Patents by Inventor Srinivas Vedula

Srinivas Vedula has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9594605
    Abstract: A software version control system manages versioned applications in a client-server computing system environment. Thereby this is a management system for computer application (software) distribution where a number of client devices coupled to a server may be executing different versions of a particular computing application. The system manages updates to the applications and enforces rules or policies to use the most recent version whenever possible.
    Type: Grant
    Filed: November 15, 2011
    Date of Patent: March 14, 2017
    Assignee: Apple Inc.
    Inventors: Augustin J. Farrugia, Gelareh Taban, Amine El Kamel, Gianpaolo Fasoli, Srinivas Vedula
  • Publication number: 20160359816
    Abstract: This application relates to embodiments for providing a content stream to a device from a content server based on a protocol that is established between the device and an account server. The account server can initiate a session with the device and provide the device with a list of channels available for a user account associated with the device. When a channel is selected at the device, conditional access information can be provided from the account server to the device, which can thereafter relay the conditional access information to the content server. The content server can use the conditional access information to verify that the device has the appropriate permission to receive streaming content. In this way, because the conditional access information originates at the account server, permission to access streaming content can be managed by correspondence between the account server and the device, rather than the content server.
    Type: Application
    Filed: September 30, 2015
    Publication date: December 8, 2016
    Inventors: Srinivas VEDULA, Daniel P. CARTER, Gianpaolo FASOLI, Augustin J. FARRUGIA, Eugene JIVOTOVSKI
  • Patent number: 9032216
    Abstract: Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable.
    Type: Grant
    Filed: September 14, 2012
    Date of Patent: May 12, 2015
    Assignee: Apple Inc.
    Inventors: Srinivas Vedula, Cameron Craig Morris
  • Patent number: 8850206
    Abstract: In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user computers (clients), a method is provided for enhancing security in the context of digital rights management (DRM) where the server is an untrusted server that may not be secure, but the client is secure. This method operates to authenticate the server to the client and vice versa to defeat hacking attacks intended to obtain confidential information. Values passed between the server and the client include encrypted random numbers, authentication values and other verification data generated using cryptographic techniques including double encryption.
    Type: Grant
    Filed: November 15, 2011
    Date of Patent: September 30, 2014
    Assignee: Apple Inc.
    Inventors: Augustin J. Farrugia, Gelareh Taban, Amine El Kamel, Gianpaolo Fasoli, Srinivas Vedula
  • Publication number: 20140189826
    Abstract: Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable.
    Type: Application
    Filed: September 14, 2012
    Publication date: July 3, 2014
    Inventors: Srinivas Vedula, Cameron Craig Morris
  • Patent number: 8638935
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key space division and sub-key derivation for mixed media digital rights management content and secure digital asset distribution. A system practicing the exemplary method derives a set of family keys from a master key associated with an encrypted media asset using a one-way function, wherein each family key is uniquely associated with a respective client platform type, wherein the master key is received from a server account database, and identifies a client platform type for a client device and a corresponding family key from the set of family keys. The system encrypts an encrypted media asset with the corresponding family key to yield a platform-specific encrypted media asset, and transmits the platform-specific encrypted media asset to the client device. Thus, different client devices receive device-specific encrypted assets which can be all derived based on the same master key.
    Type: Grant
    Filed: January 12, 2012
    Date of Patent: January 28, 2014
    Assignee: Apple Inc.
    Inventors: Gianpaolo Fasoli, Augustin J. Farrugia, Bertrand Mollinier Toublet, Gelareh Taban, Nicholas T. Sullivan, Srinivas Vedula
  • Publication number: 20130182842
    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for key space division and sub-key derivation for mixed media digital rights management content and secure digital asset distribution. A system practicing the exemplary method derives a set of family keys from a master key associated with an encrypted media asset using a one-way function, wherein each family key is uniquely associated with a respective client platform type, wherein the master key is received from a server account database, and identifies a client platform type for a client device and a corresponding family key from the set of family keys. The system encrypts an encrypted media asset with the corresponding family key to yield a platform-specific encrypted media asset, and transmits the platform-specific encrypted media asset to the client device. Thus, different client devices receive device-specific encrypted assets which can be all derived based on the same master key.
    Type: Application
    Filed: January 12, 2012
    Publication date: July 18, 2013
    Applicant: Apple Inc.
