Patents by Inventor Amjad Hussain

Amjad Hussain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170118247
    Abstract: A selection of a document that includes a command and a parameter is received, and a user is caused to be associated with a policy that grants permission to execute the document. A request is received, from a requestor, to execute the document, the request including a parameter value, and the requestor is determined to be the user associated with the policy. The user is validated to have access to a resource indicated by the parameter value, and the command is caused to be executed against the resource.
    Type: Application
    Filed: December 18, 2015
    Publication date: April 27, 2017
    Inventors: Amjad Hussain, Manivannan Sundaram, Sivaprasad Venkata Padisetty, Nikolaos Pamboukas, Alan Hadley Goodman
  • Patent number: 9537742
    Abstract: The adjustment of a number of application launch endpoint servers that may be used to service incoming connection requests. Application launch endpoints are entities, such as running code, that may be used to launch other applications. Examples of endpoints include virtual machines or sessions in a session management server. The system load associated with the incoming connection rate and number of users is monitored. In response, an add threshold and a perhaps a remove threshold is calculated. If the system load rises above the add threshold, application launch endpoint server(s) are added to the set of endpoints that can handle incoming connection requests. If the system load falls below the remove threshold, application launch endpoint server(s) are removed from to the set of endpoints. The add and remove thresholds may be calculated per tenant, and adjusted based on tenant behavior.
    Type: Grant
    Filed: June 25, 2013
    Date of Patent: January 3, 2017
    Assignee: Microsoft Technology Licensing LLC
    Inventors: Munindra Nath Das, Sriram Sampath, Sergey A. Kuzin, Amjad Hussain, Ido Miles Ben-Shachar, Jingyuan Li, Nihar Namjoshi
  • Publication number: 20160373424
    Abstract: Embodiments are directed to provisioning private virtual machines in a public cloud and to managing private virtual machines hosted on a public cloud. In one scenario, a virtual network is established at a public cloud environment based on a request received from a private domain, and an authenticated session is established between the virtual network and the private domain. A virtual machine is hosted within the virtual network. The virtual machine is configured to be accessible to a user authenticated to the virtual machine, and is configured to run an application using data received from the private domain. Private data is received from the private domain over the authenticated session, and the authenticated user is provided access to the application running at the virtual machine, including providing the authenticated user access to the private data.
    Type: Application
    Filed: April 1, 2016
    Publication date: December 22, 2016
    Inventors: Amjad Hussain, Jonathan Austin Hoover, Tristan William Scott, Ido Miles Ben-Shachar, Kevin Scott London
  • Publication number: 20160344671
    Abstract: A method for executing commands on virtual machine instances in a distributed computing environment can include receiving, from a client computing device, a command execution request for executing a command on one or more virtual machine instances within the distributed computing environment. The command execution request includes a tag, and instance identification information for the one or more virtual machine instances is retrieved based on the tag. A command specification document associated with the command specified by the command execution request is retrieved. A command execution message, including the command specification document and at least one command parameter, is communicated to each of the one or more virtual machine instances. A command execution result from executing the command at the one or more virtual machine instances is received from the one or more virtual machine instances. The command execution result is sent to the client computing device.
    Type: Application
    Filed: May 19, 2015
    Publication date: November 24, 2016
    Inventors: Amjad Hussain, Steven Merlin Twitchell, Mats Erik Lanner, Manivannan Sundaram, Sivaprasad Venkata Padisetty, Martin Chen Mao
  • Patent number: 9313188
    Abstract: Embodiments are directed to provisioning private virtual machines in a public cloud and to managing private virtual machines hosted on a public cloud. In one scenario, a computer system receives authentication information for a private domain from an entity. The entity indicates that their private virtual machines are to be provisioned on a public cloud, where the entity's private domain is accessible using the authentication information. The computer system establishes a virtual network on the public cloud which is configured to host the entity's private virtual machines, where each virtual machine hosts remote applications. The computer system establishes an authenticated connection from the virtual network to the entity's private domain using the received authentication information and provides the entity's private virtual machines on the public cloud.
