Patents by Inventor Ramesh Rajagopal
Ramesh Rajagopal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9537873Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: GrantFiled: February 20, 2016Date of Patent: January 3, 2017Assignee: Authentic8, Inc.Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston, Varley H. Taylor, Zachary L. Segal, Luka I. Stolyarov, Joshua R. McMains, Brian T. Zaugg
-
Patent number: 9461982Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.Type: GrantFiled: July 7, 2014Date of Patent: October 4, 2016Assignee: Authentic8, Inc.Inventors: Ramesh Rajagopal, James K. Tosh, Fredric L. Cox, Perry F. Nguyen, Jason T. Champion
-
Publication number: 20160248785Abstract: Embodiments described herein may be directed to systems, methods, apparatuses, devices, computer program products, computer-executable instructions, and/or applications for securely and anonymously accessing web resources and customizable attribution of identity. In accordance with the present disclosure, a user may inspect and analyze a webpage as well as the underlying source code from an “arm's length” using a secure analysis application to prevent exposure on the user's local machine. The secure analysis application may provide increased flexibility in masking and/or modifying the user's digital persona to external websites. Additionally, the secure analysis application may be integrated with a translation service to translate textual web content without the web content provider being alerted that a translation is taking place.Type: ApplicationFiled: February 20, 2016Publication date: August 25, 2016Inventors: Scott M. Petry, Ramesh Rajagopal, Peter K. Lund, Fredric L. Cox, Adam P. Moore, Leslie L. Dunston, Varley H. Taylor, Zachary L. Segal, Luka I. Stolyarov, Joshua R. McMains, Brian T. Zaugg
-
Publication number: 20160156666Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: ApplicationFiled: January 21, 2016Publication date: June 2, 2016Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Patent number: 9246904Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: GrantFiled: November 3, 2014Date of Patent: January 26, 2016Assignee: Authentic8, Inc.Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Publication number: 20150058923Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: ApplicationFiled: November 3, 2014Publication date: February 26, 2015Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Patent number: 8881227Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: GrantFiled: March 15, 2013Date of Patent: November 4, 2014Assignee: Authentic8, Inc.Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, Jr., Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Publication number: 20140325589Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.Type: ApplicationFiled: July 7, 2014Publication date: October 30, 2014Applicant: AUTHENTIC8, INC.Inventors: Ramesh Rajagopal, James K. Tosh, Fredric L. Cox, Perry F. Nguyen, Jason T. Champion
-
Patent number: 8776169Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services.Type: GrantFiled: March 30, 2011Date of Patent: July 8, 2014Assignee: Authentic8, Inc.Inventors: Ramesh Rajagopal, James K. Tosh, Fredric L. Cox, Perry F. Nguyen, Jason T. Champion
-
Publication number: 20130340028Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for invocation of a secure web container which may display data representative of a requesting party's application at a user's machine. The secure web container is invoked upon receipt of an API call from the requesting party. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable web container), insulating the user and requesting parties from the threats associated with being online for the purposes of providing secure, policy-based interaction with a requesting party's online services.Type: ApplicationFiled: March 15, 2013Publication date: December 19, 2013Applicant: AUTHENTIC8, INC.Inventors: Ramesh Rajagopal, Scott M. Petry, James K. Tosh, JR., Peter K. Lund, Fredric L. Cox, Adam P. Moore
-
Publication number: 20110247045Abstract: Disclosed herein are systems and methods that allow for secure access to websites and web-based applications and other resources available through the browser. Also described are systems and methods for secure use and retention of user credentials, as well as methods for dynamic authentication of users and integrity checking of service providers in online environments. Thus, described in the present specification are systems and methods for constructing and destroying private, secure, browsing environments (a secure disposable browser), insulating the user from the threats associated with being online for the purposes of providing secure, policy-based interaction with online services. User PCs and other user computers can often be vulnerable to identity theft and other malicious computer attacks due to keyloggers, malware, phishing attacks, untrustworthy internet sites and the like. In particular, such user computers often store credentials on local memory and transmit credentials across the internet.Type: ApplicationFiled: March 30, 2011Publication date: October 6, 2011Applicant: AUTHENTIC8, INC.Inventors: Ramesh Rajagopal, James K. Tosh, Fredric L. Cox, Perry F. Nguyen, Jason T. Champion
-
Patent number: 7979842Abstract: The present invention relates to a system and methodology providing an Application Programming Interface (API) and framework that supports a meta-object model for application design and operating system interactions. The API includes an input component that receives data and/or instructions. The input component processes a meta-data model that interrelates data via a class hierarchy, wherein the class hierarchy includes relationship descriptions between class objects, attributes, rules, and/or behavioral descriptions. Another aspect includes a data management system that includes a component to receive an item having meta-data annotations. An analysis component determines at runtime a structure for the item via deployment of the meta-data annotations. The system can also include a framework component that defines meta-data class derivations, meta-data classes, meta-data integrity rules, and/or meta-data class behavior.Type: GrantFiled: November 5, 2007Date of Patent: July 12, 2011Assignee: Microsoft CorporationInventors: Anthony Bloesch, Ramesh Rajagopal
-
