Patents by Inventor Ramesh Chinta

Ramesh Chinta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250131089
    Abstract: The present disclosure provides methods, systems and storage media for conducting a security review of a system. Certain examples relate to the use of trained generative AI to generating a root security query using a machine learning (ML) generator, based on a system description. A security requirement associated with the root security query is extracted, and an indication of the root security query is output at a user interface. A user input is received in response, and the ML generator generates a follow-up request that is output via the user interface. A second user input is received in response to the follow-up request, and the ML generator then determines that the security requirement is not satisfied by the target system.
    Type: Application
    Filed: December 21, 2023
    Publication date: April 24, 2025
    Inventors: Tvisha Rajesh GANGWANI, Ramesh CHINTA, Sahil Sanjay SANGHVI, Kimia POURALI, Michael Richard YAGLEY, Shashank YERRAMILLI, Komal Darshil PANDYA
  • Patent number: 10621357
    Abstract: Security risks associated with scanning a computer are at least mitigated by performing the scanning off node. State data of a target node, or computer, can be acquired in various ways. The acquired state data can be subsequently employed to generate a virtual replica of the target computer or portion thereof on a second computer isolated from the target computer. The virtual replica of the target computer provides a scanner access to the data needed to perform a scan on the second computer without accessing or being able to impact the target computer.
    Type: Grant
    Filed: August 31, 2017
    Date of Patent: April 14, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Rebecca Jean Ochs, Ramesh Chinta, Amrita Satapathy, Jeffrey Cooperstein, Harini Parthasarathy, Scott Antony Field, Mohamed Rouatbi, Julian Federico Gonzalez
  • Publication number: 20190065754
    Abstract: Security risks associated with scanning a computer are at least mitigated by performing the scanning off node. State data of a target node, or computer, can be acquired in various ways. The acquired state data can be subsequently employed to generate a virtual replica of the target computer or portion thereof on a second computer isolated from the target computer. The virtual replica of the target computer provides a scanner access to the data needed to perform a scan on the second computer without accessing or being able to impact the target computer.
    Type: Application
    Filed: August 31, 2017
    Publication date: February 28, 2019
    Inventors: Rebecca Jean Ochs, Ramesh Chinta, Amrita Satapathy, Jeffrey Cooperstein, Harini Parthasarathy, Scott Antony Field, Mohamed Rouatbi, Julian Federico Gonzalez
  • Patent number: 9501635
    Abstract: This disclosure describes methods, systems, and application programming interfaces for creating a credential managed account. This disclosure describes creating a new password managed account, defining the password managed account, wherein the password managed account is to access a service on a managed computing device, identifying the password managed account for a lifecycle, and automatically managing the password managed account by updating and changing a password for the password managed account on a periodic basis.
    Type: Grant
    Filed: June 25, 2008
    Date of Patent: November 22, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ramesh Chinta, Scott A. Field, Liqiang Zhu, Umit Akkus, Siddharth Bhai, Gopinathan Kannan, James J Simmons, Qi Cao, Paul Miller, Ryan Fairfax, Alexandru Hanganu
  • Patent number: 9413740
    Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.
    Type: Grant
    Filed: July 22, 2014
    Date of Patent: August 9, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field
  • Publication number: 20160087963
    Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.
    Type: Application
    Filed: December 1, 2015
    Publication date: March 24, 2016
    Inventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field
  • Publication number: 20160028704
    Abstract: Embodiments are directed to establishing a secure connection between computing systems and to providing computer system virtualization on a secure computing device. In one scenario, a computer system receives a request that at least one specified function be initiated. The request includes user credentials and a device claim that identifies the computing device. The computer system authenticates the user using the received user credentials and determines, based on the device claim, that the computing device is an approved computing device that has been approved to initiate performance of the specified function. Then, upon determining that the user has been authenticated and that the computing device is approved to initiate performance the specified function, the computer system initiates performance of the specified function.
