Patents by Inventor Srinath Venkataramani

Srinath Venkataramani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10462113
    Abstract: The disclosed computer-implemented method for securing push authentications may include (i) receiving, by a security service and from a security service relying party, a push authentication for a user that the security service relying party encrypted using a public key assigned to a client device of the user, (ii) forwarding, by the security service, the push authentication to the client device of the user, (iii) receiving, by the security service, a response to the push authentication from the client device of the user, and (iv) forwarding, by the security service, the response to the push authentication from the client device of the user to the security service relying party. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 27, 2017
    Date of Patent: October 29, 2019
    Assignee: Symantec Corporation
    Inventor: Srinath Venkataramani
  • Patent number: 10360366
    Abstract: The disclosed computer-implemented method for providing two-factor authentication with an enterprise gateway when an authentication server is unavailable may include (1) receiving, at a computing device, an authentication request from a client device; (2) determining the authentication server is unavailable; (3) sending, to the client device and in response to determining the authentication server is unavailable, a backup credential stored on the enterprise gateway; (4) receiving, from the client device, a security code generated by the backup credential; (5) authenticating the security code; (6) sending, in response to determining the security code is authentic, access approval to the client device. The provided methods may provide authentication, by an enterprise gateway, of one or more factors in a multi-factor authentication system when an authentication server is unavailable. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 15, 2017
    Date of Patent: July 23, 2019
    Assignee: Symantec Corporation
    Inventors: Sankalp Dubey, Srinath Venkataramani, Vadiraj Kulkarni, Kunal Agarwal
  • Patent number: 10326733
    Abstract: The disclosed computer-implemented method for facilitating single sign-on for multiple devices may include (1) establishing a login session for a user account, (2) in response to establishing the login session, providing, to a device associated with the user account, a session token for the user account, (3) receiving, from at least one client, a request to access resources associated with the user account, (4) determining that the associated device possesses the session token for the user account, and (5) in response to determining that the associated device possesses the session token, providing, to the client, access to the resources associated with the user account. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: February 11, 2016
    Date of Patent: June 18, 2019
    Assignee: Symantec Corporation
    Inventors: Prasad Bokare, Gary Krall, Nicolas Popp, Kunal Agarwal, Tushar Goyal, Srinath Venkataramani
  • Patent number: 10318725
    Abstract: The present disclosure relates to changing a password in a proximity-based authentication system. After a successful proximity-based authentication, a password agent may determine that a password does not comply with an administrative password policy. The password agent may then generate a new password that does comply with the administrative password policy and submit a password change request to an administrator of that password policy, without any input by a user at these steps. The user can then request to view the password for input to a service using the same password, and after passing a biometric challenge may view the password.
    Type: Grant
    Filed: August 16, 2016
    Date of Patent: June 11, 2019
    Assignee: Symantec Corporation
    Inventor: Srinath Venkataramani
  • Patent number: 9888035
    Abstract: A computer-implemented method for detecting man-in-the-middle attacks may include (1) registering a mobile device of a user within a computing environment as an authenticated mobile device that corresponds to the user, (2) receiving an authentication request to log into a secure computing resource as the user, (3) transmitting, in response to receiving the authentication request, an out-of-band push authentication prompt to the registered mobile device of the user through a different channel than a channel through which the authentication request was received, (4) comparing a geolocation indicated by the authentication request with a geolocation indicated by the registered mobile device, and (5) performing remedial action in response to detecting a man-in-the-middle attack based on a determination that the geolocation indicated by the authentication request and the geolocation indicated by the registered mobile device do not match.
    Type: Grant
    Filed: August 12, 2015
    Date of Patent: February 6, 2018
    Assignee: Symantec Corporation
    Inventors: Srinath Venkataramani, Rosarin Jolly Roy Antonyraj
  • Publication number: 20180004934
    Abstract: The present disclosure relates to changing a password in a proximity-based authentication system. After a successful proximity-based authentication, a password agent may determine that a password does not comply with an administrative password policy. The password agent may then generate a new password that does comply with the administrative password policy and submit a password change request to an administrator of that password policy, without any input by a user at these steps. The user can then request to view the password for input to a service using the same password, and after passing a biometric challenge may view the password.
