Patents by Inventor Shankar Ganesh
Shankar Ganesh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9445051Abstract: In an example, a method of processing data includes, in a video telephony session between a local device and a remote device, where the video telephony session includes at least one video connection between the local device and the remote device, identifying, by the local device, degraded playback of video data at the remote device. The method also includes, in response to identifying the degraded playback, terminating, by the local device, a video connection of the at least one video connection.Type: GrantFiled: August 14, 2015Date of Patent: September 13, 2016Assignee: QUALCOMM IncorporatedInventors: Manjunatha Muthsandra Kantharaju, Min Wang, Shankar Ganesh Lakshmanaswamy
-
Patent number: 9398030Abstract: Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision.Type: GrantFiled: September 24, 2013Date of Patent: July 19, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Govind Varshney, Marc A. Silbey, Shankar Ganesh, Robert Impollonia, Venkatraman V. Kudallur
-
Patent number: 9274774Abstract: Systems and techniques to provide for software installation. In general, in one implementation, the technique includes detecting selection of one or more applications by a user; creating a manifest for the one or more applications, the manifest including a reference to the one or more applications and a reference to one or more installers, where each of the one or more applications is associated with a unique one of the one or more installers; and providing the manifest to a target system where each of the one or more applications can be installed, none of the applications or installers being provided in the manifest.Type: GrantFiled: October 28, 2005Date of Patent: March 1, 2016Assignee: Google Inc.Inventors: Sorin Jianu, Sundar Pichai, Jocelyn Lin, Ann Mei Chang, Othman Laraki, Joerg Heilig, John Fu, Shankar Ganesh, Jian Li, Jesse Savage, Carl Schedvin
-
Publication number: 20150193215Abstract: Systems and techniques to provide for software installation. In general, in one implementation, the technique includes detecting selection of one or more applications by a user; creating a manifest for the one or more applications, the manifest including a reference to the one or more applications and a reference to one or more installers, where each of the one or more applications is associated with a unique one of the one or more installers; and providing the manifest to a target system where each of the one or more applications can be installed, none of the applications or installers being provided in the manifest.Type: ApplicationFiled: October 28, 2005Publication date: July 9, 2015Inventors: Sorin Jianu, Sundar Pichai, Jocelyn Lin, Ann Mei Chang, Othman Laraki, Joerg Heilig, John Fu, Shankar Ganesh, Jian Li, Jesse Savage, Carl Schedvin
-
Patent number: 9015496Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.Type: GrantFiled: February 3, 2014Date of Patent: April 21, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Venkatraman V. Kudallur, Shankar Ganesh, Roberto A. Franco, Vishu Gupta, John Green Bedworth
-
Patent number: 8931110Abstract: A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.Type: GrantFiled: April 22, 2013Date of Patent: January 6, 2015Assignee: Microsoft CorporationInventors: Shankar Ganesh, John G. Bedworth
-
Publication number: 20140157360Abstract: A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down.Type: ApplicationFiled: February 7, 2014Publication date: June 5, 2014Inventors: David Andrew Ross, Roberto A. Franco, John Green Bedworth, Shankar Ganesh, Venkatraman V. Kudallur, Anantha P. Ganjam, Kurt James Schmucker
-
Publication number: 20140150121Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix.Type: ApplicationFiled: February 3, 2014Publication date: May 29, 2014Inventors: Venkatraman V. Kudallur, Shankar Ganesh, Roberto A. Franco, Vishu Gupta, John Green Bedworth
-
Patent number: 8650612Abstract: A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down.Type: GrantFiled: January 30, 2012Date of Patent: February 11, 2014Assignee: Microsoft CorporationInventors: David Andrew Ross, Roberto A. Franco, John Green Bedworth, Shankar Ganesh, Venkatraman V. Kudallur, Anantha P. Ganjam, Kurt James Schmucker
-
Patent number: 8646078Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.Type: GrantFiled: January 11, 2010Date of Patent: February 4, 2014Assignee: Microsoft CorporationInventors: Venkatraman V Kudallur, Shankar Ganesh, Roberto A Franco, Vishu Gupta, John G Bedworth
