Patents by Inventor Tanmoy Dutta

Tanmoy Dutta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080097954
    Abstract: A requester may request a ranged lookup operation with respect to an encrypted column of a database. An indexing structure may be used to perform the ranged lookup operation. The indexing structure may include multiple entries. Each of the entries of the indexing structure may include an index value and retrieval information for retrieving a corresponding row of the database. The index value of each entry may correspond to a respective decrypted data item from the encrypted column of the database, which was transformed by a transformation function such that the transformed decrypted data item may reveal less information than the decrypted data item before being transformed by the transformation function. When the respective index value of one of the entries of the indexing structure satisfies the received ranged lookup request, the respective retrieval information may be used to retrieve a corresponding row of data from the database.
    Type: Application
    Filed: October 20, 2006
    Publication date: April 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Tanmoy Dutta, Raul Garcia
  • Publication number: 20080065893
    Abstract: In one embodiment, an object in a database schema may be verified as having a valid digital signature associated with a trusted entity. An application may be permitted access to the object of the database schema only when the object of the database schema is verified to have a valid digital signature associated with the trusted entity. In another embodiment, an object in a database schema may be verified as having a digital signature associated with at least one trusted entity. An application may be permitted access to the object of the database schema only when the digital signature for the object is verified to be associated with the at least one trusted entity.
    Type: Application
    Filed: September 12, 2006
    Publication date: March 13, 2008
    Applicant: Microsoft Corporation
    Inventors: Tanmoy Dutta, Raul Garcia, Steven Richard Gott, Ruslan Pavlovich Ovechkin, Roger Lynn Wolter
  • Publication number: 20080059414
    Abstract: An indexing value may be determined, transparently with respect to a requester, based on a desired plaintext item of data and a cryptographic key. The indexing value may be used to access an entry in an indexing structure to obtain a corresponding database entry which includes a non-deterministically encrypted ciphertext item. In another embodiment, an indexing structure for a database may be accessed. Positions of items of the indexing structure may be based on corresponding plaintext items. References related to the corresponding plaintext items in the indexing structure may be encrypted and other information in the indexing structure may be unencrypted. A portion of the indexing structure may be loaded into a memory and at least one of the encrypted references related to one of the plaintext items may be decrypted. The decrypted reference may be used to access a corresponding non-deterministically encrypted data item from the database.
    Type: Application
    Filed: September 6, 2006
    Publication date: March 6, 2008
    Applicant: Microsoft Corporation
    Inventors: Elena Daniela Cristofor, Laurentiu Bogdan Cristofor, Tanmoy Dutta, Raul Garcia, Sung L. Hsueh
  • Publication number: 20070174285
    Abstract: A system and method for facilitating secure access to database(s) is provided. The system relates to authorizing discriminatory access to relational database data. More particularly, the invention provides for an innovative technique of defining secured access to rows in relational database tables in a way that cannot be spoofed while preserving various optimization techniques. The invention affords a persistent scheme via providing for a security architecture whereby discriminatory access policies on persistent entities can be defined and enforced while preserving set based associative query capabilities. A particular aspect of the invention relates to the specification of such policies and the technique by which those policies are enforced. With respect to one particular implementation of the invention, creation, modification and deletion of access control lists called security descriptors is provided.
    Type: Application
    Filed: April 3, 2007
    Publication date: July 26, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Tanmoy Dutta, Conor Cunningham, Stefano Stefani, Girish Chander, Eric Hanson
  • Patent number: 7200595
    Abstract: A system and method for facilitating secure access to database(s) is provided. The system relates to authorizing discriminatory access to relational database data. More particularly, the invention provides for an innovative technique of defining secured access to rows in relational database tables in a way that cannot be spoofed while preserving various optimization techniques. The invention affords a persistent scheme via providing for a security architecture whereby discriminatory access policies on persistent entities can be defined and enforced while preserving set based associative query capabilities. A particular aspect of the invention relates to the specification of such policies and the technique by which those policies are enforced. With respect to one particular implementation of the invention, creation, modification and deletion of access control lists called security descriptors is provided.
    Type: Grant
    Filed: June 28, 2004
    Date of Patent: April 3, 2007
    Assignee: Microsoft Corporation
    Inventors: Tanmoy Dutta, Conor Cunningham, Stefano Stefani, Girish Chander, Eric N. Hanson
  • Publication number: 20070005600
    Abstract: A database management system that supports multiple databases in an instance with controlled sharing between the databases. The invention can also support execution of procedures and other modules in the context of any principal possibly different from that of the caller. Trusted certificates can be employed to permit access to procedures (or other modules). The security context of the invention can enable the building blocks of building a pure trusted sub-system model of authorization.
    Type: Application
    Filed: June 29, 2005
    Publication date: January 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Tanmoy Dutta, Raul Garcia, Ziquan Li, Girish Chander
  • Publication number: 20060288214
    Abstract: A database management system that supports multiple databases in an instance with controlled sharing between the databases. The invention can also support execution of procedures and other modules in the context of any principal possibly different from that of the caller. Trusted certificates can be employed to permit access to procedures (or other modules).
    Type: Application
    Filed: June 17, 2005
    Publication date: December 21, 2006
    Applicant: Microsoft Corporation
    Inventors: Tanmoy Dutta, Girish Chander, Raul Garcia, Ziquan Li
  • Publication number: 20060282433
    Abstract: Provided are systems and methods that facilitate providing permission to entities of a database. A system includes a component that authorizes a principal of a containing entity to grant a permission to that entity, and a component that grants the permission to the containing entity, the grantee of the permission inherits a set of permissions to one or more entities contained by the containing entity. When a permission is granted to a parent in a hierarchy of a relational database, the permission is inherited by the child nodes. Also provided is a method for transferring ownership of entities in a relational database. The method includes a two-part handshake that can be audited to avoid repudiation issues.
