Patents by Inventor Rajagopal Venkatachalam

Rajagopal Venkatachalam has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8429643
    Abstract: A hardware-based security module may contain executable code used to manage the electronic device in which the security module resides. Because the security module may have limited memory, a memory update process is used that allows individual blocks to be separately downloaded and verified. Verification data is sent in a header block prior to sending the individual data blocks.
    Type: Grant
    Filed: September 5, 2007
    Date of Patent: April 23, 2013
    Assignee: Microsoft Corporation
    Inventors: Rajagopal Venkatachalam, Zhangwei Xu
  • Patent number: 8244640
    Abstract: Methods and a program of instruction provide a packet schema framework for communication between elements of a pay-as-you-go business model including a provisioning server, an adapted electronic device, and a service provider. The packet schema defines provisioning instructions and content types to support service provisioning, including electronic device configuration and state, time-metering, and other types of functional and administrative tasks as well as to provide a foundation for any future messages needed for product evolution. The schema also defines security at multiple levels to guard against malicious users who may try to hook into the system to fraudulently use and/or configure the electronic devices for their own use and gain.
    Type: Grant
    Filed: June 21, 2007
    Date of Patent: August 14, 2012
    Assignee: Microsoft Corporation
    Inventors: Rajagopal Venkatachalam, Zhangwei Xu, Zeyong Xu
  • Patent number: 8176564
    Abstract: A system and method for monitoring a computer, particularly a pay-per-use computer, uses an isolated computing environment or supervisor. The isolated computing environment boots prior to any boot device associated with an operating system, runs concurrently with the operating system and monitors and measures the computer in operation. Once the isolated computing environment determines the computer is not in compliance with the required policies, the isolated computing environment may either impose an impediment to use such as slowing clock speed or completely disable the operating system. The user may have to return the computer to a service provider to restore it from the offending condition and reset the computer to an operational state.
    Type: Grant
    Filed: June 14, 2005
    Date of Patent: May 8, 2012
    Assignee: Microsoft Corporation
    Inventors: Alexander Frank, Curt A. Steeb, Isaac P. Ahdout, James S. Duffus, Martin Hall, Nicholas Temple, Rajagopal Venkatachalam, Thomas Phillips, Zhangwei Xu
  • Publication number: 20090064125
    Abstract: A hardware-based security module may contain executable code used to manage the electronic device in which the security module resides. Because the security module may have limited memory, a memory update process is used that allows individual blocks to be separately downloaded and verified. Verification data is sent in a header block prior to sending the individual data blocks.
    Type: Application
    Filed: September 5, 2007
    Publication date: March 5, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Rajagopal Venkatachalam, Zhangwei Xu
  • Publication number: 20080319908
    Abstract: Methods and a program of instruction provide a packet schema framework for communication between elements of a pay-as-you-go business model including a provisioning server, an adapted electronic device, and a service provider. The packet schema defines provisioning instructions and content types to support service provisioning, including electronic device configuration and state, time-metering, and other types of functional and administrative tasks as well as to provide a foundation for any future messages needed for product evolution. The schema also defines security at multiple levels to guard against malicious users who may try to hook into the system to fraudulently use and/or configure the electronic devices for their own use and gain.
    Type: Application
    Filed: June 21, 2007
    Publication date: December 25, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Rajagopal Venkatachalam, Zhangwei Xu, Zeyong Xu
  • Publication number: 20080184026
    Abstract: A metered-use computer is operable in a number of states or modes to accommodate manufacture, test, operation and end-of-life. During manufacturing, a security module may be set to a non-metered mode, where no measurements are taken. At the end of the manufacturing process, the security module may be set to an active mode where metering and measurement of the computer are enforced. When terms of a purchase contract or other user agreement are satisfied, the computer may be set to a non-enforcement state where all metering and metering-related security are disabled. A one-time reset of the active mode is supported to allow end-of-line quality assurance testing.
    Type: Application
    Filed: January 29, 2007
    Publication date: July 31, 2008
    Inventors: Martin H. Hall, Zhangwei Xu, Jeffrey Alan Herold, Curt Andrew Steeb, Rajagopal Venkatachalam, Douglas Reed Beck, David James Foster
  • Publication number: 20070157317
    Abstract: An XML provisioning schema for provisioning and configuring a prepaid and/or a subscription based usage of a provisioned resource is used to communicate between a provisioning server and a client computer. The XML schema disclosed in here includes a content node containing content data identifying the service to be provisioned on the client computer and a signature node containing a signature of the content data. The XML provisioning server may generate an XML provisioning document using the XML provisioning schema, sign such an XML provisioning document using a key derived from a trusted root and communicate the XML provisioning document to the client computer using the provisioned resource.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 5, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Rajagopal Venkatachalam, Zeyong Xu, Zhangwei Xu
  • Publication number: 20070143462
    Abstract: The claimed method and system monitors computer system timer(s) relative to other timers to detect discrepancies and/or may capture an offset to provide a method of more accurately determining a current time. The invention may also provide a method to detect power source tampering using a last known good time and may provide a means to securely initialize system time using an encrypted time stamp.
    Type: Application
    Filed: December 20, 2005
    Publication date: June 21, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Rajagopal Venkatachalam, Zhangwei Xu, Kurt Daverman, Isaac Ahdout, Ricardo Lopez-Barquilla
  • Publication number: 20060107329
    Abstract: A system and method for monitoring a computer, particularly a pay-per-use computer, uses an isolated computing environment or supervisor. The isolated computing environment boots prior to any boot device associated with an operating system, runs concurrently with the operating system and monitors and measures the computer in operation. Once the isolated computing environment determines the computer is not in compliance with the required policies, the isolated computing environment may either impose an impediment to use such as slowing clock speed or completely disable the operating system. The user may have to return the computer to a service provider to restore it from the offending condition and reset the computer to an operational state.
    Type: Application
    Filed: June 14, 2005
    Publication date: May 18, 2006
    Applicant: MICROSOFT CORPORATION
    Inventors: Alexander Frank, Curt Steeb, Isaac Ahdout, James Duffus, Martin Hall, Nicholas Temple, Rajagopal Venkatachalam, Thomas Phillips, Zhangwei Xu