Microsoft since Sep 2004
Senior Lead Software Engineer
Epic Systems Aug 2002 - Aug 2004
Software Engineer
HCL Technologies Feb 1999 - Jun 1999
Software Developer
Education:
The University of Georgia 2000 - 2002
MS, Computer Science
Anna University 1995 - 1999
BS, Computer Science
Skills:
Discrete Optimization Logistics Amazon Web Services Operating Systems Software Engineering Distributed Systems Software Design Software Development Security Enterprise Software Test Automation Agile Methodologies C# C++ C Object Oriented Design Web Services System Architecture Scalability Scrum Debugging Perl Multithreading Algorithms Embedded Systems Eclipse Cloud Computing
Languages:
English Hindi Tamil
Us Patents
Isolation Of Services Or Processes Using Credential Managed Accounts
Scott A. Field - Redmond WA, US Ramesh Chinta - Sammamish WA, US Liqiang Zhu - Redmond WA, US Umit Akkus - Bellevue WA, US Siddharth Bhai - Redmond WA, US Gopinathan Kannan - Redmond WA, US James J. Simmons - Bothel WA, US Qi Cao - Bellevue WA, US Paul Miller - Redmond WA, US Ryan Fairfax - Redmond WA, US Alexandru Hanganu - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/32
US Classification:
726 4, 726 6
Abstract:
This disclosure describes methods, systems, and application programming interfaces for creating a credential managed account. This disclosure describes creating a new password managed account, defining the password managed account, wherein the password managed account is to access a service on a managed computing device, identifying the password managed account for a lifecycle, and automatically managing the password managed account by updating and changing a password for the password managed account on a periodic basis.
Distributed Computer Systems With Time-Dependent Credentials
Mark Novak - Newcastle WA, US Paul J. Leach - Seattle WA, US Yi Zeng - Bothell WA, US Saurav Sinha - Kirkland WA, US K. Michiko Short - Renton WA, US Gopinathan Kannan - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00
US Classification:
726 6
Abstract:
A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential.
Distributed Computer Systems With Time-Dependent Credentials
Mark Novak - Newscatle WA, US Paul J. Leach - Seattle WA, US Yi Zeng - Bothell WA, US Saurav Sinha - Kirkland WA, US K. Michiko Short - Renton WA, US Gopinathan Kannan - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00
US Classification:
726 6
Abstract:
A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential.
Distributed Computer Systems With Time-Dependent Credentials
Mark Novak - Newcatle WA, US Paul J. Leach - Seattle WA, US Yi Zeng - Bothell WA, US Saurav Sinha - Kirkland WA, US K. Michiko Short - Renton WA, US Gopinathan Kannan - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 21/00
US Classification:
726 6
Abstract:
A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transition intervals in which different ones of the controllers may generate different credentials at the same absolute time. During a transition interval, controllers and other devices may use credentials differentially based on the nature of the authentication function. Each controller may periodically renew its credentials based on self-scheduled renewals or based on requests from other devices, such that renewal times are offset by random delays to avoid excessive network traffic. Controllers may determine which credential is valid for any given time, based on a cryptographically secure key associated with that time and information identifying the entity that is associated with that credential.
Saurav Sinha - Kirkland WA, US Ruslan Ovechkin - Redmond WA, US Gopinathan Kannan - Redmond WA, US Vijay G. Bharadwaj - Redmond WA, US Christopher R. Macaulay - Seattle WA, US Eric Fleischman - Redmond WA, US Nathan J. Ide - Bothell WA, US Kun Liu - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 12/14
US Classification:
713193
Abstract:
Techniques for secure data synchronization are described. In one or more implementations, techniques may be employed to conserve high cost data storage by storing larger portions of encrypted data in low cost storage, while storing relatively smaller encryption keys in higher cost storage. A device that is granted access to the encryption keys can retrieve the encrypted data from the low cost storage and use the encryption keys to decrypt the encrypted data.
Gopinathan Kannan - Redmond WA, US Mitica Manu - Sammamish WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 17/30
US Classification:
707758, 707E1701, 707E17005
Abstract:
Methods, systems, and computer program products are provided for using a claims model to control the execution of an execution unit. The execution unit is executed. An identity principal is identified under which the execution unit is executed. At least one claim is identified that is required for the execution unit. Each identified claim has a claim name and a claim value. One or more claims associated with the identified identity principal is/are requested from a claims provider. The claim(s) is/are received from the claims provider. The received claim(s) is/are compared with the identified claim(s). An action for the identified claim(s) is determined based on a result of the comparison.
