Patents by Inventor Ramarathnam Venkatesan

Ramarathnam Venkatesan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080209226
    Abstract: Techniques for authenticating biometric parameters via biometric hashing are described. In one implementation, a biometric parameter of a user (e.g., fingerprint image, blood-vessel pattern, retina scan, etc.) is captured. One or more biometric hashes are produced from the biometric parameter. To generate hashes that appear random, pseudorandom metrics are applied over the biometric parameter. The hashes are stored in association with user information that can be employed to authenticate the user. Subsequently, during authentication, a new biometric parameter is captured and hashes are computed from the parameter. The new biometric hashes are then compared with the predetermined stored hashes. If any of the new hashes are found to be identical, or sufficiently similar, to one or more of the predetermined biometric hashes, the biometric parameter is deemed valid and the user is authenticated.
    Type: Application
    Filed: February 28, 2007
    Publication date: August 28, 2008
    Applicant: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Mariusz H. Jakubowski
  • Publication number: 20080209227
    Abstract: Techniques for authenticating biometric parameters via biometric hashing are described. In one implementation, a biometric parameter of a user (e.g., fingerprint image, blood-vessel pattern, retina scan, etc.) is captured. One or more biometric hashes are produced from the biometric parameter. To generate hashes that appear random, pseudorandom metrics are applied over the biometric parameter. The hashes are stored in association with user information that can be employed to authenticate the user. Subsequently, during authentication, a new biometric parameter is captured and hashes are computed from the parameter. The new biometric hashes are then compared with the predetermined stored hashes. If any of the new hashes are found to be identical, or sufficiently similar, to one or more of the predetermined biometric hashes, the biometric parameter is deemed valid and the user is authenticated.
    Type: Application
    Filed: February 28, 2007
    Publication date: August 28, 2008
    Applicant: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Mariusz H. Jakubowski
  • Publication number: 20080195871
    Abstract: A new ((n)th) black box is produced for a digital rights management (DRM) system. The (n)th black box is for being installed in and for performing decryption and encryption functions in the DRM system. The (n)th black box is produced and delivered to the DRM system upon request and includes a new ((n)th) executable and a new ((n)th) key file. The (n)th key file has a new ((n)th) set of black box keys and a number of old sets of black box keys. The request includes an old ((n-1)th) key file having the old sets of black box keys. A code optimizer/randomizer receives a master executable and randomized optimization parameters as inputs and produces the (n)th executable as an output. A key manager receives the (n-1)th key file and the (n)th set of black box keys as inputs, extracts the old sets of black box keys from the (n-1)th key file, and produces the (n)th key file including the (n)th set of black box keys and the old sets of black box keys as an output.
    Type: Application
    Filed: January 14, 2008
    Publication date: August 14, 2008
    Inventors: Marcus Peinado, Ramarathnam Venkatesan, Malcolm Davis
  • Patent number: 7412061
    Abstract: To encrypt a digital object, a key ID is selected for the digital object, and a function ƒ( ) having an input and an output is selected. The selected key ID is then employed as the input to the function ƒ( ), and the output of such function ƒ( ) is employed as the key (KD) for the digital object: ƒ(key ID)key (KD). The digital object is then according to such key (KD), and the encrypted digital object is distributed.
    Type: Grant
    Filed: November 5, 2004
    Date of Patent: August 12, 2008
    Assignee: Microsoft Corporation
    Inventors: Marcus Peinado, Ramarathnam Venkatesan
  • Publication number: 20080184041
    Abstract: Implementation of graph-based tamper resistance modeling for software protection is described. In one implementation, paths of execution of a program are modeled as a graph having nodes and edges. A tamper resistance tool receives an input program code corresponding to the program and generates a tamper-resistant program code using integrity checks. Values for the integrity checks are computed during program execution and are compared to pre-computed values to determine whether a section of the program has been tempered with. Values of the integrity checks may be accessed at any point in time during execution of the program.
