Patents by Inventor Mauruthi Geetha Mohan
Mauruthi Geetha Mohan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250097211Abstract: Operations of a certificate bundle distribution service may include: detecting a trigger condition to distribute a certificate bundle that includes a set of certificate authority certificates; determining, for each of a plurality of network entities associated with a computer network, a fault domain representing at least one single point of failure; partitioning the plurality of network entities into a plurality of certificate distribution groups, based on a set of partitioning criteria that includes a fault domain of each particular network entity, in which each particular certificate distribution group includes a particular subset of network entities, and the particular subset of network entities are associated with a particular fault domain; selecting a particular certificate distribution group, of the plurality of certificate distribution groups, for distribution of the certificate bundle; and transmitting the certificate bundle to the particular subset of network entities in the particular certificate diType: ApplicationFiled: September 14, 2023Publication date: March 20, 2025Applicant: Oracle International CorporationInventors: Burak Uzun, Mauruthi Geetha Mohan, Saranya Mani, Geetha Ravi
-
Publication number: 20250088373Abstract: Operations of a certificate bundle validation service may include receiving a first certificate bundle that includes a first set of one or more digital certificates, and a digital signature, associated with the first certificate bundle; determining, using a public key of an asymmetric key pair associated with a second set of one or more digital certificates, that the digital signature is generated using a private key of the asymmetric key pair; and responsive to determining that the digital signature is generated using the private key, storing the first certificate bundle in a certificate repository as a trusted certificate bundle.Type: ApplicationFiled: September 13, 2023Publication date: March 13, 2025Applicant: Oracle International CorporationInventors: Burak Uzun, Mauruthi Geetha Mohan, Tony Long, Owen Cliffe
-
Publication number: 20250088499Abstract: Operations of a certificate bundle distribution service may include: detecting a trigger condition to distribute a certificate bundle that includes a set of one or more certificate authority certificates; partitioning each particular network entity of a plurality of network entities associated with a computer network into one of a plurality of certificate distribution groups based on a network address of the particular network entity, in which each particular certificate distribution group includes a particular subset of network entities from the plurality of network entities; selecting a particular certificate distribution group, of the plurality of certificate distribution groups, for distribution of the certificate bundle; and transmitting the certificate bundle to the particular subset of network entities in the particular certificate distribution group.Type: ApplicationFiled: September 13, 2023Publication date: March 13, 2025Applicant: Oracle International CorporationInventors: Sneha Sudhakaran Nair, Tony Long, Mauruthi Geetha Mohan, Akshay Krishnath Dagade, Jakub Wojciak
-
Publication number: 20250088374Abstract: Operations may include receiving, from a first network entity, a first request for a first certificate revocation list (CRL) that identifies a first CRL distribution point (CDP) corresponding to the first CRL; mapping the first CDP to a first CRL identifier of a set of available CRL identifiers; locating, in a CRL repository, a first CRL based on the first CRL identifier; and transmitting the first CRL to the first network entity.Type: ApplicationFiled: September 13, 2023Publication date: March 13, 2025Applicant: Oracle International CorporationInventors: Jodi Robertson, Tony Long, Mauruthi Geetha Mohan, Mina Anes
-
Publication number: 20250088514Abstract: Operations of a certificate authority (CA) service may include aggregating in a certificate repository, a plurality of sets of CA certificates, in which each set of CA certificates is issued by a particular CA that is associated with a particular trust zone and that is trusted by a particular set of network entities located in the particular trust zone. The operations may further include distributing for access by an additional set of network entities, an aggregate set of CA certificates that includes the plurality of sets of CA certificates. The additional set of network entities may utilize the plurality of sets of CA certificates to authenticate network entities located in different trust zones.Type: ApplicationFiled: September 13, 2023Publication date: March 13, 2025Applicant: Oracle International CorporationInventors: Haya Majeed, Tony Long, Mauruthi Geetha Mohan
-
Publication number: 20250055710Abstract: Operations of a digital signature manager may include detecting, in a certificate repository on a first virtual cloud network, set of one or more new certificate authority (CA) certificates; transmitting, to a key management service hosted on a second virtual cloud network, a CA dataset that includes the set of one or more new CA certificates; receiving, from the key management service, a digital signature of the CA dataset generated based at least on a global private key stored on the second virtual cloud network in a private key repository associated with the key management service; and storing the digital signature in the certificate repository in a data structure that associates the digital signature with the CA dataset.Type: ApplicationFiled: August 10, 2023Publication date: February 13, 2025Applicant: Oracle International CorporationInventors: Tony Long, Mauruthi Geetha Mohan, Karthik Venkatesh