    Type: Application
    Filed: July 22, 2014
    Publication date: January 28, 2016
    Inventors: Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Ramesh Chinta, Scott A. Field
  • Patent number: 9191397
    Abstract: Described is a technology by which an engine parses data based upon modules arranged in a tree-like model structure. Only those modules that meet a condition with respect to the data are invoked for processing the data. Each child module specifies a parent module and specifies a condition for when the parent is to invoke the child module. As a module processes the data, if a child module's specified condition is met, it invokes the corresponding child module, (which in turn may invoke a lower child if its condition is met, and so on). When the data corresponds to protocols, the model facilitates protocol layering. A top level parent may represent one protocol (e.g., TCP), a child beneath may represent a lower-layer protocol (e.g., HTTP), whose children may handle certain types of HTTP commands, or correspond to a signature that the child module is programmed to detect.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: November 17, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ramesh Chinta, Crystal Li, Vladimir Lifliand, Narasimha Rao S. S. Nagampalli
  • Patent number: 9047477
    Abstract: Architecture that stores specific passwords on behalf of users, and encrypts the passwords using encryption keys managed by a distributed key management system. The encryption keys are stored in a directory service (e.g., hierarchical) in an area that is inaccessible by selected entities (e.g., administrative users) having superior permissions such as supervisory administrators, but accessible to the account components that need to access the unencrypted passwords. The distributed key management system makes the encryption key stored in the directory service available to all hardware/software components that need the key to encrypt or decrypt the passwords.
    Type: Grant
    Filed: May 26, 2009
    Date of Patent: June 2, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Fabian Nunez-Tejerina, Jeffrey B. Kay, Robert C. Fruth, Naveen A. Palavalli, Ramesh Chinta, Tolga Acar
  • Patent number: 8789159
    Abstract: Systems and methods for creating a secure process on a web server can include creating an application manager process, and creating an application host process, the application host process being created under control of the application manager process. Example methods can also include restricting attributes of the application host process, and assigning a unique logon identifier to the application host process so that the application host process can only communicate with the application manager process.
    Type: Grant
    Filed: February 11, 2008
    Date of Patent: July 22, 2014
    Assignee: Microsoft Corporation
    Inventors: S. Franklin Williams, Kiran Akella Venkata, David C. LeBlanc, Juraj Gottweis, Gareth A. Howell, Scott A. Field, Ramesh Chinta
  • Patent number: 8230485
    Abstract: A system and method for controlling access to a computer provides for loose security within a local network while retaining strong security against external access to the network. In one embodiment, a user has access to trusted nodes in a secured group within an unmanaged network, without being required to choose, enter and remember a login password. To establish such a secure blank password or one-click logon account for the user on a computer, a strong random password is generated and stored, and the account is designated as a blank password account. If the device is part of a secured network group, the strong random password is replicated to the other trusted nodes. When a user with a blank password account wishes to log in to a computer, the stored strong random password is retrieved and the user is authenticated.
    Type: Grant
    Filed: September 15, 2004
    Date of Patent: July 24, 2012
    Assignee: Microsoft Corporation
    Inventors: Sterling M. Reasor, Ramesh Chinta, Paul J. Leach, John E. Brezak, Eric R. Flo
  • Patent number: 7979865
    Abstract: A computer-readable medium bearing computer-executable instructions which, when executed on a computer, carry out a method for handling a request for an operating system service is presented. The method comprises receiving a request for execution of an operating system service. The corresponding operating system service is then identified. A unique service identifier that corresponds to the requested operating system service is obtained. A service thread is generated, the thread being associated with an executing process. Storage associated with the service thread is initialized with the unique service identifier. Thereafter, the execution of the service thread is initiated.
    Type: Grant
    Filed: November 3, 2005
    Date of Patent: July 12, 2011
    Assignee: Microsoft Corporation
    Inventors: Narasimha Rao S. S. Nagampalli, Pradeep Bahl, Ramesh Chinta
  • Publication number: 20100306554
    Abstract: Architecture that stores specific passwords on behalf of users, and encrypts the passwords using encryption keys managed by a distributed key management system. The encryption keys are stored in a directory service (e.g., hierarchical) in an area that is inaccessible by selected entities (e.g., administrative users) having superior permissions such as supervisory administrators, but accessible to the account components that need to access the unencrypted passwords. The distributed key management system makes the encryption key stored in the directory service available to all hardware/software components that need the key to encrypt or decrypt the passwords.
    Type: Application
    Filed: May 26, 2009
    Publication date: December 2, 2010
    Applicant: Microsoft Corporation
    Inventors: Fabian Nunez-Tejerina, Jeffrey B. Kay, Robert C. Fruth, Naveen A. Palavalli, Ramesh Chinta, Tolga Acar
  • Publication number: 20090327993
    Abstract: Described is a technology by which an engine parses data based upon modules arranged in a tree-like model structure. Only those modules that meet a condition with respect to the data are invoked for processing the data. Each child module specifies a parent module and specifies a condition for when the parent is to invoke the child module. As a module processes the data, if a child module's specified condition is met, it invokes the corresponding child module, (which in turn may invoke a lower child if its condition is met, and so on). When the data corresponds to protocols, the model facilitates protocol layering. A top level parent may represent one protocol (e.g., TCP), a child beneath may represent a lower-layer protocol (e.g., HTTP), whose children may handle certain types of HTTP commands, or correspond to a signature that the child module is programmed to detect.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Ramesh Chinta, Jason Li, Vladimir Lifliand, Narasimha Rao S. S. Nagampalli
  • Publication number: 20090328154
    Abstract: This disclosure describes methods, systems, and application programming interfaces for creating a credential managed account. This disclosure describes creating a new password managed account, defining the password managed account, wherein the password managed account is to access a service on a managed computing device, identifying the password managed account for a lifecycle, and automatically managing the password managed account by updating and changing a password for the password managed account on a periodic basis.
