Patents by Inventor Maya Neelakandhan

Maya Neelakandhan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240039960
    Abstract: Access privileges of at least one identity to resources are adjusted within an authorization system of a computing environment. Over a detection period, accesses by the identity to the resources are detected and a usage score is computed as a usage function of a measure of use by the identity of access privilege(s) it has been granted to at least one of the resources relative to a measure of a set of possible grantable privileges. In accordance with a least privilege security policy, and according to the usage score, the set of access privileges granted to the identity may then be adjusted.
    Type: Application
    Filed: October 9, 2023
    Publication date: February 1, 2024
    Inventors: Shaun APPLEGATE-SWANSON, Carl WALDSPURGER, Balaji PARIMI, Naveen JANGALAPALLI, Maya NEELAKANDHAN, Venkata ADUSUMILLI, Parag BAJARIA
  • Patent number: 11886873
    Abstract: Generally discussed herein are devices, systems, and methods for transparency and control in a user data migration process. A method can include displaying, by a display device, a user interface (UI) including a first display region including text indicating that a legacy application is being replaced by an upgraded application and that a user can select what data from the legacy application is ported over to the upgraded application, receiving, by the UI and from the user, data indicating what portion of data from the legacy application is to be ported over to the upgraded application, and porting over only the portion of the data from the legacy application indicated by the user.
    Type: Grant
    Filed: May 26, 2022
    Date of Patent: January 30, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Steven J. Ball, Maya Neelakandhan
  • Publication number: 20230385058
    Abstract: Generally discussed herein are devices, systems, and methods for transparency and control in a user data migration process. A method can include displaying, by a display device, a user interface (UI) including a first display region including text indicating that a legacy application is being replaced by an upgraded application and that a user can select what data from the legacy application is ported over to the upgraded application, receiving, by the UI and from the user, data indicating what portion of data from the legacy application is to be ported over to the upgraded application, and porting over only the portion of the data from the legacy application indicated by the user.
    Type: Application
    Filed: May 26, 2022
    Publication date: November 30, 2023
    Inventors: Steven J. BALL, Maya Neelakandhan
  • Patent number: 11818175
    Abstract: Access privileges of at least one identity to resources are adjusted within an authorization system of a computing environment. Over a detection period, accesses by the identity to the resources are detected and a usage score is computed as a usage function of a measure of use by the identity of access privilege(s) it has been granted to at least one of the resources relative to a measure of a set of possible grantable privileges. In accordance with a least privilege security policy, and according to the usage score, the set of access privileges granted to the identity may then be adjusted.
    Type: Grant
    Filed: February 25, 2021
    Date of Patent: November 14, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Shaun Applegate-Swanson, Carl Waldspurger, Balaji Parimi, Naveen Jangalapalli, Maya Neelakandhan, Venkata Adusumilli, Parag Bajaria
  • Patent number: 11632373
    Abstract: A security server provides dynamic permissions for an enterprise data source. The security server establishes permissions rules for a data source of the enterprise. For example, the permissions rules describe permissions policies applicable to users of the enterprise in given contexts. The security server evaluates the permissions rules in view of a context to produce a dynamic permissions policy for the data source. The context describes the environment of the data source at a point in time (e.g., a current time). The dynamic permissions policy describes permissions of users of the enterprise with respect to the data source and the context. The security server transmits the dynamic permissions policy to the enterprise such that the enterprise is able to implement the dynamic permissions policy at the data source.
    Type: Grant
    Filed: June 17, 2020
    Date of Patent: April 18, 2023
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Balaji Parimi, Venkata Adusumilli, Maya Neelakandhan, Naga Venkata Naveen Teja Jangalapalli
  • Publication number: 20220109677
    Abstract: Methods, systems, apparatuses, and computer-readable storage mediums described herein are configured to automatically detect inadvertent, unauthorized account access. For example, a user account may be analyzed to identify roles thereof that permit identities of other accounts to assume the roles of the user account. The analysis is performed for each identified account, including any accounts having roles that permit identities of further accounts to assume the roles of the identified accounts. Accordingly, a chain of roles may be determined that indicates how one account may have access to another account via one or more intervening role assignments. This circuitous path of account access may be represented and displayed to a user, e.g., via a tree structure. Upon identifying an unauthorized account, an appropriate action may be performed to adjust permissions.
    Type: Application
    Filed: October 1, 2021
    Publication date: April 7, 2022
    Inventors: Parag BAJARIA, Naveen Teja JANGALAPALLI, Maya NEELAKANDHAN, Venkata ADUSUMILLI
  • Publication number: 20210281610
    Abstract: Access privileges of at least one identity to resources are adjusted within an authorization system of a computing environment. Over a detection period, accesses by the identity to the resources are detected and a usage score is computed as a usage function of a measure of use by the identity of access privilege(s) it has been granted to at least one of the resources relative to a measure of a set of possible grantable privileges. In accordance with a least privilege security policy, and according to the usage score, the set of access privileges granted to the identity may then be adjusted.
    Type: Application
    Filed: February 25, 2021
    Publication date: September 9, 2021
    Applicant: CloudKnox Security, Inc.
    Inventors: Shaun APPLEGATE-SWANSON, Carl WALDSPURGER, Balaji PARIMI, Naveen JANGALAPALLI, Maya NEELAKANDHAN, Venkata ADUSUMILLI, Parag BAJARIA
  • Publication number: 20200403996
    Abstract: A security server provides dynamic permissions for an enterprise data source. The security server establishes permissions rules for a data source of the enterprise. For example, the permissions rules describe permissions policies applicable to users of the enterprise in given contexts. The security server evaluates the permissions rules in view of a context to produce a dynamic permissions policy for the data source. The context describes the environment of the data source at a point in time (e.g., a current time). The dynamic permissions policy describes permissions of users of the enterprise with respect to the data source and the context. The security server transmits the dynamic permissions policy to the enterprise such that the enterprise is able to implement the dynamic permissions policy at the data source.
    Type: Application
    Filed: June 17, 2020
    Publication date: December 24, 2020
    Inventors: Balaji Parimi, Venkata Adusumilli, Maya Neelakandhan, Naga Venkata Naveen Teja Jangalapalli