-
Publication number: 20250015977Abstract: An identity service in a cloud environment is communicatively coupled to a proxy key vault in the cloud environment and to an external key manager (EKM) located outside of the cloud environment. The identity service receives a token request for a communication credential from the proxy key vault and verifies the request based on a client credential associated with the proxy key vault. The identity service generates the client credential and signs the communication credential with a private key associated with the EKM. The identify service transmits the signed communication credential to the proxy key vault. The communication credential can be used to substantiate cryptographic operation requests to the EKM.Type: ApplicationFiled: July 5, 2024Publication date: January 9, 2025Applicant: Oracle International CorporationInventors: Apurv Awasthi, Frederick Anthonisamy Bosco, Bharat Shivram, Madhu Manjunath, Deepak Kumar, Raj Miglani, Akshay Mall, Mayank Bajpai, Jun Tong, Mukesh Shah, Mauruthi Geetha Mohan
-
Publication number: 20250015988Abstract: A key management service (KMS) in a cloud computing environment has an internal vault for cryptographic operations by an internal cryptographic key within the cloud environment and a proxy key vault communicatively coupled to an external key manager (EKM) that stores an external cryptographic key. The KMS uses a provider-agnostic application program interface (API) that permits the cloud service customer to use the same interface request and format for cryptographic operation requests regardless of whether the request is for an operation directed to an internal vault or to an external vault and regardless of the particular vendor of the external key management service operating on the external hardware device.Type: ApplicationFiled: July 5, 2024Publication date: January 9, 2025Applicant: Oracle International CorporationInventors: Apurv Awasthi, Frederick Anthonisamy Bosco, Bharat Shivram, Madhu Manjunath, Deepak Kumar, Raj Miglani, Akshay Mall, Mayank Bajpai, Jun Tong, Mukesh Shah, Mauruthi Geetha Mohan
-
Publication number: 20240340272Abstract: A method may include transmitting a request for metadata associated with a compute instance and receiving, by a computing system, metadata associated with the compute instance signed with a private key. The private key may be associated with a public key. The method may include receiving a request to access a cloud resource and transmitting the request for the metadata. The method may also include receiving the metadata. The metadata may indicate that the compute instance is hosted on the computing system. The method may also include transmitting, to an instance principal service, a request for an instance principal certificate. The request may include the metadata signed with the private key and be cryptographically verified by the instance principal service using the public key. The method may also include receiving the instance principal certificate and providing access to the could resource based on the instance principal certificate.Type: ApplicationFiled: April 6, 2023Publication date: October 10, 2024Applicant: Oracle International CorporationInventors: Anthony Long, Brady Turner, Mina Anes, Mauruthi Geetha Mohan, Adam Franklin Wilford, Bill Chau, Timothy Kraus, David Dale Becker
-
Publication number: 20240119133Abstract: Techniques described herein relate to authorization between integrated cloud products. An example includes receiving, by a computing device and from a first resource, a first request for permission to access a certificate to verify a requestor's identity. The computing device can transmit a second request to a second resource to authorize permitting access to the certificate. The computing device can receive a response from the second resource comprising an authorization to permit access to the certificate. The computing device can grant permission to the first resource to access the certificate, wherein the first resource is configured to verify the requestor's identity based on accessing the certificate. The computing device can receive a third request from the first resource to generate an association object between the first resource and the certificate. The computing device can generate the association object, wherein the association object associates the first resource and the certificate.Type: ApplicationFiled: October 10, 2022Publication date: April 11, 2024Applicant: Oracle International CorporationInventors: Mauruthi Geetha Mohan, Anthony Long, Mina Michel Gorgy Anes, Sanjeeb Kumar Sahoo, Yingyu Yang, Bakhtiyar Uddin, Thomas James Andrews
-
Publication number: 20170300312Abstract: Non-limiting examples of the present disclosure describe detection of gross motion of a region of content. Gross motion of a region of content may be detected. A determination may be made as to a current quality level of the region. Based on detection of the gross motion, residual values may be generated for a progressive update of the region. The residual values are generated using the current quality level of the region as a base to determine a quantization update for a progressive update of the region at a higher quality level as compared with the current quality level of the region. Frame data for the progressive update of the region may be encoded. The frame data may comprise the residual values and motion vectors for progressive update of the region. The frame data may be transmitted for decoding. Other examples are also described.Type: ApplicationFiled: April 13, 2016Publication date: October 19, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Shir Aharon, Guosheng Sun, Costin Hagiu, Mauruthi Geetha Mohan, B. Anil Kumar, Lihua Zhu, Jeroen E. van Eesteren