    Type: Application
    Filed: August 16, 2016
    Publication date: January 4, 2018
    Inventor: Srinath VENKATARAMANI
  • Publication number: 20170195429
    Abstract: The disclosed computer-implemented method for facilitating single sign-on for multiple devices may include (1) establishing a login session for a user account, (2) in response to establishing the login session, providing, to a device associated with the user account, a session token for the user account, (3) receiving, from at least one client, a request to access resources associated with the user account, (4) determining that the associated device possesses the session token for the user account, and (5) in response to determining that the associated device possesses the session token, providing, to the client, access to the resources associated with the user account. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Application
    Filed: February 11, 2016
    Publication date: July 6, 2017
    Inventors: Prasad Bokare, Gary Krall, Nicolas Popp, Kunal Agarwal, Tushar Goyal, Srinath Venkataramani
  • Patent number: 9571497
    Abstract: The disclosed computer-implemented method for blocking push authentication spam may include (1) detecting an attempt by an unauthenticated source to gain access to a web resource protected by an MFA service, (2) issuing, to a mobile device of an authenticated user of the MFA service, a push authentication request to query the authenticated user about whether to allow the unauthenticated source's attempt, (3) determining, based at least in part on the push authentication request issued to the mobile device, that the authenticated user has not allowed the unauthenticated source's attempt, and (4) in response to determining that the authenticated user has not allowed the unauthenticated source's attempt, blacklisting the unauthenticated source such that the MFA service refuses to issue any subsequent push authentication requests in connection with the unauthenticated source. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: October 14, 2014
    Date of Patent: February 14, 2017
    Assignee: Symantec Corporation
    Inventors: Srinath Venkataramani, Rosarin Jolly Antonyraj
  • Publication number: 20170006060
    Abstract: A computer-implemented method for detecting man-in-the-middle attacks may include (1) registering a mobile device of a user within a computing environment as an authenticated mobile device that corresponds to the user, (2) receiving an authentication request to log into a secure computing resource as the user, (3) transmitting, in response to receiving the authentication request, an out-of-band push authentication prompt to the registered mobile device of the user through a different channel than a channel through which the authentication request was received, (4) comparing a geolocation indicated by the authentication request with a geolocation indicated by the registered mobile device, and (5) performing remedial action in response to detecting a man-in-the-middle attack based on a determination that the geolocation indicated by the authentication request and the geolocation indicated by the registered mobile device do not match.
    Type: Application
    Filed: August 12, 2015
    Publication date: January 5, 2017
    Inventors: Srinath Venkataramani, Rosarin Jolly Roy Antonyraj
  • Patent number: 9300644
    Abstract: A method and apparatus for knowledge-based authentication by a cloud-based authentication service are described. A cloud-based authentication service is to track credential usage of an end-user at the cloud-based authentication service. The authentication service receives a credential request for credentials associated with the end-user from a relying party website. The end-user no longer has authentication credentials for access to the relying party website. The authentication service issues a dynamic knowledge-based (KB) challenge to the end-user, the dynamic KB challenge being based on at least some of the tracked credential usage of the end-user. The processing logic receives a response to the dynamic KB challenge from the end-user and sends temporary credentials to the relying party for the end-user when the response is validated.
    Type: Grant
    Filed: February 22, 2013
    Date of Patent: March 29, 2016
    Assignee: Symantec Corporation
    Inventors: Sankalp Dubey, Srinath Venkataramani, Phalgun Garimella
  • Patent number: 9104853
    Abstract: Techniques are disclosed for authenticating users to a computing application. A mobile or tablet device is used to generate a security code. Near field communication (NFC) hardware on the mobile device is used to transfer the security code from the mobile device to a computer. To transfer the one-time value, a user simply taps an NFC enabled mobile device on an NFC enabled computing device (e.g. a laptop running a web browser used to access a web service). In one embodiment, doing so triggers a connection between the two devices and an application running on the mobile device transfers the security code to an NFC receiver application running on the computer. The receiving computer may be configured to auto-fill the received security code in the appropriate form field of the application authentication interface.