    Type: Grant
    Filed: June 14, 2013
    Date of Patent: April 12, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amjad Hussain, Jonathan Austin Hoover, Tristan William Scott, Ido Miles Ben-Shachar, Kevin Scott London
  • Patent number: 9264379
    Abstract: The management of bandwidth utilization in a network system that has multiple users. The system identifies the current set of users that are accessing the network by tracking which users are newly accessing the network, which users have ceased accessing the network, and which users continue to access the network over a period of time. The system then guarantees that these identified users will have a certain minimum bandwidth over the period of time. The system then enforces the guaranteed minimum bandwidth for each of the users so that they have no less than the corresponding guaranteed minimum bandwidth. Thus, even if the network bandwidth utilization would be saturated if all requests were satisfied, the system may continue operating while provided some guaranteed level of bandwidth to each user.
    Type: Grant
    Filed: November 9, 2011
    Date of Patent: February 16, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Huei Chung Wang, Alvin K. Tan, Amjad Hussain
  • Patent number: 9164755
    Abstract: The updating of virtual machines. A task broker schedules update tasks for multiple virtual machines on the host machine. As each update task is to be performed, if the virtual machine is not currently running, as might be the case for a personal virtual machine, the virtual machine is caused to begin running to allow the update task to be performed on the virtual machine. Also, a pooled virtual machine is updated by copying information from the old virtual hard drive to a location to allow the information to be preserved as the master image is updated. After the update is completed, the virtual machine is formed, associated with the new virtual hard drive, and copied back to the virtual machine.
    Type: Grant
    Filed: June 4, 2014
    Date of Patent: October 20, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Robert K. Leitman, Kashif Mehmood, Amjad Hussain, Ido Miles Ben-Shachar, Sriram Sampath, Ajay Kumar
  • Patent number: 9124569
    Abstract: Embodiments are directed to authenticating a user to a remote application provisioning service. In one scenario, a client computer system receives authentication credentials from a user at to authenticate the user to a remote application provisioning service that provides virtual machine-hosted remote applications. The client computer system sends the received authentication credentials to an authentication service, which is configured to generate an encrypted token based on the received authentication credentials. The client computer system then receives the generated encrypted token from the authentication service, stores the received encrypted token and the received authentication credentials in a data store, and sends the encrypted token to the remote application provisioning service. The encrypted token indicates to the remote application provisioning service that the user is a valid user.
    Type: Grant
    Filed: June 14, 2013
    Date of Patent: September 1, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Amjad Hussain, Andrew Eremenko, Mahadeva Kumar Alladi, Sriram Sampath, Tristan William Scott, Travis Michael Howe, Ido Miles Ben-Shachar
  • Publication number: 20140379899
    Abstract: The adjustment of a number of application launch endpoint servers that may be used to service incoming connection requests. Application launch endpoints are entities, such as running code, that may be used to launch other applications. Examples of endpoints include virtual machines or sessions in a session management server. The system load associated with the incoming connection rate and number of users is monitored. In response, an add threshold and a perhaps a remove threshold is calculated. If the system load rises above the add threshold, application launch endpoint server(s) are added to the set of endpoints that can handle incoming connection requests. If the system load falls below the remove threshold, application launch endpoint server(s) are removed from to the set of endpoints. The add and remove thresholds may be calculated per tenant, and adjusted based on tenant behavior.
    Type: Application
    Filed: June 25, 2013
    Publication date: December 25, 2014
    Inventors: Munindra Nath Das, Sriram Sampath, Sergey A. Kuzin, Amjad Hussain, Ido Miles Ben-Shachar, Jingyuan Li, Nihar Namjoshi
  • Publication number: 20140373092
    Abstract: Embodiments are directed to provisioning private virtual machines in a public cloud and to managing private virtual machines hosted on a public cloud. In one scenario, a computer system receives authentication information for a private domain from an entity. The entity indicates that their private virtual machines are to be provisioned on a public cloud, where the entity's private domain is accessible using the authentication information. The computer system establishes a virtual network on the public cloud which is configured to host the entity's private virtual machines, where each virtual machine hosts remote applications. The computer system establishes an authenticated connection from the virtual network to the entity's private domain using the received authentication information and provides the entity's private virtual machines on the public cloud.
