, Priyanka Mittal, George N. Katselis, Kishore Kulkarni, Leanne Complin
-
Publication number: 20120110129Abstract: Existing network-based services can be reused by a new network service providing an updated interface to the existing services. A client request directed to the new network service triggers a back-end request from the new network service to the existing network service. The back-end request comprises aspects of the client's request and additional formatting rules and other information to override specific aspects of the existing network service. The existing network service generates a back-end response with its existing functionality that is being reused, and applies the specified overrides. Additional information to be utilized by the new network service in responding to the client can be added to the back-end response. The new network service can then form and transmit a response to the client by utilizing the central portion of the back-end response and appending additional information to it, including the information specified by the existing network-service.Type: ApplicationFiled: November 1, 2010Publication date: May 3, 2012Applicant: MICROSOFT CORPORATIONInventors: Justin Ronco, Eric Michael Pierce, Vladimir P. Cabildo, Nazar Abdelrahman, Anjalika Sarupria Mitra, Priyanka Mittal, George N. Katselis, Kishore Kulkarni, Leanne Complin