Patents by Inventor Manoj K. AMPALAM

Manoj K. AMPALAM has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230412642
    Abstract: The techniques described herein implement a proxy service associated with a public cloud platform. A proxy server receives a connection request sent via an account. The connection request includes a connection parameter such as a specific time the request is initiated, a specific location of a device used to initiate the request, or an identification of the device used to initiate the request. The proxy server maps the account to a policy. The proxy server then determines whether the connection parameter included in the request is anomalous to a corresponding parameter defined in the policy. In an event the connection parameter is an anomalous parameter, the proxy server takes actions to determine whether the policy can be dynamically updated to accommodate the anomalous parameter. If an accommodation can be made, a user or device does not have to wait an extended period of time to gain access to the resource.
    Type: Application
    Filed: June 20, 2022
    Publication date: December 21, 2023
    Inventors: Prasidh ARORA, Balaji KOTTARAM, Mohit Kumar GARG, Benjamin Martin SCHULTZ, Manoj K. AMPALAM, Masato MAEDA
  • Publication number: 20160105528
    Abstract: Techniques are described herein that are capable of providing client-assisted fulfillment of a resource request. For instance, the resource request initially may be directed to a machine that stores the resource (i.e., a resource machine). A resource access agent may redirect the resource request to a client device for purposes of fulfillment. For example, the resource access agent may intercept the resource request before the resource request reaches the resource machine and/or before the resource machine takes action with respect to the resource request. Such client-assisted fulfillment may (or may not) be provided in a single sign-on environment. A single sign-on environment is an environment in which multiple distinct software systems are accessible to a user based on a single authentication of the user.
    Type: Application
    Filed: October 8, 2014
    Publication date: April 14, 2016
    Inventors: Lee Holmes, Manoj K. Ampalam, Jeffrey P. Snover
  • Patent number: 8739250
    Abstract: An input port for a computer system may retain potentially authenticable requests for processing while removing other connection requests from an incoming queue or request pool. The input port may continue to receive new requests even during a denial of service attack, allowing potentially legitimate requests to be processed. In a typical embodiment, a first in, first out buffer may be used to receive and process connection requests. When the buffer is full, any request that comes from a device having a previous connection with the computer system may be retained for authentication, while removing requests that come from unknown devices. Some embodiments may retain a list of known devices associated with administrators or other known users, and the list may be updated as those users are authenticated.
    Type: Grant
    Filed: December 5, 2011
    Date of Patent: May 27, 2014
    Assignee: Microsoft Corporation
    Inventors: Lee Holmes, Hitesh Raigandhi, Nathan Burkhart, David B. Cross, Manoj K. Ampalam
  • Publication number: 20130145428
    Abstract: An input port for a computer system may retain potentially authenticable requests for processing while removing other connection requests from an incoming queue or request pool. The input port may continue to receive new requests even during a denial of service attack, allowing potentially legitimate requests to be processed. In a typical embodiment, a first in, first out buffer may be used to receive and process connection requests. When the buffer is full, any request that comes from a device having a previous connection with the computer system may be retained for authentication, while removing requests that come from unknown devices. Some embodiments may retain a list of known devices associated with administrators or other known users, and the list may be updated as those users are authenticated.
    Type: Application
    Filed: December 5, 2011
    Publication date: June 6, 2013
    Applicant: Microsoft Corporation
    Inventors: Lee HOLMES, Hitesh RAIGANDHI, Nathan BURKHART, David B. CROSS, Manoj K. AMPALAM