    Type: Application
    Filed: March 30, 2007
    Publication date: July 31, 2008
    Applicant: Microsoft Corporation
    Inventors: Mariusz H. Jakubowski, Ramarathnam Venkatesan, Nenad Dedic
  • Patent number: 7406195
    Abstract: An implementation of a technology is described herein for recognizing the perceptual similarity of the content of digital goods. At least one implementation, described herein, introduces a new hashing technique. More particularly, this hashing technique produces hash values for digital goods that are proximally near each other, when the digital goods contain perceptually similar content. In other words, if the content of digital goods are perceptually similar, then their hash values are, likewise, similar. The hash values are proximally near each other. This is unlike conventional hashing techniques where the hash values of goods with perceptually similar content are far apart with high probability in some distance sense (e.g., Hamming). This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Grant
    Filed: August 15, 2005
    Date of Patent: July 29, 2008
    Assignee: Microsoft Corporation
    Inventors: M. Kivanc Mihcak, Ramarathnam Venkatesan
  • Publication number: 20080177684
    Abstract: A classification system is described for resiliently classifying data. In various embodiments, the classification system constructs a combined classifier based on multiple classifiers that are constructed to classify a set of training data. The combined classifier can be constructed in parallel with the multiple classifiers and applied to classify data.
    Type: Application
    Filed: January 19, 2007
    Publication date: July 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Srivatsan Laxman, Ramarathnam Venkatesan
  • Publication number: 20080177680
    Abstract: A classification system is described for resilient classification of data. In various embodiments, the classification system divides a full set of the training data into a positive subset and a negative subset. The positive subset contains all training data with a positive classification value and the negative subset contains all training data with a negative classification value. The classification system constructs several subsets of the training data wherein each subset contains data randomly selected from both the positive subset and the negative subset. The classification system then creates at least two classifiers based on each of the randomly created subsets of the training data.
    Type: Application
    Filed: January 19, 2007
    Publication date: July 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Srivatsan Laxman, Ramarathnam Venkatesan
  • Patent number: 7391884
    Abstract: Exemplary methods for performing a statistical analysis of scanned images are disclosed. The methods described herein may be embodied as logic instructions on a computer-readable medium. In one exemplary implementation a correlation value is determined between a scanned image included in a digital file and an original digital image, and a signal is generated indicating whether the correlation value exceeds a threshold.
    Type: Grant
    Filed: November 14, 2003
    Date of Patent: June 24, 2008
    Assignee: Microsoft Corporation
    Inventors: Mustafa Kesal, M. Kivanc Mihcak, Gary K. Starkweather, Ramarathnam Venkatesan
  • Patent number: 7382905
    Abstract: A desynchronized fingerprinting method and system for identifying collaborators in the making of illegal copies of digital multimedia products. The desynchronized fingerprinting system and method can be used for both audio and video applications. The method and system include an embedding feature and a detection and extraction feature. A different and unique key is assigned to each buyer of a copy of the digital data. The embedding feature includes applying a pseudo-random transformation to selected embedding regions. The key for the pseudo-random transform is user-specific. These regions are chosen by using a secure multimedia hash function. The detection and extraction feature includes a brute-force search in the key space of the buyers. If one of the keys is likely enough, then it can be said that that user was been involved in the production of an illegal copy.
    Type: Grant
    Filed: February 11, 2004
    Date of Patent: June 3, 2008
    Assignee: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Mehmet Kivanc Mihcak, Mehmet Kucukgoz
  • Publication number: 20080126910
    Abstract: Systems and methods provide an optionally keyed error-correcting code that is spectrally concentrated. Each codeword of the low dimensional spectral concentration code (LDSC code) typically has very few coefficients of large magnitude and can be constructed even with limited processing resources. Decoding can be performed on low power devices. Error-correcting code is constructed around a key using basic computer arithmetic for computations instead of finite field arithmetic, thus saving energy. A recipient who possesses the key enjoys correction of a relatively high percentage of noise errors. In one implementation, a direct list-decoder iteratively estimates a list of message words directly, instead of a list of codewords. In variations, a unique message word is selected from the list either by applying a randomness test or by using message passing.
    Type: Application
    Filed: June 29, 2007
    Publication date: May 29, 2008
    Applicant: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Adi Akavia
  • Publication number: 20080127125
    Abstract: A computer-implementable method includes providing an instruction set architecture that comprises features to generate diverse copies of a program, using the instruction set architecture to generate diverse copies of a program and providing a virtual machine for execution of one of the diverse copies of the program. Various exemplary methods, devices, systems, etc., use virtualization for diversifying code and/or virtual machines to thereby enhance software security.
    Type: Application
    Filed: October 27, 2006
    Publication date: May 29, 2008
    Applicant: Microsoft Corporation
    Inventors: Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan
  • Publication number: 20080102793
    Abstract: Systems, methods, and/or techniques (“tools”) are described herein that relate to automated secure pairing for devices, and that relate to parallel downloads of content using devices. The tools for pairing the devices may perform authentication protocols that are based on addresses and on keys. The address-based authentication protocol may operate on address book entries maintained by the devices. The key-based authentication protocol may operate using a key exchange between the devices.