    Type: Application
    Filed: June 14, 2013
    Publication date: December 18, 2014
    Inventors: Amjad Hussain, Jonathan Austin Hoover, Tristan William Scott, Ido Miles Ben-Shachar, Kevin Scott London
  • Publication number: 20140373126
    Abstract: Embodiments are directed to authenticating a user to a remote application provisioning service. In one scenario, a client computer system receives authentication credentials from a user at to authenticate the user to a remote application provisioning service that provides virtual machine-hosted remote applications. The client computer system sends the received authentication credentials to an authentication service, which is configured to generate an encrypted token based on the received authentication credentials. The client computer system then receives the generated encrypted token from the authentication service, stores the received encrypted token and the received authentication credentials in a data store, and sends the encrypted token to the remote application provisioning service. The encrypted token indicates to the remote application provisioning service that the user is a valid user.
    Type: Application
    Filed: June 14, 2013
    Publication date: December 18, 2014
    Inventors: Amjad Hussain, Andrew Eremenko, Mahadeva Kumar Alladi, Sriram Sampath, Tristan William Scott, Travis Michael Howe, Ido Miles Ben-Shachar
  • Publication number: 20140289718
    Abstract: The updating of virtual machines. A task broker schedules update tasks for multiple virtual machines on the host machine. As each update task is to be performed, if the virtual machine is not currently running, as might be the case for a personal virtual machine, the virtual machine is caused to begin running to allow the update task to be performed on the virtual machine. Also, a pooled virtual machine is updated by copying information from the old virtual hard drive to a location to allow the information to be preserved as the master image is updated. After the update is completed, the virtual machine is formed, associated with the new virtual hard drive, and copied back to the virtual machine.
    Type: Application
    Filed: June 4, 2014
    Publication date: September 25, 2014
    Inventors: Robert K. Leitman, Kashif Mehmood, Amjad Hussain, Ido Miles Ben-Shachar, Sriram Sampath, Ajay Kumar
  • Patent number: 8843646
    Abstract: As described herein, a computer system receives a first indication that an interactive login session is to be established. The first indication includes user credentials for establishing the interactive login session. The computer system then establishes the interactive login session using the received user credentials. The interactive login session includes a data transfer endpoint for receiving data from other sessions. The computer system receives a second indication that a child session is to be established in parallel to the established interactive login session. The child session is configured to direct input and output data through a loopback connection to the data transfer endpoint of the interactive login session. The computer system also establishes the child session using the received user credentials. The child session then transfers at least a portion of data to the data transfer endpoint of the interactive login session using the loopback connection.
    Type: Grant
    Filed: December 15, 2011
    Date of Patent: September 23, 2014
    Assignee: Microsoft Corporation
    Inventors: Sergey A. Kuzin, Christopher Benjamin Black, Kashif Mehmood, Amjad Hussain, Ido Miles Ben-Shachar
  • Patent number: 8805899
    Abstract: The management of data storage channel utilization in a computing system that has multiple users. The system receives file-level requests from requesters and then creates a history for each requester. Upon evaluating the history of each requester, the system determines whether to delay the file-level requests from entering the file system stack based on the result of the evaluation. The system delays one or more of the file-level requests if the history of the corresponding requester meets one or more criteria. If the history of the corresponding requester does not meet the criteria, the system allows the file-level requests to be passed to the file system stack without being delayed.
    Type: Grant
    Filed: November 9, 2011
    Date of Patent: August 12, 2014
    Assignee: Microsoft Corporation
    Inventors: Huei Chung Wang, Amjad Hussain
  • Patent number: 8769519
    Abstract: The updating of virtual machines. A task broker schedules update tasks for multiple virtual machines on the host machine. As each update task is to be performed, if the virtual machine is not currently running, as might be the case for a personal virtual machine, the virtual machine is caused to begin running to allow the update task to be performed on the virtual machine. Also, a pooled virtual machine is updated by copying information from the old virtual hard drive to a location to allow the information to be preserved as the master image is updated. After the update is completed, the virtual machine is formed, associated with the new virtual hard drive, and copied back to the virtual machine.
