Patents by Inventor Preetam Ramakrishna

Preetam Ramakrishna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8281136
    Abstract: Techniques for key distribution used with encrypted communications are provided. A shared secret associated with a principal is maintained securely and separately from the principal. If a principal is authenticated, then the shared secret is acquired from secure data store and used to encrypt a session key. An encrypted authentication token is also generated. The session key is used by the principal to encrypt communications with services and the authentication token vouches for an identity of the principal.
    Type: Grant
    Filed: February 7, 2006
    Date of Patent: October 2, 2012
    Assignee: Novell, Inc.
    Inventor: Preetam Ramakrishna
  • Patent number: 7895452
    Abstract: A system for stopping an ongoing threat to a database is described. During operation, if an ongoing threat to the database is detected, the system modifies a threat-assessment condition. Then, the system selectively restricts access to one or more cryptographic keys for the database based on the threat-assessment condition. Next, the system selectively activates decryption of requested encrypted information based on the threat-assessment condition. Note that both the selective restriction of access to the one or more cryptographic keys and the selective activation of decryption can be used to stop the ongoing threat from accessing the encrypted information in the database.
    Type: Grant
    Filed: July 5, 2007
    Date of Patent: February 22, 2011
    Assignee: Oracle International Corporation
    Inventors: Rahil Abbas Mir, Preetam Ramakrishna
  • Publication number: 20090013194
    Abstract: A system for stopping an ongoing threat to a database is described. During operation, if an ongoing threat to the database is detected, the system modifies a threat-assessment condition. Then, the system selectively restricts access to one or more cryptographic keys for the database based on the threat-assessment condition. Next, the system selectively activates decryption of requested encrypted information based on the threat-assessment condition. Note that both the selective restriction of access to the one or more cryptographic keys and the selective activation of decryption can be used to stop the ongoing threat from accessing the encrypted information in the database.
    Type: Application
    Filed: July 5, 2007
    Publication date: January 8, 2009
    Inventors: Rahil Abbas Mir, Preetam Ramakrishna
  • Publication number: 20070094503
    Abstract: Techniques for key distribution used with encrypted communications are provided. A shared secret associated with a principal is maintained securely and separately from the principal. If a principal is authenticated, then the shared secret is acquired from secure data store and used to encrypt a session key. An encrypted authentication token is also generated. The session key is used by the principal to encrypt communications with services and the authentication token vouches for an identity of the principal.
    Type: Application
    Filed: February 7, 2006
    Publication date: April 26, 2007
    Inventor: Preetam Ramakrishna