- Redmond WA, US Saurav SINHA - Bellevue WA, US Ruslan OVECHKIN - Redmond WA, US Gopinathan KANNAN - Redmond WA, US Vijay G. BHARADWAJ - Sammamish WA, US Christopher R. MACAULAY - Seattle WA, US Eric FLEISCHMAN - Redmond WA, US Nathan J. IDE - Bothell WA, US Kun LIU - Redmond WA, US
International Classification:
G06F 21/62 H04L 29/06 G06F 21/44
Abstract:
Techniques for secure data synchronization are described. In one or more implementations, a determination is made as to whether enterprise data is stored locally on a first device corresponding to an enterprise device. Based on a determination that the second device is a non-enterprise device, a determination is made as to whether a permission associated with the first device indicates that the first device is permitted to propagate the enterprise data to non-enterprise devices. If the first device lacks permission to propagate the enterprise data to non-enterprise devices, the enterprise data is prevented from being propagated to the second device.
- Redmond WA, US Saurav Sinha - Bellevue WA, US Ruslan Ovechkin - Redmond WA, US Gopinathan Kannan - Redmond WA, US Vijay G. Bharadwaj - Sammamish WA, US Christopher R. Macaulay - Seattle WA, US Eric Fleischman - Redmond WA, US Nathan J. Ide - Bothell WA, US Kun Liu - Redmond WA, US
Assignee:
Microsoft Technology Licensing, LLC - Redmond WA
International Classification:
G06F 21/62 H04L 29/06 G06F 21/44
Abstract:
Techniques for secure data synchronization are described. In one or more implementations, a determination is made as to whether enterprise data is stored locally on a first device corresponding to an enterprise device. Based on a determination that the second device is a non-enterprise device, a determination is made as to whether a permission associated with the first device indicates that the first device is permitted to propagate the enterprise data to non-enterprise devices. If the first device lacks permission to propagate the enterprise data to non-enterprise devices, the enterprise data is prevented from being propagated to the second device.
Googleplus
Gopinathan Kannan
Gopinathan Kannan
Gopinathan Kannan
Youtube
Rockin GroupDance of CSE in SREC
SREC(Sri Ramanujar Engg College) Culturals April'09.. Super hit, A1 da...
Category:
Entertainment
Uploaded:
21 Apr, 2009
Duration:
4m 8s
KCS Summer Dreams 2010 ~ Seematti show - Take...
KCS Summer Dreams 2010 ~ Seematti show - Take it Easy - Happy Husbands...
Category:
Entertainment
Uploaded:
09 May, 2010
Duration:
2m 53s
NeeyaNaana Naveena othukkapadugirav...
intresting
Category:
Entertainment
Uploaded:
13 Dec, 2008
Duration:
6m 16s
Neeya Naana - Journey of Neeya naana Hong Kong
The journey of neeya naana in hong kong... Videographed by Sam. Arrang...
Category:
Entertainment
Uploaded:
21 Oct, 2007
Duration:
1m 30s
modern krishnan abhinav mahesh
created by mahesh gopinath (kannan) paruthickal house komana ambalapuz...
Category:
Entertainment
Uploaded:
21 Jul, 2010
Duration:
1m 25s
3-yr-old boy dies after falling in borewell
Three-year-old Gopinath, son of daily wage labourer Kannan, died after...
Category:
News & Politics
Uploaded:
27 Aug, 2009
Duration:
1m 37s
Kalaimamani Seerkazhi R. Jeyaraman
Seerkazhi Jeyaraman in a concert with MR Gopinath, D. Govindarajan and...
Category:
Music
Uploaded:
13 Apr, 2010
Duration:
5m 17s
Vocal by OS Arun - Part 03
Watch OS Arun's vocal concert at Chennaiyil Thiruvaiyaru - A music fes...
Are you looking for Gopinathan Kannan? MyLife is happy to assist you on the quest as we dedicate our efforts to streamline to process of finding long-lost ...