Patents by Inventor Srinath T.V. SETTY

Srinath T.V. SETTY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240121081
    Abstract: An access control system is disclosed for controlling access to a resource. A request is received by a location attribute policy (LAP) server to access an encrypted resource. The LAP server accesses a resource policy that identifies requirements for granting access to the encrypted resource, such as a list of attributes of the requestor that are required and a dynamic attribute requirement of the requestor. The LAP server receives a cryptographic proof from the computing device that the requestor possesses the attributes and validates the proof based at least on information obtained from a trusted ledger. Once the proof is validated, the LAP server provides a shared secret associated with the dynamic attribute requirement to a decryption algorithm. The decryption algorithm uses the dynamic attribute shared secret in combination with one or more attribute shared secrets from the requestor to generate a decryption key for the encrypted resource.
    Type: Application
    Filed: October 10, 2022
    Publication date: April 11, 2024
    Inventors: Ramarathnam VENKATESAN, Nishanth CHANDRAN, Ganesh ANANTHANARAYANAN, Panagiotis ANTONOPOULOS, Srinath T.V. SETTY, Daniel John CARROLL, JR., Kiran MUTHABATULLA, Yuanchao SHU, Sanjeev MEHROTRA
  • Publication number: 20240119168
    Abstract: Embodiments described herein enable at least one of a plurality of entities to access data protected by a security policy in response to validating respective digital access requests from the entities. The respective digital access requests are received, each comprising a proof. For each request, an encrypted secret share is obtained from a respective ledger database. Each request is validated based at least on the respective encrypted secret share and the proof, without decrypting the respective encrypted secret share. In response to validating all of the requests, a verification that an access criteria of a security policy is met is made. If so, at least one of the entities is provided with access to data protected by the security policy. In an aspect, embodiments enable a blind subpoena to be performed. In another aspect, embodiments enable the at least one entity to access the data for an isolated purpose.
    Type: Application
    Filed: October 7, 2022
    Publication date: April 11, 2024
    Inventors: Ramarathnam VENKATESAN, Nishanth CHANDRAN, Panagiotis ANTONOPOULOS, Srinath T.V. SETTY, Basil CHERIAN, Daniel John CARROLL, JR., Jason Sydney BARNWELL
  • Publication number: 20200104393
    Abstract: In one embodiment, a service receives a one or more digests to verify a plurality of requests that were performed by a request handler for one or more clients. The digests summarize processing of the plurality of requests using a first contract. The information for the one or more digests is stored in a plurality of blocks in a distributed ledger. A second contract is executed to verify the processing of the plurality of requests. The second contract generates a first set that stores states for reads of values from the data store; generates a second set that stores states for values written to the data store, and verifies the processing by checking states in the first set are a subset of states in the second set.
    Type: Application
    Filed: October 2, 2018
    Publication date: April 2, 2020
    Inventors: Srinath T.V. SETTY, Sebastian ANGEL, Trinabh GUPTA, Jonathan D. LEE
  • Publication number: 20190147188
    Abstract: This document relates to hardware protection of differential privacy techniques. One example obtains multiple instances of encrypted telemetry data within a secure enclave and processes the encrypted telemetry data to obtain multiple instances of unencrypted telemetry data. The example also processes, within the secure enclave, the multiple instances of unencrypted telemetry data to obtain a perturbed aggregate. The example also releases the perturbed aggregate from the secure enclave.
    Type: Application
    Filed: November 16, 2017
    Publication date: May 16, 2019
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Josh D. BENALOH, Harsha P. NORI, Janardhan Dattatreya KULKARNI, Joshua Stanley ALLEN, Jacob Rubin LORCH, Melissa Erin CHASE, Olga OHRIMENKO, Sergey YEKHANIN, Srinath T.V. SETTY, Bolin DING