    Type: Application
    Filed: June 25, 2008
    Publication date: December 31, 2009
    Applicant: Microsoft Corporation
    Inventors: Scott A. Field, Ramesh Chinta, Liqiang Zhu, Umit Akkus, Siddharth Bhai, Gopinathan Kannan, James J. Simmons, Qi Cao, Paul Miller, Ryan Fairfax, Alexandru Hanganu
  • Patent number: 7603708
    Abstract: A computer system having secured network services is presented. The computer system comprises a processor, a memory, and a network action processing module. The network action processing module processes network actions from one or more network services executing on the computer system. The computer system is further configured to execute at least network service performing network actions in conjunction with the network action processing module. Upon receiving a network action from a network service, the network action processing module determines whether the network action is a valid network action according to a network action control list. If the network action is determined to not be a valid network action, the network action is blocked. Alternatively, if the network action is determined to be a valid network action, the network action is permitted to be completed.
    Type: Grant
    Filed: July 13, 2005
    Date of Patent: October 13, 2009
    Assignee: Microsoft Corporation
    Inventors: Pradeep Bahl, Ramesh Chinta, Narasimha Rao S. S. Nagampalli, Scott A Field
  • Publication number: 20090205034
    Abstract: Systems and methods for creating a secure process on a web server can include creating an application manager process, and creating an application host process, the application host process being created under control of the application manager process. Example methods can also include restricting attributes of the application host process, and assigning a unique logon identifier to the application host process so that the application host process can only communicate with the application manager process.
    Type: Application
    Filed: February 11, 2008
    Publication date: August 13, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: S. Franklin Williams, Kiran Akella Venkata, David C. LeBlanc, Juraj Gottweis, Gareth A. Howell, Scott A. Field, Ramesh Chinta
  • Publication number: 20070294699
    Abstract: A facility is provided for conditionally reserving resources in an operating system. In various embodiments, the facility receives an indication of a conditional reservation declarator that identifies at least a resource, an action, a condition, and a principal. The conditional reservation declarator can specify a directive that corresponds to the identified resource, action, condition, and principal. The facility configures itself to apply the specified directive in relation to the identified action and resource when the principal attempts to perform the identified action in relation to the identified resource and the condition is met. The facility can apply the specified directive when it determines that the principal is attempting to perform the identified action on the identified resource when the condition is met.
    Type: Application
    Filed: June 16, 2006
    Publication date: December 20, 2007
    Applicant: Microsoft Corporation
    Inventors: Pradeep Bahl, Narasimha Rao S. S. Nagampalli, Ramesh Chinta
  • Publication number: 20070162909
    Abstract: Techniques for reserving resources in an operating system are provided. The techniques include receiving an indication of an authorization setting specifying a directive and identifying at least a resource, an action, and a principal, configuring to apply the specified directive in relation to the identified action and resource when the principal attempts to perform the identified action in relation to the indicated resource, determining that the principal is attempting to perform the identified action on the identified resource, and applying the specified directive. The techniques function whether or not the resources or principals exist when the resources are reserved.
    Type: Application
    Filed: January 11, 2006
    Publication date: July 12, 2007
    Applicant: Microsoft Corporation
    Inventors: Pradeep Bahl, Narasimha Nagampalli, Ramesh Chinta
  • Publication number: 20070101335
    Abstract: A computer-readable medium bearing computer-executable instructions which, when executed on a computer, carry out a method for handling a request for an operating system service is presented. The method comprises receiving a request for execution of an operating system service. The corresponding operating system service is then identified. A unique service identifier that corresponds to the requested operating system service is obtained. A service thread is generated, the thread being associated with an executing process. Storage associated with the service thread is initialized with the unique service identifier. Thereafter, the execution of the service thread is initiated.
    Type: Application
    Filed: November 3, 2005
    Publication date: May 3, 2007
    Applicant: Microsoft Corporation
    Inventors: Narasimha Nagampalli, Pradeep Bahl, Ramesh Chinta