Patent number: 7770148Abstract: In one embodiment, a method is provided for use in a system in which a user may edit an artifact and a diagram representing the artifact. The method includes acts of temporarily removing, in response to a request by the user, an artifact portion which corresponds to a diagram element on a diagram (e.g., a class diagram); removing the diagram element from the diagram; replacing, in response to a request by the user, the artifact portion in the artifact; and replacing the diagram element in the diagram, wherein the diagram element retains at least a portion of customization performed by the user previous to its removal from the diagram.Type: GrantFiled: May 25, 2005Date of Patent: August 3, 2010Assignee: Microsoft CorporationInventors: Giovanni Stallo, Jeremy E. Mercer, Ramesh Rajagopal
-
Publication number: 20100018737Abstract: A fiberglass hole plug for sealing unused openings in electrical enclosures is disclosed. The hole plug includes a cover having a first side and a second side and defining a peripheral edge and a threaded member having a first end and a second end. The second end of the threaded member is attached to the second side of the cover, axially extends in a direction away from the cover, wherein a radial distance between the threaded member and the peripheral edge on the second side of said cover is less than or equal to one-half inch. The hole plug further includes a fastener threadably attached to the threaded member, whereby rotation of the fastener adjusts a longitudinal distance between the first end and the second end of the threaded member.Type: ApplicationFiled: July 25, 2008Publication date: January 28, 2010Applicant: ROBROY INDUSTRIES, INC.Inventors: Michael Jackson, Ramesh Rajagopal
-
Patent number: 7590969Abstract: A data structure and application programming interface for creating and manipulating object model artifacts within a meta-model is provided. The data structure may include higher level abstractions of the type system to provide a set of services to implement software design tools and editors.Type: GrantFiled: April 14, 2004Date of Patent: September 15, 2009Assignee: Microsoft CorporationInventors: Ramesh Rajagopal, Patrick Shyhuei Tseng
-
Patent number: 7567257Abstract: The performing of actions on an object graph that contains multiple objects. The objects are categorized into partitions. Taking into account the partitions, a particular non-final action performed on the object graph may be undone without necessarily first undoing all of the one or more subsequent actions. Instead, if the subsequent actions involved objects of different partitions than the objects that were affected by the particular action desired to be undone, the particular action may be undone without undoing the subsequent actions.Type: GrantFiled: December 16, 2005Date of Patent: July 28, 2009Assignee: Microsoft CorporationInventors: Steven T. Antoch, Jack J. Greenfield, Keith S. Hamilton, George Mathew, Niall L. McDonnell, Ramesh Rajagopal
-
Publication number: 20080163160Abstract: The present invention relates to a system and methodology providing an Application Programming Interface (API) and framework that supports a meta-object model for application design and operating system interactions. The API includes an input component that receives data and/or instructions. The input component processes a meta-data model that interrelates data via a class hierarchy, wherein the class hierarchy includes relationship descriptions between class objects, attributes, rules, and/or behavioral descriptions. Another aspect includes a data management system that includes a component to receive an item having meta-data annotations. An analysis component determines at runtime a structure for the item via deployment of the meta-data annotations. The system can also include a framework component that defines meta-data class derivations, meta-data classes, meta-data integrity rules, and/or meta-data class behavior.Type: ApplicationFiled: November 5, 2007Publication date: July 3, 2008Applicant: MICROSOFT CORPORATIONInventors: Anthony Bloesch, Ramesh Rajagopal
-
Patent number: 7293254Abstract: The present invention relates to a system and methodology providing an Application Programming Interface (API) and framework that supports a meta-object model for application design and operating system interactions. The API includes an input component that receives data and/or instructions. The input component processes a meta-data model that interrelates data via a class hierarchy, wherein the class hierarchy includes relationship descriptions between class objects, attributes, rules, and/or behavioral descriptions. Another aspect includes a data management system that includes a component to receive an item having meta-data annotations. An analysis component determines at runtime a structure for the item via deployment of the meta-data annotations. The system can also include a framework component that defines meta-data class derivations, meta-data classes, meta-data integrity rules, and/or meta-data class behavior.Type: GrantFiled: September 18, 2003Date of Patent: November 6, 2007Assignee: Microsoft CorporationInventors: Anthony Bloesch, Ramesh Rajagopal
-
Publication number: 20070143335Abstract: The performing of actions on an object graph that contains multiple objects. The objects are categorized into partitions. Taking into account the partitions, a particular non-final action performed on the object graph may be undone without necessarily first undoing all of the one or more subsequent actions. Instead, if the subsequent actions involved objects of different partitions than the objects that were affected by the particular action desired to be undone, the particular action may be undone without undoing the subsequent actions.Type: ApplicationFiled: December 16, 2005Publication date: June 21, 2007Inventors: Steve Antoch, Jack Greenfield, Keith Hamilton, George Mathew, Niall McDonnell, Ramesh Rajagopal
-
Publication number: 20060266250Abstract: In one embodiment, a method is provided for use in a system in which a user may edit an artifact and a diagram representing the artifact. The method includes acts of temporarily removing, in response to a request by the user, an artifact portion which corresponds to a diagram element on a diagram (e.g., a class diagram); removing the diagram element from the diagram; replacing, in response to a request by the user, the artifact portion in the artifact; and replacing the diagram element in the diagram, wherein the diagram element retains at least a portion of customization performed by the user previous to its removal from the diagram.Type: ApplicationFiled: May 25, 2005Publication date: November 30, 2006Applicant: Microsoft CorporationInventors: Giovanni Stallo, Jeremy Mercer, Ramesh Rajagopal