-
Patent number: 8572634Abstract: Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision.Type: GrantFiled: April 9, 2010Date of Patent: October 29, 2013Assignee: Microsoft CorporationInventors: Govind Varshney, Marc A. Silbey, Shankar Ganesh, Robert Impollonia, Venkatraman V. Kudallur
-
Patent number: 8429756Abstract: A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.Type: GrantFiled: May 11, 2010Date of Patent: April 23, 2013Assignee: Microsoft CorporationInventors: Shankar Ganesh, John G. Bedworth
-
Patent number: 8261258Abstract: Systems and techniques to provide for software installation. In general, in one implementation, the technique includes receiving a manifest, the manifest including a reference to one or more applications to be installed, obtaining an installer associated with an application, and using the associated installer to install the application on a target system, the application and the associated installer not being provided in the manifest.Type: GrantFiled: October 28, 2005Date of Patent: September 4, 2012Assignee: Google Inc.Inventors: Sorin Jianu, Sundar Pichai, Jocelyn Lin, Ann Mei Chang, Othman Laraki, Joerg Heilig, John Fu, Shankar Ganesh, Jian Li, Jesse Savage
-
Publication number: 20120131636Abstract: A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down.Type: ApplicationFiled: January 30, 2012Publication date: May 24, 2012Applicant: Microsoft CorporationInventors: David Andrew Ross, Roberto A. Franco, John Green Bedworth, Shankar Ganesh, Venkatraman V. Kudallur, Anantha P. Ganjam, Kurt James Schmucker
-
Patent number: 8108902Abstract: A method and system for locking down a local machine zone associated with a network browser is provided. Placing the local machine zone in a lockdown mode provides stricter security settings that are applied to active content attempting to publish within a local page open in the network browser. The stricter setting are provided in a new set of registry keys that correspond to the lockdown mode of the local machine zone. The original security settings remain unchanged so that other systems and applications functionality that depends on the original security settings remains unaffected for the local machine zone. A user may also selectively allow active content to render despite the local machine zone being locked down.Type: GrantFiled: April 30, 2004Date of Patent: January 31, 2012Assignee: Microsoft CorporationInventors: David Andrew Ross, Roberto A. Franco, John Green Bedworth, Shankar Ganesh, Venkatraman V. Kudallur, Anantha P. Ganjam, Kurt James Schmucker
-
Publication number: 20100257615Abstract: A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.Type: ApplicationFiled: May 11, 2010Publication date: October 7, 2010Applicant: Microsoft CorporationInventors: Shankar Ganesh, John G. Bedworth
-
Publication number: 20100192165Abstract: Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision.Type: ApplicationFiled: April 9, 2010Publication date: July 29, 2010Applicant: Microsoft CorporationInventors: Govind Varshney, Marc A. Silbey, Shankar Ganesh, Robert Impollonia, Venkatraman V. Kudallur
-
Patent number: 7743425Abstract: A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.Type: GrantFiled: April 29, 2004Date of Patent: June 22, 2010Assignee: Microsoft CorporationInventors: Shankar Ganesh, John G. Bedworth
-
Patent number: 7735094Abstract: Various embodiments pertain to ascertaining domain contexts. In one embodiment, an application receives content that may contain a script (i.e. code). In this case, the domain context is ascertained and the script is executed in the context of the domain associated with the received content, rather than requiring the application or some other component to navigate to a location, such as a web location, to attempt to ascertain the domain context of the script. In another embodiment, third party objects or code are required to provide their domain context to an application in order for the application to make a security-based decision.Type: GrantFiled: June 10, 2005Date of Patent: June 8, 2010Assignee: Microsoft CorporationInventors: Govind Varshney, Marc A. Silbey, Shankar Ganesh, Robert Impollonia, Venkatraman V Kudallur
-
Publication number: 20100107251Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.Type: ApplicationFiled: January 11, 2010Publication date: April 29, 2010Inventors: Venkatraman V. Kudallur, Shankar Ganesh, Roberto A. Franco, Vishu Gupta, John G. Bedworth