Patents by Inventor Shankar Ganesh

Shankar Ganesh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9445051
    Abstract: In an example, a method of processing data includes, in a video telephony session between a local device and a remote device, where the video telephony session includes at least one video connection between the local device and the remote device, identifying, by the local device, degraded playback of video data at the remote device. The method also includes, in response to identifying the degraded playback, terminating, by the local device, a video connection of the at least one video connection.
    Type: Grant
    Filed: August 14, 2015
    Date of Patent: September 13, 2016
    Assignee: QUALCOMM Incorporated
    Inventors: Manjunatha Muthsandra Kantharaju, Min Wang, Shankar Ganesh Lakshmanaswamy
  • Patent number: 9398030
    Abstract: Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision.
    Type: Grant
    Filed: September 24, 2013
    Date of Patent: July 19, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Govind Varshney, Marc A. Silbey, Shankar Ganesh, Robert Impollonia, Venkatraman V. Kudallur
  • Patent number: 9274774
    Abstract: Systems and techniques to provide for software installation. In general, in one implementation, the technique includes detecting selection of one or more applications by a user; creating a manifest for the one or more applications, the manifest including a reference to the one or more applications and a reference to one or more installers, where each of the one or more applications is associated with a unique one of the one or more installers; and providing the manifest to a target system where each of the one or more applications can be installed, none of the applications or installers being provided in the manifest.
    Type: Grant
    Filed: October 28, 2005
    Date of Patent: March 1, 2016
    Assignee: Google Inc.
    Inventors: Sorin Jianu, Sundar Pichai, Jocelyn Lin, Ann Mei Chang, Othman Laraki, Joerg Heilig, John Fu, Shankar Ganesh, Jian Li, Jesse Savage, Carl Schedvin
  • Publication number: 20150193215
    Abstract: Systems and techniques to provide for software installation. In general, in one implementation, the technique includes detecting selection of one or more applications by a user; creating a manifest for the one or more applications, the manifest including a reference to the one or more applications and a reference to one or more installers, where each of the one or more applications is associated with a unique one of the one or more installers; and providing the manifest to a target system where each of the one or more applications can be installed, none of the applications or installers being provided in the manifest.
    Type: Application
    Filed: October 28, 2005
    Publication date: July 9, 2015
    Inventors: Sorin Jianu, Sundar Pichai, Jocelyn Lin, Ann Mei Chang, Othman Laraki, Joerg Heilig, John Fu, Shankar Ganesh, Jian Li, Jesse Savage, Carl Schedvin
  • Patent number: 9015496
    Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.
    Type: Grant
    Filed: February 3, 2014
    Date of Patent: April 21, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Venkatraman V. Kudallur, Shankar Ganesh, Roberto A. Franco, Vishu Gupta, John Green Bedworth
  • Patent number: 8931110
    Abstract: A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.
    Type: Grant
    Filed: April 22, 2013
    Date of Patent: January 6, 2015
    Assignee: Microsoft Corporation
    Inventors: Shankar Ganesh, John G. Bedworth
  • Publication number: 20140157360
    Abstract: A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down.
    Type: Application
    Filed: February 7, 2014
    Publication date: June 5, 2014
    Inventors: David Andrew Ross, Roberto A. Franco, John Green Bedworth, Shankar Ganesh, Venkatraman V. Kudallur, Anantha P. Ganjam, Kurt James Schmucker
  • Publication number: 20140150121
    Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix.
    Type: Application
    Filed: February 3, 2014
    Publication date: May 29, 2014
    Inventors: Venkatraman V. Kudallur, Shankar Ganesh, Roberto A. Franco, Vishu Gupta, John Green Bedworth
  • Patent number: 8650612
    Abstract: A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down.
    Type: Grant
    Filed: January 30, 2012
    Date of Patent: February 11, 2014
    Assignee: Microsoft Corporation
    Inventors: David Andrew Ross, Roberto A. Franco, John Green Bedworth, Shankar Ganesh, Venkatraman V. Kudallur, Anantha P. Ganjam, Kurt James Schmucker
  • Patent number: 8646078
    Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.
