Patents by Inventor Art Sadovsky
Art Sadovsky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11233810Abstract: Detecting compromised devices and user accounts within an online service via multi-signal analysis allows for fewer false positives and thus a more accurate allocation of computing resources and human analyst resources. Individual scopes of analysis, related to devices, accounts, or processes are specified and multiple behaviors over a period of time are analyzed to detect persistent (and slow acting) threats as well as brute force (and fast acting) threats. Analysts are alerted to individually affected scopes suspected of being compromised and may address them accordingly.Type: GrantFiled: November 21, 2019Date of Patent: January 25, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Pengcheng Luo, Reeves Hoppe Briggs, Art Sadovsky, Naveed Ahmad
-
Patent number: 10614222Abstract: Systems, devices, and methods of an automatic attack testing framework for the security testing of an operational service are disclosed. In an example, such systems, devices, and methods may include operations that: deploy command instructions and a payload for a bot process to a computing device located within a target infrastructure, with the command instructions being selected based on criteria to test a security feature in the target infrastructure with an automated attack action in the bot process, and with the bot process being executed on the computing device and being started with use of the command instructions and the payload; communicate with the computing device to control the automated attack action within the target infrastructure, such that the automated attack action is performed within the bot process; and obtain results of the automated attack action performed within the bot process from the computing device.Type: GrantFiled: February 21, 2017Date of Patent: April 7, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Benjamin J. Godard, Art Sadovsky, Travis W. Rhodes, David A. Marshall, Richard A. Lundeen
-
Publication number: 20200092318Abstract: Detecting compromised devices and user accounts within an online service via multi-signal analysis allows for fewer false positives and thus a more accurate allocation of computing resources and human analyst resources. Individual scopes of analysis, related to devices, accounts, or processes are specified and multiple behaviors over a period of time are analyzed to detect persistent (and slow acting) threats as well as brute force (and fast acting) threats. Analysts are alerted to individually affected scopes suspected of being compromised and may address them accordingly.Type: ApplicationFiled: November 21, 2019Publication date: March 19, 2020Applicant: Microsoft Technology Licensing, LLCInventors: Pengcheng Luo, Reeves Hoppe Briggs, Art Sadovsky, Naveed Ahmad
-
Patent number: 10491616Abstract: Detecting compromised devices and user accounts within an online service via multi-signal analysis allows for fewer false positives and thus a more accurate allocation of computing resources and human analyst resources. Individual scopes of analysis, related to devices, accounts, or processes are specified and multiple behaviors over a period of time are analyzed to detect persistent (and slow acting) threats as well as brute force (and fast acting) threats. Analysts are alerted to individually affected scopes suspected of being compromised and may address them accordingly.Type: GrantFiled: February 13, 2017Date of Patent: November 26, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Pengcheng Luo, Reeves Hoppe Briggs, Art Sadovsky, Naveed Ahmad
-
Patent number: 10073726Abstract: Outage detection in a cloud based service is provided using usage data based error signals. Usage data is collected from component of the cloud based service or client devices of the cloud based service based on customer actions on the cloud based service. The usage data is aggregated and normalized to generate an error signal from errors generated from a component of the cloud based service. An outage is detected from the error signal. An alert that includes information associated with the outage and one or more customers impacted by the outage is generated.Type: GrantFiled: September 2, 2014Date of Patent: September 11, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Olga Ivanova, Venkat Narayanan, Smita Ojha, Lei He, Art Sadovsky, Yi Wang, Ashish Premaraj
-
Publication number: 20180239902Abstract: Systems, devices, and methods of an automatic attack testing framework for the security testing of an operational service are disclosed. In an example, such systems, devices, and methods may include operations that: deploy command instructions and a payload for a bot process to a computing device located within a target infrastructure, with the command instructions being selected based on criteria to test a security feature in the target infrastructure with an automated attack action in the bot process, and with the bot process being executed on the computing device and being started with use of the command instructions and the payload; communicate with the computing device to control the automated attack action within the target infrastructure, such that the automated attack action is performed within the bot process; and obtain results of the automated attack action performed within the bot process from the computing device.Type: ApplicationFiled: February 21, 2017Publication date: August 23, 2018Inventors: Benjamin J. Godard, Art Sadovsky, Travis W. Rhodes, David A. Marshall, Richard A. Lundeen
-
Publication number: 20180234442Abstract: Detecting compromised devices and user accounts within an online service via multi-signal analysis allows for fewer false positives and thus a more accurate allocation of computing resources and human analyst resources. Individual scopes of analysis, related to devices, accounts, or processes are specified and multiple behaviors over a period of time are analyzed to detect persistent (and slow acting) threats as well as brute force (and fast acting) threats. Analysts are alerted to individually affected scopes suspected of being compromised and may address them accordingly.Type: ApplicationFiled: February 13, 2017Publication date: August 16, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Pengcheng Luo, Reeves Hoppe Briggs, Art Sadovsky, Naveed Ahmad