    Type: Application
    Filed: October 31, 2006
    Publication date: May 1, 2008
    Applicant: Microsoft Corporation
    Inventors: Ganesh Ananthanarayanan, Sean Blagsvedt, Ramarathnam Venkatesan
  • Patent number: 7356188
    Abstract: Described herein is a technology for recognizing the content of text documents. The technology determines one or more hash values for the content of a text document. Alternatively, the technology may generate a “sifted text” version of a document. In one implementation described herein, document recognition is used to determine whether the content of one document is copied (i.e., plagiarized) from another document. This is done by comparing hash values of documents (or alternatively their sifted text). In another implementation described herein, document recognition is used to categorize the content of a document so that it may be grouped with other documents in the same category. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Grant
    Filed: April 24, 2001
    Date of Patent: April 8, 2008
    Assignee: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Michael T. Malkin
  • Patent number: 7356161
    Abstract: Methods and systems for quantization and data embedding are described. In at least some embodiments, a transform is applied on an image that is to be watermarked and statistics associated with the image are computed. The computed statistics are quantized using a symmetric lattice, and a watermark is computed using the lattice quantized statistics. The watermark is then inserted into the image.
    Type: Grant
    Filed: June 1, 2004
    Date of Patent: April 8, 2008
    Assignee: Microsoft Corporation
    Inventors: Kamal Jain, Ramarathnam Venkatesan, M. Kivanc Mihcak
  • Patent number: 7346780
    Abstract: An implementation of a technology, described herein, for facilitating the protection computer-executable instructions, such as software. At least one implementation, described herein, may generate integrity signatures of multiple sets of computer-executable instructions based upon the output trace and/or an execution trace of such sets. With at least one implementation, described herein, a determination may be made about whether two or more of such sets are unaltered duplicates by comparing integrity signatures of such sets. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    Type: Grant
    Filed: April 3, 2002
    Date of Patent: March 18, 2008
    Assignee: Microsoft Corporation
    Inventors: Saurabh Sinha, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Yuqun Chen, Matthew Cary, Ruoming Pang
  • Publication number: 20080022102
    Abstract: Software protection using data structures is described. In one implementation, an engine between the processor and the memory of a computing device encrypts and stores data and program variables in blocks of memory that correspond to nodes of a tree-like data structure. When accessed, the nodes of this search tree are rearranged according to various schemata to obscure memory access patterns from being detected by cache attacks or side-channel attacks. In one implementation, the data structure is a splay tree that self-rearranges upon access and increases efficiency while providing security.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Ramarathnam Venkatesan, Victor Boyko
  • Patent number: 7319759
    Abstract: A new ((n)th) black box is produced for a digital rights management (DRM) system. The (n)th black box is for being installed in and for performing decryption and encryption functions in the DRM system. The (n)th black box is produced and delivered to the DRM system upon request and includes a new ((n)th) executable and a new ((n)th) key file. The (n)th key file has a new ((n)th) set of black box keys and a number of old sets of black box keys. The request includes an old ((n?1)th) key file having the old sets of black box keys. A code optimizer/randomizer receives a master executable and randomized optimization parameters as inputs and produces the (n)th executable as an output. A key manager receives the (n?1)th key file and the (n)th set of black box keys as inputs, extracts the old sets of black box keys from the (n?1)th key file, and produces the (n)th key file including the (n)th set of black box keys and the old sets of black box keys as an output.
    Type: Grant
    Filed: March 15, 2000
    Date of Patent: January 15, 2008
    Assignee: Microsoft Corporation
    Inventors: Marcus Peinado, Ramarathnam Venkatesan, Malcolm Davis
  • Patent number: 7318157
    Abstract: An implementation of a technology is described herein for deriving robust non-local characteristics and quantizing such characteristics for blind watermarking of a digital good.
    Type: Grant
    Filed: November 12, 2004
    Date of Patent: January 8, 2008
    Assignee: Microsoft Corporation
    Inventors: M. Kivanc Mihcak, Ramarathnam Venkatesan, Mariusz H. Jakubowski
  • Patent number: 7318158
    Abstract: An implementation of a technology is described herein for deriving robust non-local characteristics and quantizing such characteristics for blind watermarking of a digital good.
    Type: Grant
    Filed: November 3, 2005
    Date of Patent: January 8, 2008
    Assignee: Microsoft Corporation
    Inventors: M Kivanc Mihcak, Ramarathnam Venkatesan, Mariusz H. Jakubowski