    Type: Grant
    Filed: December 8, 2011
    Date of Patent: July 1, 2014
    Assignee: Microsoft Corporation
    Inventors: Robert K. Leitman, Kashif Mehmood, Amjad Hussain, Ido Miles Ben-Shachar, Sriram Sampath, Ajay Kumar
  • Patent number: 8505083
    Abstract: Exemplary techniques for enabling single sign-on to an operating system configured to conduct a remote presentation session are disclosed. In an exemplary embodiment, a user credential can be encrypted using an encryption key generated by a remote presentation session server and sent to a client. The client can send the encrypted user credential to the remote presentation session server. The remote presentation session server can decrypt the user credential and use it to log a user into an operating system running on the remote presentation session server. In addition to the foregoing, other techniques are described in the claims, the detailed description, and the figures.
    Type: Grant
    Filed: September 30, 2010
    Date of Patent: August 6, 2013
    Assignee: Microsoft Corporation
    Inventors: Sergey A. Kuzin, Andrew Eremenko, Ido Ben Shachar, Amjad Hussain, James Baker, Raymond M. Reskusich
  • Publication number: 20130152077
    Abstract: The updating of virtual machines. A task broker schedules update tasks for multiple virtual machines on the host machine. As each update task is to be performed, if the virtual machine is not currently running, as might be the case for a personal virtual machine, the virtual machine is caused to begin running to allow the update task to be performed on the virtual machine. Also, a pooled virtual machine is updated by copying information from the old virtual hard drive to a location to allow the information to be preserved as the master image is updated. After the update is completed, the virtual machine is formed, associated with the new virtual hard drive, and copied back to the virtual machine.
    Type: Application
    Filed: December 8, 2011
    Publication date: June 13, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Robert K. Leitman, Kashif Mehmood, Amjad Hussain, Ido Miles Ben-Shachar, Sriram Sampath, Ajay Kumar
  • Publication number: 20130114624
    Abstract: The management of bandwidth utilization in a network system that has multiple users. The system identifies the current set of users that are accessing the network by tracking which users are newly accessing the network, which users have ceased accessing the network, and which users continue to access the network over a period of time. The system then guarantees that these identified users will have a certain minimum bandwidth over the period of time. The system then enforces the guaranteed minimum bandwidth for each of the users so that they have no less than the corresponding guaranteed minimum bandwidth. Thus, even if the network bandwidth utilization would be saturated if all requests were satisfied, the system may continue operating while provided some guaranteed level of bandwidth to each user.
    Type: Application
    Filed: November 9, 2011
    Publication date: May 9, 2013
    Applicant: Microsoft Corporation
    Inventors: Huei Chung Wang, Alvin K. Tan, Amjad Hussain
  • Publication number: 20130117336
    Abstract: The management of data storage channel utilization in a computing system that has multiple users. The system receives file-level requests from requesters and then creates a history for each requester. Upon evaluating the history of each requester, the system determines whether to delay the file-level requests from entering the file system stack based on the result of the evaluation. The system delays one or more of the file-level requests if the history of the corresponding requester meets one or more criteria. If the history of the corresponding requester does not meet the criteria, the system allows the file-level requests to be passed to the file system stack without being delayed.
    Type: Application
    Filed: November 9, 2011
    Publication date: May 9, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Huei Chung Wang, Amjad Hussain
  • Publication number: 20130067100
    Abstract: As described herein, a computer system receives a first indication that an interactive login session is to be established. The first indication includes user credentials for establishing the interactive login session. The computer system then establishes the interactive login session using the received user credentials. The interactive login session includes a data transfer endpoint for receiving data from other sessions. The computer system receives a second indication that a child session is to be established in parallel to the established interactive login session. The child session is configured to direct input and output data through a loopback connection to the data transfer endpoint of the interactive login session. The computer system also establishes the child session using the received user credentials. The child session then transfers at least a portion of data to the data transfer endpoint of the interactive login session using the loopback connection.
    Type: Application
    Filed: December 15, 2011
    Publication date: March 14, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Sergey A. Kuzin, Christopher Benjamin Black, Kashif Mehmood, Amjad Hussain, Ido Miles Ben-Shachar