Patents by Inventor Srinivas Vedula
Srinivas Vedula has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9594605Abstract: A software version control system manages versioned applications in a client-server computing system environment. Thereby this is a management system for computer application (software) distribution where a number of client devices coupled to a server may be executing different versions of a particular computing application. The system manages updates to the applications and enforces rules or policies to use the most recent version whenever possible.Type: GrantFiled: November 15, 2011Date of Patent: March 14, 2017Assignee: Apple Inc.Inventors: Augustin J. Farrugia, Gelareh Taban, Amine El Kamel, Gianpaolo Fasoli, Srinivas Vedula
-
Publication number: 20160359816Abstract: This application relates to embodiments for providing a content stream to a device from a content server based on a protocol that is established between the device and an account server. The account server can initiate a session with the device and provide the device with a list of channels available for a user account associated with the device. When a channel is selected at the device, conditional access information can be provided from the account server to the device, which can thereafter relay the conditional access information to the content server. The content server can use the conditional access information to verify that the device has the appropriate permission to receive streaming content. In this way, because the conditional access information originates at the account server, permission to access streaming content can be managed by correspondence between the account server and the device, rather than the content server.Type: ApplicationFiled: September 30, 2015Publication date: December 8, 2016Inventors: Srinivas VEDULA, Daniel P. CARTER, Gianpaolo FASOLI, Augustin J. FARRUGIA, Eugene JIVOTOVSKI
-
Patent number: 9032216Abstract: Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable.Type: GrantFiled: September 14, 2012Date of Patent: May 12, 2015Assignee: Apple Inc.Inventors: Srinivas Vedula, Cameron Craig Morris
-
Patent number: 8850206Abstract: In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user computers (clients), a method is provided for enhancing security in the context of digital rights management (DRM) where the server is an untrusted server that may not be secure, but the client is secure. This method operates to authenticate the server to the client and vice versa to defeat hacking attacks intended to obtain confidential information. Values passed between the server and the client include encrypted random numbers, authentication values and other verification data generated using cryptographic techniques including double encryption.Type: GrantFiled: November 15, 2011Date of Patent: September 30, 2014Assignee: Apple Inc.Inventors: Augustin J. Farrugia, Gelareh Taban, Amine El Kamel, Gianpaolo Fasoli, Srinivas Vedula
-
Publication number: 20140189826Abstract: Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable.Type: ApplicationFiled: September 14, 2012Publication date: July 3, 2014Inventors: Srinivas Vedula, Cameron Craig Morris
-
Patent number: 8638935Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key space division and sub-key derivation for mixed media digital rights management content and secure digital asset distribution. A system practicing the exemplary method derives a set of family keys from a master key associated with an encrypted media asset using a one-way function, wherein each family key is uniquely associated with a respective client platform type, wherein the master key is received from a server account database, and identifies a client platform type for a client device and a corresponding family key from the set of family keys. The system encrypts an encrypted media asset with the corresponding family key to yield a platform-specific encrypted media asset, and transmits the platform-specific encrypted media asset to the client device. Thus, different client devices receive device-specific encrypted assets which can be all derived based on the same master key.Type: GrantFiled: January 12, 2012Date of Patent: January 28, 2014Assignee: Apple Inc.Inventors: Gianpaolo Fasoli, Augustin J. Farrugia, Bertrand Mollinier Toublet, Gelareh Taban, Nicholas T. Sullivan, Srinivas Vedula
-
Publication number: 20130182842Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key space division and sub-key derivation for mixed media digital rights management content and secure digital asset distribution. A system practicing the exemplary method derives a set of family keys from a master key associated with an encrypted media asset using a one-way function, wherein each family key is uniquely associated with a respective client platform type, wherein the master key is received from a server account database, and identifies a client platform type for a client device and a corresponding family key from the set of family keys. The system encrypts an encrypted media asset with the corresponding family key to yield a platform-specific encrypted media asset, and transmits the platform-specific encrypted media asset to the client device. Thus, different client devices receive device-specific encrypted assets which can be all derived based on the same master key.Type: ApplicationFiled: January 12, 2012Publication date: July 18, 2013Applicant: Apple Inc.Inventors: Gianpaolo Fasoli, Augustin J. Farrugia, Bertrand Mollinier Toublet, Gelareh Taban, Nicholas T. Sullivan, Srinivas Vedula
