Patents by Inventor Varun SHIMOGA PRAKASH
Varun SHIMOGA PRAKASH has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240064145Abstract: An identity broker receives a request for access by a client device to a service provided by a server. In response to the request, the identity broker communicates with the client device to determine whether a security risk is associated with allowing the client device to access data of a service provider. An identifier assigned to the client device is used to identify a user session between the client device and the service provider. Continuous monitoring of the client device is performed to identify any security risks associated with the user session. If a risk is identified, the identifier is used to revoke the user session.Type: ApplicationFiled: October 16, 2023Publication date: February 22, 2024Inventors: Réda Zerrad, Dhruva Gopal, Sneha Sachidananda, Dayyan Yoon Lord, Varun Shimoga Prakash, Christopher Brandon Leach, Brian James Buck, Jeroen Martijn Wijdogen
-
Publication number: 20240064518Abstract: Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server. A device determine its location and identifies a security policy identifier mapped to a zone including the location. The device requests the security policy corresponding to the identifier from a server and implements it. The device may also store a database of the security policies and implement them according to its location. Devices registered for a user evaluate whether locations detected for the devices correspond to impossible travel by the user. Objects encoding geolocation data of a device may be encrypted with a private key of the device and the public key of another to prevent access by an intermediary server.Type: ApplicationFiled: October 31, 2023Publication date: February 22, 2024Inventors: Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
-
Patent number: 11849304Abstract: Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server. A device determine its location and identifies a security policy identifier mapped to a zone including the location. The device requests the security policy corresponding to the identifier from a server and implements it. The device may also store a database of the security policies and implement them according to its location. Devices registered for a user evaluate whether locations detected for the devices correspond to impossible travel by the user. Objects encoding geolocation data of a device may be encrypted with a private key of the device and the public key of another to prevent access by an intermediary server.Type: GrantFiled: November 3, 2022Date of Patent: December 19, 2023Assignee: LOOKOUT INC.Inventors: Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
-
Patent number: 11818129Abstract: An identity broker receives a request for access by a client device to a service provided by a server. In response to the request, the identity broker communicates with a client device to determine whether a security risk is associated with allowing the client device to access data of a service provider. If the client device is secure, the identity broker sends an authentication request to an identity provider. After the identity provider authenticates the client device, the identity broker passes the authentication to the server, which establishes a session with the client device to provide the service. The security state of the client continues to be monitored to determine whether access should continue to be permitted to data associated with a service provider.Type: GrantFiled: June 5, 2020Date of Patent: November 14, 2023Assignee: Lookout, Inc.Inventors: Réda Zerrad, Dhruva Gopal, Sneha Sachidananda, Dayyan Yoon Lord, Varun Shimoga Prakash, Christopher Brandon Leach, Brian James Buck, Jeroen Martijn Wijdogen
-
Publication number: 20230056369Abstract: Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device’s location to a server. A device determine its location and identifies a security policy identifier mapped to a zone including the location. The device requests the security policy corresponding to the identifier from a server and implements it. The device may also store a database of the security policies and implement them according to its location. Devices registered for a user evaluate whether locations detected for the devices correspond to impossible travel by the user. Objects encoding geolocation data of a device may be encrypted with a private key of the device and the public key of another to prevent access by an intermediary server.Type: ApplicationFiled: November 3, 2022Publication date: February 23, 2023Inventors: Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
-
Patent number: 11523282Abstract: Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server. A device determine its location and identifies a security policy identifier mapped to a zone including the location. The device requests the security policy corresponding to the identifier from a server and implements it. The device may also store a database of the security policies and implement them according to its location. Devices registered for a user evaluate whether locations detected for the devices correspond to impossible travel by the user. Objects encoding geolocation data of a device may be encrypted with a private key of the device and the public key of another to prevent access by an intermediary server.Type: GrantFiled: February 5, 2020Date of Patent: December 6, 2022Assignee: LOOKOUT INC.Inventors: Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
-
Publication number: 20210243595Abstract: Security policies are made dependent on location of a device and the location of a device is determined and the appropriate security policy applied without providing the device's location to a server. A device determine its location and identifies a security policy identifier mapped to a zone including the location. The device requests the security policy corresponding to the identifier from a server and implements it. The device may also store a database of the security policies and implement them according to its location. Devices registered for a user evaluate whether locations detected for the devices correspond to impossible travel by the user. Objects encoding geolocation data of a device may be encrypted with a private key of the device and the public key of another to prevent access by an intermediary server.Type: ApplicationFiled: February 5, 2020Publication date: August 5, 2021Inventors: Brian James Buck, Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak, Praveen Kumar Mamnani