    Type: Application
    Filed: June 14, 2005
    Publication date: December 14, 2006
    Applicant: Microsoft Corporation
    Inventors: Tanmoy Dutta, Girish Chander, Ziquan Li, Steven Gott, Clifford Dibble
  • Publication number: 20060253443
    Abstract: The subject invention relates to systems and methods that provide region-based security to database objects having hierarchical relationships. In one aspect, a system is provided that facilitates database security and management. The system includes a database component that stores a plurality of objects having a hierarchical relationship between the objects. A region component defines security zones for a subset of the objects and maps security data to the subset, wherein the security zones are independent, decoupled, or disassociated from the hierarchical relationships between the objects.
    Type: Application
    Filed: May 4, 2005
    Publication date: November 9, 2006
    Applicant: Microsoft Corporation
    Inventors: Ziquan Li, Tanmoy Dutta
  • Publication number: 20060149831
    Abstract: A computer based system and method of providing document isolation during routing of a document through a workflow is disclosed. The method comprises maintaining a separate “working” copy of the original base document while the document is routed through a workflow. Access controls, which define who may access the original document as well as any versions of the working copy document, are defined and stored in relation to the documents. The access controls further define the types of actions users may take with respect to the document. Users are selectively directed to the appropriate document, either the base document or working copy, and selectively granted permission to perform publishing operations on the working copy document, as determined by the access controls.
    Type: Application
    Filed: February 15, 2006
    Publication date: July 6, 2006
    Applicant: Microsoft Corporation
    Inventors: Tanmoy Dutta, Alexander Balikov, Himani Naresh
  • Patent number: 7035910
    Abstract: A computer based system and method of providing document isolation during routing of a document through a workflow is disclosed. The method comprises maintaining a separate “working” copy of the original base document while the document is routed through a workflow. Access controls, which define who may access the original document as well as any versions of the working copy document, are defined and stored in relation to the documents. The access controls further define the types of actions users may take with respect to the document. Users are selectively directed to the appropriate document, either the base document or working copy, and selectively granted permission to perform publishing operations on the working copy document, as determined by the access controls.
    Type: Grant
    Filed: June 29, 2000
    Date of Patent: April 25, 2006
    Assignee: Microsoft Corporation
    Inventors: Tanmoy Dutta, Alexander Balikov, Himani Naresh
  • Patent number: 6976259
    Abstract: A system and method employ a client-server architecture that abstracts from the client the states of objects and transitions between the states. As a result, the server maintains objects, along with associated states, and state transitions that are provided to clients on demand. The client is only provided with a set of valid transitions between states that are based on the current state of the object and valid transitions out of that state. The states may be additionally filtered based on the permissions granted to the client. In this way, the client is relieved of prior knowledge of valid object states and state transitions. Hence, in a document management system, for example, new states and transitions for objects may be added at the server and propagated through to the clients.
    Type: Grant
    Filed: September 29, 2000
    Date of Patent: December 13, 2005
    Assignee: Microsoft Corporation
    Inventors: Tanmoy Dutta, Jeremy Mazner
  • Publication number: 20050246315
    Abstract: A system and method employ a client-server architecture that abstracts from the client the states of objects and transitions between the states. As a result, the server maintains objects, along with associated states, and state transitions that are provided to clients on demand. The client is only provided with a set of valid transitions between states that are based on the current state of the object and valid transitions out of that state. The states may be additionally filtered based on the permissions granted to the client. In this way, the client is relieved of prior knowledge of valid object states and state transitions. Hence, in a document management system, for example, new states and transitions for objects may be added at the server and propagated through to the clients.
    Type: Application
    Filed: July 1, 2005
    Publication date: November 3, 2005
    Applicant: Microsoft Corporation
    Inventors: Tanmoy Dutta, Jeremy Mazner
  • Publication number: 20050216465
    Abstract: A system and method for facilitating secure access to database(s) is provided. The system relates to authorizing discriminatory access to relational database data. More particularly, the invention provides for an innovative technique of defining secured access to rows in relational database tables in a way that cannot be spoofed while preserving various optimization techniques. The invention affords a persistent scheme via providing for a security architecture whereby discriminatory access policies on persistent entities can be defined and enforced while preserving set based associative query capabilities. A particular aspect of the invention relates to the specification of such policies and the technique by which those policies are enforced. With respect to one particular implementation of the invention, creation, modification and deletion of access control lists called security descriptors is provided.
    Type: Application
    Filed: June 28, 2004
    Publication date: September 29, 2005
    Applicant: Microsoft Corporation
    Inventors: Tanmoy Dutta, Conor Cunningham, Stefano Stefani, Girish Chander, Eric Hanson
  • Publication number: 20050177570
    Abstract: The systems and methods of the present invention facilitate database row-level security by utilizing SQL extensions to create and associate named security expressions with a query initiator(s). Such expressions include Boolean expressions, which must be satisfied by a row of data in order for that data to be made accessible to the query initiator. In general, a query is augmented with security expressions, which are aggregated and utilized during querying rows of data. The systems and methods variously place security expressions within a query in order to optimize query performance while mitigating information leaks. This is achieved by tagging security expressions as special and utilizing rules of predicate to pull or push non-security expressions above or below security expressions, depending on the likelihood of a non-security being safe, as determined via a static and/or dynamic analysis.
    Type: Application
    Filed: July 7, 2004
    Publication date: August 11, 2005
    Applicant: Microsoft Corporation
    Inventors: Tanmoy Dutta, Girish Chander, Laurentiu Cristofor, Rodger Kline, James Hamilton