-
Publication number: 20130124866Abstract: In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user computers (clients), a method is provided for enhancing security in the context of digital rights management (DRM) where the server is an untrusted server that may not be secure, but the client is secure. This method operates to authenticate the server to the client and vice versa to defeat hacking attacks intended to obtain confidential information. Values passed between the server and the client include encrypted random numbers, authentication values and other verification data generated using cryptographic techniques including double encryption.Type: ApplicationFiled: November 15, 2011Publication date: May 16, 2013Applicant: Apple Inc.Inventors: Augustin J. FARRUGIA, Gelareh TABAN, Amine El KAMEL, Gianpaolo FASOLI, Srinivas VEDULA
-
Publication number: 20130125242Abstract: A software version control system manages versioned applications in a client-server computing system environment. Thereby this is a management system for computer application (software) distribution where a number of client devices coupled to a server may be executing different versions of a particular computing application. The system manages updates to the applications and enforces rules or policies to use the most recent version whenever possible.Type: ApplicationFiled: November 15, 2011Publication date: May 16, 2013Applicant: Apple Inc.Inventors: Augustin J. FARRUGIA, Gelareh TABAN, Amine El KAMEL, Gianpaolo FASOLI, Srinivas VEDULA
-
Patent number: 8412931Abstract: Techniques for credential strength analysis via failed intruder access attempts are presented. Intruders attempting to access a secure network with failed credentials are monitored. The failed credentials are retained and evaluated in view of previously recorded failed credentials. Credential policy is updated in response to the evaluation and intruder trends and sophistication levels are also predicted in response to the evaluation.Type: GrantFiled: December 27, 2007Date of Patent: April 2, 2013Assignee: Apple Inc.Inventors: Srinivas Vedula, Cameron Craig Morris
-
Patent number: 8332918Abstract: Techniques real-time adaptive password policies are presented. Patterns for passwords are regularly analyzed along with other factors associated with the patterns to dynamically determine password strength values. The strength values can change over time based on usage statistics. When a strength value falls below an acceptable threshold, passwords associated with that particular pattern can be downgraded or rejected in real-time and existing policy can be adapted to reflect the undesirability of that pattern.Type: GrantFiled: December 6, 2007Date of Patent: December 11, 2012Assignee: Novell, Inc.Inventors: Srinivas Vedula, Cameron Craig Morris, Larry Hal Henderson
-
Patent number: 8302210Abstract: Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for call path enforcement. The method includes tracking, during run-time, a run-time call order for a series of function calls in a software program, and when executing a protected function call during run-time, allowing or causing proper execution of a protected function call only if the run-time call order matches a predetermined order. The predetermined order can be an expected run-time call order based on a programmed order of function calls in the software program. The method can include maintaining an evolving value associated with the run-time call order and calling the protected function by passing the evolving value and function parameters corrupted based on the evolving value. The protected function uncorrupts the corrupted parameters based on the passed evolving value and an expected predetermined call order. A buffer containing the uncorrupted parameters can replace the corrupted parameters.Type: GrantFiled: August 24, 2009Date of Patent: October 30, 2012Assignee: Apple Inc.Inventors: Ginger M. Myles, Srinivas Vedula, Gianpaolo Fasoli, Julien Lerouge, Tanya Michelle Lattner, Augustin J. Farrugia
-
Patent number: 8286000Abstract: Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable.Type: GrantFiled: December 7, 2007Date of Patent: October 9, 2012Assignee: Novell, Inc.Inventors: Srinivas Vedula, Cameron Craig Morris
-
Patent number: 8250633Abstract: In various embodiments, techniques for flexible resource authentication are provided. A principal attempts to login to a target resource using first credentials. The target resource does not recognize the first credentials and in response thereto forwards the first credentials to an identity service. The identity service authenticates the principal via the first credentials and supplies second credentials to the target resource. The target resource recognizes and authenticates the second credentials and grants access to the principal.Type: GrantFiled: October 26, 2007Date of Patent: August 21, 2012Assignee: EMC CorporationInventors: Srinivas Vedula, Larry Hal Henderson, Stephen Kent Winn
