Patents by Inventor Venkataramann Renganathan

Venkataramann Renganathan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9191405
    Abstract: A canary value is used to validate a message from a non-web browser client application to a web server providing web services to mitigate cross-site forgery attacks. The canary value is generated by the server in party by applying a hash function to a user identifier and a time stamp. The server provides the canary value to the client application in response to receiving a message that does not have a canary or has an expired canary. The client application upon receiving an error message with a canary message will resend the prior message with the canary value present. The client application caches the canary value for subsequent messages until a new canary value is received. The canary value allows the server to ignore messages generated by the client application under control of an attacker.
    Type: Grant
    Filed: January 30, 2012
    Date of Patent: November 17, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Thomas Patrick Gallagher, Venkataramann Renganathan, Brian Thomas Carver, Muhammed Serdar Soran, Matthew Michael Swann, Trace David Ferrier
  • Patent number: 8667284
    Abstract: A secure hash, such as a Hash-based Message Authentication Code (“HMAC”), is generated using a piece of secret information (e.g., a secret key) and a piece of public information specific to each escrow key (e.g., a certificate hash or public key). Using the secret key ensures that escrow key validation data can only be generated by knowing the secret key, which prevents an attacker from generating the appropriate escrow key validation data. Using the certificate hash as the public data ties each escrow key validation data to a particular certificate, thereby preventing the attacker from simply copying the validation data from another escrow key. Any escrow key that is found to be invalid may be removed from the file container and a system audit log may be generated so that a company, individual, or other entity can be aware of the possible attempt at a security breach.
    Type: Grant
    Filed: January 13, 2012
    Date of Patent: March 4, 2014
    Assignee: Microsoft Corporation
    Inventors: Venkataramann Renganathan, Brian Thomas Carver, Daniel Browne Jump, David Charles LeBlanc, Samuel Ira Weiss
  • Publication number: 20130198294
    Abstract: A canary value is used to validate a message from a non-web browser client application to a web server providing web services to mitigate cross-site forgery attacks. The canary value is generated by the server in party by applying a hash function to a user identifier and a time stamp. The server provides the canary value to the client application in response to receiving a message that does not have a canary or has an expired canary. The client application upon receiving an error message with a canary message will resend the prior message with the canary value present. The client application caches the canary value for subsequent messages until a new canary value is received. The canary value allows the server to ignore messages generated by the client application under control of an attacker.
    Type: Application
    Filed: January 30, 2012
    Publication date: August 1, 2013
    Applicant: Microsoft Corporation
    Inventors: Thomas Patrick Gallagher, Venkataramann Renganathan, Brian Thomas Carver, Muhammed Serdar Soran, Matthew Michael Swann, Trace David Ferrier
  • Publication number: 20130185557
    Abstract: A secure hash, such as a Hash-based Message Authentication Code (“HMAC”), is generated using a piece of secret information (e.g., a secret key) and a piece of public information specific to each escrow key (e.g., a certificate hash or public key). Using the secret key ensures that escrow key validation data can only be generated by knowing the secret key, which prevents an attacker from generating the appropriate escrow key validation data. Using the certificate hash as the public data ties each escrow key validation data to a particular certificate, thereby preventing the attacker from simply copying the validation data from another escrow key. Any escrow key that is found to be invalid may be removed from the file container and a system audit log may be generated so that a company, individual, or other entity can be aware of the possible attempt at a security breach.
    Type: Application
    Filed: January 13, 2012
    Publication date: July 18, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Venkataramann Renganathan, Brian Thomas Carver, Daniel Browne Jump, David Charles LeBlanc, Samuel Ira Weiss