    Type: Grant
    Filed: May 16, 2013
    Date of Patent: August 11, 2015
    Assignee: SYMANTEC CORPORATION
    Inventors: Mohit Mathur, Srinath Venkataramani
  • Patent number: 8959588
    Abstract: A computer-implemented method for mitigating remote authentication service unavailability. The method may include 1) monitoring an availability of a remote authentication service that an authentication system, while performing multi-factor authentications, uses to validate an authentication factor of the multi-factor authentications, 2) while monitoring the availability of the remote authentication service, detecting that the remote authentication service is unavailable, and 3) in response to detecting that the remote authentication service is unavailable, causing the authentication system to bypass the authentication factor such that the authentication system can perform authentications while the remote authentication service is unavailable. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: April 27, 2012
    Date of Patent: February 17, 2015
    Assignee: Symantec Corporation
    Inventors: Sandesh Puthenpurayil Vijayan, Srinath Venkataramani, Vadiraj Kulkami
  • Patent number: 8955068
    Abstract: A computer-implemented method may include providing authentication code for an existing web-based application. The authentication code may be programmed to modify functionality of the existing web-based application as the existing web-based application executes while leaving a binary of the existing web-based application unchanged. The method may also include establishing strong authentication for the existing web-based application by 1) identifying, via the authentication code, a request to bind an authentication credential to a profile of a user, the request being received via a browser through which the existing web-based application is accessed, 2) directing, via the authentication code and in response to the request, the browser to an external authentication site that is not part of the existing web-based application, and 3) at the external authentication site, enabling the user to bind the authentication credential to the profile.
    Type: Grant
    Filed: May 9, 2012
    Date of Patent: February 10, 2015
    Assignee: Symantec Corporation
    Inventors: Srinath Venkataramani, Arpan Debroy
  • Publication number: 20140344904
    Abstract: Techniques are disclosed for authenticating users to a computing application. A mobile or tablet device is used to generate a security code. Near field communication (NFC) hardware on the mobile device is used to transfer the security code from the mobile device to a computer. To transfer the one-time value, a user simply taps an NFC enabled mobile device on an NFC enabled computing device (e.g. a laptop running a web browser used to access a web service). In one embodiment, doing so triggers a connection between the two devices and an application running on the mobile device transfers the security code to an NFC receiver application running on the computer. The receiving computer may be configured to auto-fill the received security code in the appropriate form field of the application authentication interface.
    Type: Application
    Filed: May 16, 2013
    Publication date: November 20, 2014
    Applicant: SYMANTEC, Inc.
    Inventors: Srinath VENKATARAMANI, Mohit MATHUR
  • Patent number: 8689294
    Abstract: A method for managing offline authentication. The method may include 1) identifying an attempt, by a user, to access a client device, wherein accessing the client device requires the user to be authenticated, 2) determining whether the client device is offline, 3) in response to determining that the client device is offline, authenticating the user using offline authentication, wherein offline authentication does not require an active network connection with a remote authentication service, 4) upon successful authentication of the user using offline authentication, allowing the user to access the client device, 5) monitoring the network-connection state of the client device, 6) detecting that the client device is online, and then 7) in response to detecting that the client device is online, locking the client device in order to require the user to reauthenticate using online authentication, wherein online authentication requires the active network connection with the remote authentication service.
    Type: Grant
    Filed: November 11, 2011
    Date of Patent: April 1, 2014
    Assignee: Symantec Corporation
    Inventors: Sanjay Thakur, Srinath Venkataramani, Prashant Thakre
  • Patent number: 8555362
    Abstract: Two factor LDAP authentication systems and methods are presented. In one embodiment, implementation of a method for authenticating a user through a two factor process includes: at an LDAP proxy server, receiving a BIND request from a client, wherein the BIND request is for authenticating a user associated with a username to an LDAP server, and wherein the BIND request comprises a password comprising a first factor security code and a second factor security code; stripping the second factor security code from the password; reconfiguring the BIND request with the password that is stripped of the second factor security code; forwarding the reconfigured BIND request to the LDAP server for authentication of the username using the first factor security code; performing authentication of the second factor security code; and positively authenticating the username to the LDAP server when the first factor security code and the second factor security code are authenticated in connection with the username.
    Type: Grant
    Filed: July 20, 2011
    Date of Patent: October 8, 2013
    Assignee: Symantec Corporation
    Inventor: Srinath Venkataramani
  • Publication number: 20130024925
    Abstract: Two factor LDAP authentication systems and methods are presented. In one embodiment, implementation of a method for authenticating a user through a two factor process includes: at an LDAP proxy server, receiving a BIND request from a client, wherein the BIND request is for authenticating a user associated with a username to an LDAP server, and wherein the BIND request comprises a password comprising a first factor security code and a second factor security code; stripping the second factor security code from the password; reconfiguring the BIND request with the password that is stripped of the second factor security code; forwarding the reconfigured BIND request to the LDAP server for authentication of the username using the first factor security code; performing authentication of the second factor security code; and positively authenticating the username to the LDAP server when the first factor security code and the second factor security code are authenticated in connection with the username.
    Type: Application
    Filed: July 20, 2011
    Publication date: January 24, 2013
    Applicant: SYMANTEC CORPORATION
    Inventor: Srinath Venkataramani