    Inventors: Gianpaolo Fasoli, Augustin J. Farrugia, Bertrand Mollinier Toublet, Gelareh Taban, Nicholas T. Sullivan, Srinivas Vedula
  • Publication number: 20130124866
    Abstract: In the context of a computer client-server architecture, typically used in the Internet for communicating between a server and applications running on user computers (clients), a method is provided for enhancing security in the context of digital rights management (DRM) where the server is an untrusted server that may not be secure, but the client is secure. This method operates to authenticate the server to the client and vice versa to defeat hacking attacks intended to obtain confidential information. Values passed between the server and the client include encrypted random numbers, authentication values and other verification data generated using cryptographic techniques including double encryption.
    Type: Application
    Filed: November 15, 2011
    Publication date: May 16, 2013
    Applicant: Apple Inc.
    Inventors: Augustin J. FARRUGIA, Gelareh TABAN, Amine El KAMEL, Gianpaolo FASOLI, Srinivas VEDULA
  • Publication number: 20130125242
    Abstract: A software version control system manages versioned applications in a client-server computing system environment. Thereby this is a management system for computer application (software) distribution where a number of client devices coupled to a server may be executing different versions of a particular computing application. The system manages updates to the applications and enforces rules or policies to use the most recent version whenever possible.
    Type: Application
    Filed: November 15, 2011
    Publication date: May 16, 2013
    Applicant: Apple Inc.
    Inventors: Augustin J. FARRUGIA, Gelareh TABAN, Amine El KAMEL, Gianpaolo FASOLI, Srinivas VEDULA
  • Patent number: 8412931
    Abstract: Techniques for credential strength analysis via failed intruder access attempts are presented. Intruders attempting to access a secure network with failed credentials are monitored. The failed credentials are retained and evaluated in view of previously recorded failed credentials. Credential policy is updated in response to the evaluation and intruder trends and sophistication levels are also predicted in response to the evaluation.
    Type: Grant
    Filed: December 27, 2007
    Date of Patent: April 2, 2013
    Assignee: Apple Inc.
    Inventors: Srinivas Vedula, Cameron Craig Morris
  • Patent number: 8332918
    Abstract: Techniques real-time adaptive password policies are presented. Patterns for passwords are regularly analyzed along with other factors associated with the patterns to dynamically determine password strength values. The strength values can change over time based on usage statistics. When a strength value falls below an acceptable threshold, passwords associated with that particular pattern can be downgraded or rejected in real-time and existing policy can be adapted to reflect the undesirability of that pattern.
    Type: Grant
    Filed: December 6, 2007
    Date of Patent: December 11, 2012
    Assignee: Novell, Inc.
    Inventors: Srinivas Vedula, Cameron Craig Morris, Larry Hal Henderson
  • Patent number: 8302210
    Abstract: Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for call path enforcement. The method includes tracking, during run-time, a run-time call order for a series of function calls in a software program, and when executing a protected function call during run-time, allowing or causing proper execution of a protected function call only if the run-time call order matches a predetermined order. The predetermined order can be an expected run-time call order based on a programmed order of function calls in the software program. The method can include maintaining an evolving value associated with the run-time call order and calling the protected function by passing the evolving value and function parameters corrupted based on the evolving value. The protected function uncorrupts the corrupted parameters based on the passed evolving value and an expected predetermined call order. A buffer containing the uncorrupted parameters can replace the corrupted parameters.
    Type: Grant
    Filed: August 24, 2009
    Date of Patent: October 30, 2012
    Assignee: Apple Inc.
    Inventors: Ginger M. Myles, Srinivas Vedula, Gianpaolo Fasoli, Julien Lerouge, Tanya Michelle Lattner, Augustin J. Farrugia
  • Patent number: 8286000
    Abstract: Techniques for dynamic generation and management of password dictionaries are presented. Passwords are parsed for recognizable terms. The terms are housed in dictionaries or databases. Statistics associated with the terms are maintained and managed. The statistics are used to provide strength values to the passwords and determine when passwords are acceptable and unacceptable.
    Type: Grant
    Filed: December 7, 2007
    Date of Patent: October 9, 2012
    Assignee: Novell, Inc.
    Inventors: Srinivas Vedula, Cameron Craig Morris
  • Patent number: 8250633
    Abstract: In various embodiments, techniques for flexible resource authentication are provided. A principal attempts to login to a target resource using first credentials. The target resource does not recognize the first credentials and in response thereto forwards the first credentials to an identity service. The identity service authenticates the principal via the first credentials and supplies second credentials to the target resource. The target resource recognizes and authenticates the second credentials and grants access to the principal.