-
Publication number: 20200304503Abstract: An identity broker receives a request for access by a client device to a service provided by a server. In response to the request, the identity broker communicates with a client device to determine whether a security risk is associated with allowing the client device to access data of a service provider. If the client device is secure, the identity broker sends an authentication request to an identity provider. After the identity provider authenticates the client device, the identity broker passes the authentication to the server, which establishes a session with the client device to provide the service. The security state of the client continues to be monitored to determine whether access should continue to be permitted to data associated with a service provider.Type: ApplicationFiled: June 5, 2020Publication date: September 24, 2020Inventors: Réda Zerrad, Dhruva Gopal, Sneha Sachidananda, Dayyan Yoon Lord, Varun Shimoga Prakash, Christopher Brandon Leach, Brian James Buck, Jeroen Martijn Wijdogen
-
Patent number: 10785230Abstract: An identity broker receives a request for access by a client device to a service provided by a server. In response to the request, the identity broker determines an identity of the client device using a client certificate. The identity broker also determines whether the client device is in a secure state. If the client device is secure, the identity broker sends an authentication request to an identity provider. After the identity provider authenticates the client device, the identity broker passes the authentication to the server, which establishes a session with the client device to provide the service.Type: GrantFiled: October 28, 2019Date of Patent: September 22, 2020Assignee: Lookout, Inc.Inventors: Réda Zerrad, Dhruva Gopal, Sneha Sachidananda, Dayyan Yoon Lord, Varun Shimoga Prakash, Christopher Brandon Leach, Brian James Buck
-
Publication number: 20200287910Abstract: An identity broker receives a request for access by a client device to a service provided by a server. In response to the request, the identity broker determines an identity of the client device using a client certificate. The identity broker also determines whether the client device is in a secure state. If the client device is secure, the identity broker sends an authentication request to an identity provider. After the identity provider authenticates the client device, the identity broker passes the authentication to the server, which establishes a session with the client device to provide the service.Type: ApplicationFiled: October 28, 2019Publication date: September 10, 2020Inventors: Réda Zerrad, Dhruva Gopal, Sneha Sachidananda, Dayyan Yoon Lord, Varun Shimoga Prakash, Christopher Brandon Leach, Brian James Buck
-
Patent number: 10158622Abstract: A system and method are presented for providing generic single sign-on in an electronic device. Information is received that identifies one or more applications and associated identity authenticators and a whitelist of the identified applications and authenticators is created. A request for an access token is received from a requesting application. If the requesting application is listed in the whitelist, an authenticator associated with the requesting application is determined and a request for an access token is sent to the associated authenticator. In response to the request, an access token is received from the authenticator and the access token is sent to the requesting application. If the requesting application is not listed in the whitelist, a predefined response message is sent to the requesting application.Type: GrantFiled: December 22, 2015Date of Patent: December 18, 2018Assignee: Samsung Electronics Co., Ltd.Inventors: Haiqing Jiang, Varun Shimoga Prakash, Xiao Liu, Pavan Kumar Emani, Xiao Zhang, Xinwen Zhang
-
Patent number: 10021103Abstract: An apparatus and method to authorize Application Programming Interface (API) or method level access in system and application services are provided. The method includes receiving a request for access to a service from another service or an application via an interface accessible by the other service or the application, and determining whether to authorize the request based at least in part on a specified policy.Type: GrantFiled: November 28, 2014Date of Patent: July 10, 2018Assignee: Samsung Electronics Co., Ltd.Inventors: Jinlin Xu, Haiqing Jiang, Varun Shimoga Prakash, Arun Venkatesan, Renuka Srinivasan, Xinwen Zhang
-
Publication number: 20160255075Abstract: A system and method are presented for providing generic single sign-on in an electronic device. Information is received that identifies one or more applications and associated identity authenticators and a whitelist of the identified applications and authenticators is created. A request for an access token is received from a requesting application. If the requesting application is listed in the whitelist, an authenticator associated with the requesting application is determined and a request for an access token is sent to the associated authenticator. In response to the request, an access token is received from the authenticator and the access token is sent to the requesting application.Type: ApplicationFiled: December 22, 2015Publication date: September 1, 2016Applicant: Samsung Electronics Co., Ltd.Inventors: Haiqing Jiang, Varun Shimoga Prakash, Xiao Liu, Pavan Kumar Emani, Xiao Zhang, Xinwen Zhang
-
Publication number: 20150244724Abstract: An apparatus and method to authorize Application Programming Interface (API) or method level access in system and application services are provided. The method includes receiving a request for access to a service from another service or an application via an interface accessible by the other service or the application, and determining whether to authorize the request based at least in part on a specified policy.Type: ApplicationFiled: November 28, 2014Publication date: August 27, 2015Inventors: Jinlin XU, Haiqing JIANG, Varun SHIMOGA PRAKASH, Arun VENKATESAN, Renuka SRINIVASAN, Xinwen ZHANG