Patents by Inventor Komethagan Subramaniam

Komethagan Subramaniam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11456870
    Abstract: A method of interpreting an authorization token is described herein. The service can receive an authorization token from a client device, and validate a signature of the authorization token. The service can identify an allowed function value associated at least part of an entitlement representation contained in a body of the authorization token. The service can convert the allowed function value to an allowed function bitmask that includes bits at a plurality of bit positions that are set to values indicating whether the subscriber element has attributes associated with each of the plurality of bit positions on a predefined attribute list. The service can determine whether the allowed function bitmask indicates that the subscriber element has one or more qualifying attributes that entitle a user of the client device to access the service.
    Type: Grant
    Filed: January 30, 2020
    Date of Patent: September 27, 2022
    Assignee: T-Mobile USA, Inc.
    Inventors: Komethagan Subramaniam, Michael Engan, Ramkishan Sadasivam, Douglas McDorman
  • Publication number: 20200169405
    Abstract: A method of interpreting an authorization token is described herein. The service can receive an authorization token from a client device, and validate a signature of the authorization token. The service can identify an allowed function value associated at least part of an entitlement representation contained in a body of the authorization token. The service can convert the allowed function value to an allowed function bitmask that includes bits at a plurality of bit positions that are set to values indicating whether the subscriber element has attributes associated with each of the plurality of bit positions on a predefined attribute list. The service can determine whether the allowed function bitmask indicates that the subscriber element has one or more qualifying attributes that entitle a user of the client device to access the service.
    Type: Application
    Filed: January 30, 2020
    Publication date: May 28, 2020
    Inventors: Komethagan Subramaniam, Michael Engan, Ramkishan Sadasivam, Douglas McDorman
  • Patent number: 10587409
    Abstract: A method of interpreting an authorization token is described herein. The service can receive an authorization token from a client device, and validate a signature of the authorization token. The service can identify an allowed function value associated at least part of an entitlement representation contained in a body of the authorization token. The service can convert the allowed function value to an allowed function bitmask that includes bits at a plurality of bit positions that are set to values indicating whether the subscriber element has attributes associated with each of the plurality of bit positions on a predefined attribute list. The service can determine whether the allowed function bitmask indicates that the subscriber element has one or more qualifying attributes that entitle a user of the client device to access the service.
    Type: Grant
    Filed: November 30, 2017
    Date of Patent: March 10, 2020
    Assignee: T-Mobile USA, Inc.
    Inventors: Komethagan Subramaniam, Michael Engan, Ramkishan Sadasivam, Douglas McDorman
  • Patent number: 10505916
    Abstract: Techniques are described for using two tokens to request access to a secure server. The tokens allow the server to verify, without an external call, that the requesting device is one identified in the request and that the requesting device is authorized by a trusted identity provider. A first token is an authentication token issued by the trusted identity provider and including a client device public key. The second token is a proof-of-possession token that is signed by a client device using a client device private key corresponding to the client device public key. The server obtains the client device public key from the authentication token, and then uses the client device public key to validate the proof-of-possession token. The authentication token can be re-used by a server creating its own proof-of-possession token for presentation to a second server to access a secure service on the second server.
    Type: Grant
    Filed: October 19, 2017
    Date of Patent: December 10, 2019
    Assignee: T-Mobile USA, Inc.
    Inventors: Michael Engan, Douglas McDorman, Senthil Kumar Mulluppadi Velusamy, Komethagan Subramaniam
  • Publication number: 20190165942
    Abstract: A method of interpreting an authorization token is described herein. The service can receive an authorization token from a client device, and validate a signature of the authorization token. The service can identify an allowed function value associated at least part of an entitlement representation contained in a body of the authorization token. The service can convert the allowed function value to an allowed function bitmask that includes bits at a plurality of bit positions that are set to values indicating whether the subscriber element has attributes associated with each of the plurality of bit positions on a predefined attribute list. The service can determine whether the allowed function bitmask indicates that the subscriber element has one or more qualifying attributes that entitle a user of the client device to access the service.
    Type: Application
    Filed: November 30, 2017
    Publication date: May 30, 2019
    Inventors: Komethagan Subramaniam, Michael Engan, Ramkishan Sadasivam, Douglas McDorman
  • Publication number: 20190124070
    Abstract: Techniques are described for using two tokens to request access to a secure server. The tokens allow the server to verify, without an external call, that the requesting device is one identified in the request and that the requesting device is authorized by a trusted identity provider. A first token is an authentication token issued by the trusted identity provider and including a client device public key. The second token is a proof-of-possession token that is signed by a client device using a client device private key corresponding to the client device public key. The server obtains the client device public key from the authentication token, and then uses the client device public key to validate the proof-of-possession token. The authentication token can be re-used by a server creating its own proof-of-possession token for presentation to a second server to access a secure service on the second server.
    Type: Application
    Filed: October 19, 2017
    Publication date: April 25, 2019
    Inventors: Michael Engan, Douglas McDorman, Senthil Kumar Mulluppadi Velusamy, Komethagan Subramaniam