    Type: Grant
    Filed: October 26, 2007
    Date of Patent: August 21, 2012
    Assignee: EMC Corporation
    Inventors: Srinivas Vedula, Larry Hal Henderson, Stephen Kent Winn
  • Patent number: 8131758
    Abstract: Techniques for recognizing multiple patterns within a string of characters are presented. A dictionary is hierarchically organized, such that leaf nodes within the dictionary represents words defined in the dictionary. A string of characters are received. Each character within the string is traversed by attempting to match it with a character defined in the dictionary. As long as a match continues with the dictionary the characters within the string are traversed. Once a longest possible match to a word within the dictionary is found, the next character following the last matched character for the string is processed.
    Type: Grant
    Filed: December 26, 2007
    Date of Patent: March 6, 2012
    Assignee: Novell, Inc.
    Inventors: Cameron Craig Morris, Lloyd Leon Burch, Srinivas Vedula
  • Patent number: 8079069
    Abstract: Before a relying party grants a client access to a resource, the last use of the security token by the client to access the resource of the relying party can be verified. Verification can be accomplished by comparing the last time the client sent the security token to the relying party with the last time the relying party received the security token from the client. If the last use of the security token is not verified, the possibility exists that the security token has been fraudulently used by a third party.
    Type: Grant
    Filed: March 24, 2008
    Date of Patent: December 13, 2011
    Assignee: Oracle International Corporation
    Inventors: Lloyd Leon Burch, Srinivas Vedula
  • Publication number: 20110047622
    Abstract: Disclosed herein are systems, computer-implemented methods, and computer-readable storage media for call path enforcement. The method includes tracking, during run-time, a run-time call order for a series of function calls in a software program, and when executing a protected function call during run-time, allowing or causing proper execution of a protected function call only if the run-time call order matches a predetermined order. The predetermined order can be an expected run-time call order based on a programmed order of function calls in the software program. The method can include maintaining an evolving value associated with the run-time call order and calling the protected function by passing the evolving value and function parameters corrupted based on the evolving value. The protected function uncorrupts the corrupted parameters based on the passed evolving value and an expected predetermined call order. A buffer containing the uncorrupted parameters can replace the corrupted parameters.
    Type: Application
    Filed: August 24, 2009
    Publication date: February 24, 2011
    Applicant: Apple Inc.
    Inventors: Ginger M. Myles, Srinivas Vedula, Gianpaolo Fasoli, Julien Lerouge, Tanya Michelle Lattner, Augustin J. Farrugia
  • Publication number: 20090241178
    Abstract: Before a relying party grants a client access to a resource, the last use of the security token by the client to access the resource of the relying party can be verified. Verification can be accomplished by comparing the last time the client sent the security token to the relying party with the last time the relying party received the security token from the client. If the last use of the security token is not verified, the possibility exists that the security token has been fraudulently used by a third party.
    Type: Application
    Filed: March 24, 2008
    Publication date: September 24, 2009
    Applicant: Novell, Inc.
    Inventors: Lloyd Leon Burch, Srinivas Vedula
  • Publication number: 20090171953
    Abstract: Techniques for recognizing multiple patterns within a string of characters are presented. A dictionary is hierarchically organized, such that leaf nodes within the dictionary represents words defined in the dictionary. A string of characters are received. Each character within the string is traversed by attempting to match it with a character defined in the dictionary. As long as a match continues with the dictionary the characters within the string are traversed. Once a longest possible match to a word within the dictionary is found, the next character following the last matched character for the string is processed.
    Type: Application
    Filed: December 26, 2007
    Publication date: July 2, 2009
    Inventors: Cameron Craig Morris, Lloyd Leon Burch, Srinivas Vedula
  • Publication number: 20090172788
    Abstract: Techniques for credential strength analysis via failed intruder access attempts are presented. Intruders attempting to access a secure network with failed credentials are monitored. The failed credentials are retained and evaluated in view of previously recorded failed credentials. Credential policy is updated in response to the evaluation and intruder trends and sophistication levels are also predicted in response to the evaluation.
    Type: Application
    Filed: December 27, 2007
    Publication date: July 2, 2009
    Inventors: Srinivas Vedula, Cameron Craig Morris