-
Patent number: 8131758Abstract: Techniques for recognizing multiple patterns within a string of characters are presented. A dictionary is hierarchically organized, such that leaf nodes within the dictionary represents words defined in the dictionary. A string of characters are received. Each character within the string is traversed by attempting to match it with a character defined in the dictionary. As long as a match continues with the dictionary the characters within the string are traversed. Once a longest possible match to a word within the dictionary is found, the next character following the last matched character for the string is processed.Type: GrantFiled: December 26, 2007Date of Patent: March 6, 2012Assignee: Novell, Inc.Inventors: Cameron Craig Morris, Lloyd Leon Burch, Srinivas Vedula
-
Patent number: 8079069Abstract: Before a relying party grants a client access to a resource, the last use of the security token by the client to access the resource of the relying party can be verified. Verification can be accomplished by comparing the last time the client sent the security token to the relying party with the last time the relying party received the security token from the client. If the last use of the security token is not verified, the possibility exists that the security token has been fraudulently used by a third party.Type: GrantFiled: March 24, 2008Date of Patent: December 13, 2011Assignee: Oracle International CorporationInventors: Lloyd Leon Burch, Srinivas Vedula
-
Publication number: 20110047622Abstract: Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for call path enforcement. The method includes tracking, during run-time, a run-time call order for a series of function calls in a software program, and when executing a protected function call during run-time, allowing or causing proper execution of a protected function call only if the run-time call order matches a predetermined order. The predetermined order can be an expected run-time call order based on a programmed order of function calls in the software program. The method can include maintaining an evolving value associated with the run-time call order and calling the protected function by passing the evolving value and function parameters corrupted based on the evolving value. The protected function uncorrupts the corrupted parameters based on the passed evolving value and an expected predetermined call order. A buffer containing the uncorrupted parameters can replace the corrupted parameters.Type: ApplicationFiled: August 24, 2009Publication date: February 24, 2011Applicant: Apple Inc.Inventors: Ginger M. Myles, Srinivas Vedula, Gianpaolo Fasoli, Julien Lerouge, Tanya Michelle Lattner, Augustin J. Farrugia
-
Publication number: 20090241178Abstract: Before a relying party grants a client access to a resource, the last use of the security token by the client to access the resource of the relying party can be verified. Verification can be accomplished by comparing the last time the client sent the security token to the relying party with the last time the relying party received the security token from the client. If the last use of the security token is not verified, the possibility exists that the security token has been fraudulently used by a third party.Type: ApplicationFiled: March 24, 2008Publication date: September 24, 2009Applicant: Novell, Inc.Inventors: Lloyd Leon Burch, Srinivas Vedula
-
Publication number: 20090171953Abstract: Techniques for recognizing multiple patterns within a string of characters are presented. A dictionary is hierarchically organized, such that leaf nodes within the dictionary represents words defined in the dictionary. A string of characters are received. Each character within the string is traversed by attempting to match it with a character defined in the dictionary. As long as a match continues with the dictionary the characters within the string are traversed. Once a longest possible match to a word within the dictionary is found, the next character following the last matched character for the string is processed.Type: ApplicationFiled: December 26, 2007Publication date: July 2, 2009Inventors: Cameron Craig Morris, Lloyd Leon Burch, Srinivas Vedula
-
Publication number: 20090172788Abstract: Techniques for credential strength analysis via failed intruder access attempts are presented. Intruders attempting to access a secure network with failed credentials are monitored. The failed credentials are retained and evaluated in view of previously recorded failed credentials. Credential policy is updated in response to the evaluation and intruder trends and sophistication levels are also predicted in response to the evaluation.Type: ApplicationFiled: December 27, 2007Publication date: July 2, 2009Inventors: Srinivas Vedula, Cameron Craig Morris