    Type: Grant
    Filed: January 11, 2010
    Date of Patent: February 4, 2014
    Assignee: Microsoft Corporation
    Inventors: Venkatraman V Kudallur, Shankar Ganesh, Roberto A Franco, Vishu Gupta, John G Bedworth
  • Patent number: 8572634
    Abstract: Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision.
    Type: Grant
    Filed: April 9, 2010
    Date of Patent: October 29, 2013
    Assignee: Microsoft Corporation
    Inventors: Govind Varshney, Marc A. Silbey, Shankar Ganesh, Robert Impollonia, Venkatraman V. Kudallur
  • Patent number: 8429756
    Abstract: A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.
    Type: Grant
    Filed: May 11, 2010
    Date of Patent: April 23, 2013
    Assignee: Microsoft Corporation
    Inventors: Shankar Ganesh, John G. Bedworth
  • Patent number: 8261258
    Abstract: Systems and techniques to provide for software installation. In general, in one implementation, the technique includes receiving a manifest, the manifest including a reference to one or more applications to be installed, obtaining an installer associated with an application, and using the associated installer to install the application on a target system, the application and the associated installer not being provided in the manifest.
    Type: Grant
    Filed: October 28, 2005
    Date of Patent: September 4, 2012
    Assignee: Google Inc.
    Inventors: Sorin Jianu, Sundar Pichai, Jocelyn Lin, Ann Mei Chang, Othman Laraki, Joerg Heilig, John Fu, Shankar Ganesh, Jian Li, Jesse Savage
  • Publication number: 20120131636
    Abstract: A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down.
    Type: Application
    Filed: January 30, 2012
    Publication date: May 24, 2012
    Applicant: Microsoft Corporation
    Inventors: David Andrew Ross, Roberto A. Franco, John Green Bedworth, Shankar Ganesh, Venkatraman V. Kudallur, Anantha P. Ganjam, Kurt James Schmucker
  • Patent number: 8108902
    Abstract: A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down.
    Type: Grant
    Filed: April 30, 2004
    Date of Patent: January 31, 2012
    Assignee: Microsoft Corporation
    Inventors: David Andrew Ross, Roberto A. Franco, John Green Bedworth, Shankar Ganesh, Venkatraman V. Kudallur, Anantha P. Ganjam, Kurt James Schmucker
  • Publication number: 20100257615
    Abstract: A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.
    Type: Application
    Filed: May 11, 2010
    Publication date: October 7, 2010
    Applicant: Microsoft Corporation
    Inventors: Shankar Ganesh, John G. Bedworth
  • Publication number: 20100192165
    Abstract: Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision.
    Type: Application
    Filed: April 9, 2010
    Publication date: July 29, 2010
    Applicant: Microsoft Corporation
    Inventors: Govind Varshney, Marc A. Silbey, Shankar Ganesh, Robert Impollonia, Venkatraman V. Kudallur
  • Patent number: 7743425
    Abstract: A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.
    Type: Grant
    Filed: April 29, 2004
    Date of Patent: June 22, 2010
    Assignee: Microsoft Corporation
    Inventors: Shankar Ganesh, John G. Bedworth
  • Patent number: 7735094
    Abstract: Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision.
    Type: Grant
    Filed: June 10, 2005
    Date of Patent: June 8, 2010
    Assignee: Microsoft Corporation
    Inventors: Govind Varshney, Marc A. Silbey, Shankar Ganesh, Robert Impollonia, Venkatraman V Kudallur
  • Publication number: 20100107251
    Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.
    Type: Application
    Filed: January 11, 2010
    Publication date: April 29, 2010
    Inventors: Venkatraman V. Kudallur, Shankar Ganesh, Roberto A. Franco, Vishu Gupta, John G. Bedworth