-
Patent number: 10037366Abstract: Data is validated as it travels through the different nodes of a data pipeline. Instead of having to wait to validate the data when the data reaches an end of the data pipeline, each node in the pipeline may validate the data. Different methods may be used to validate the data. For example, each node may determine metadata about the received data and/or the transformed data. This metadata may be used to determine if the node is receiving the same amount of data as it usually receives, whether the data is in a same format, and the like. A timing of the data through one or more of the nodes may also be used in determining when the data is valid. When a problem is detected at any of the nodes in the pipeline, a report may be sent to one or more users.Type: GrantFiled: February 7, 2014Date of Patent: July 31, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Art Sadovsky, Rustam Lalkaka, Felix Deschamps, Jungrak Kim
-
Patent number: 9692665Abstract: A failure analysis of a cloud based service is provided using synthetic measurements of the cloud based service. The synthetic measurements associated with a customer experience is executed on the cloud based service to determine a health of the cloud based service. The synthetic measurements simulate the customer experience which includes a use scenario of a customer of the cloud based service. Failures associated with the health of the cloud based service are aggregated, where the failures are detected from the synthetic measurements. A distribution is generated from the failures. The distribution is presented to a stakeholder.Type: GrantFiled: July 30, 2014Date of Patent: June 27, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Art Sadovsky, Timur Sadykov, Venkat Narayanan, Smita Ojha, Jon Avner
-
Patent number: 9558093Abstract: Visual tools are provided for failure analysis in distributed systems. Errors from synthetic measurements and usage data associated with a cloud based service are aggregated by a management application. The errors are processed to create a distribution that segments the errors based on components of the cloud based service. A failed component that generates a subset of the errors associated with a failure is highlighted. The failed component is one of the components of the cloud based service. The distribution is provided in a visualization to identify the failure by emphasizing the failed component with a failure information in proximity to the failed component.Type: GrantFiled: July 30, 2014Date of Patent: January 31, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Art Sadovsky, Venkat Narayanan, Smita Ojha
-
Patent number: 9444708Abstract: Outage detection in a cloud based service is provided using synthetic measurements and anonymized usage data of the cloud based service. Synthetic measurements and usage data are processed through a shared aggregator to generate aggregated data. The synthetic measurements and the usage data are analyzed through a decision tree to correlate an outage based on the synthetic measurements and the usage data. A confidence value is assigned to the outage. An alert is generated that includes information associated with the outage and the confidence value.Type: GrantFiled: July 30, 2014Date of Patent: September 13, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Art Sadovsky, Olga Ivanova, Venkat Narayanan, Smita Ojha
-
Patent number: 9436553Abstract: Usability of a cloud based service is recovered from a system failure. A customer transaction associated with the customer experience is executed to simulate the customer experience in the cloud based service. A failure associated with a subsystem the cloud based service is detected from an output of the customer transaction. A recovery action is determined to be associated with the failure. The recovery action is executed on the subsystem and monitored to determine a success status.Type: GrantFiled: August 4, 2014Date of Patent: September 6, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Art Sadovsky, Timur Sadykov, Ashish Premaraj, Venkat Narayanan, Smita Ojha
-
Publication number: 20160080406Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.Type: ApplicationFiled: November 18, 2015Publication date: March 17, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Art Sadovsky, Rustam Lalkaka, Vivek Sharma, Rajmohan Rajagopalan, Alexander Macleod
-
Publication number: 20160062816Abstract: Outage detection in a cloud based service is provided using usage data based error signals. Usage data is collected from component of the cloud based service or client devices of the cloud based service based on customer actions on the cloud based service. The usage data is aggregated and normalized to generate an error signal from errors generated from a component of the cloud based service. An outage is detected from the error signal. An alert that includes information associated with the outage and one or more customers impacted by the outage is generated.Type: ApplicationFiled: September 2, 2014Publication date: March 3, 2016Inventors: Olga Ivanova, Venkat Narayanan, Smita Ojha, Lei He, Art Sadovsky, Yi Wang, Ashish Premaraj
-
Publication number: 20160034334Abstract: Visual tools are provided for failure analysis in distributed systems. Errors from synthetic measurements and usage data associated with a cloud based service are aggregated by a management application. The errors are processed to create a distribution that segments the errors based on components of the cloud based service. A failed component that generates a subset of the errors associated with a failure is highlighted. The failed component is one of the components of the cloud based service. The distribution is provided in a visualization to identify the failure by emphasizing the failed component with a failure information in proximity to the failed component.Type: ApplicationFiled: July 30, 2014Publication date: February 4, 2016Inventors: Art Sadovsky, Venkat Narayanan, Smita Ojha
-
Publication number: 20160036671Abstract: A failure analysis of a cloud based service is provided using synthetic measurements of the cloud based service. The synthetic measurements associated with a customer experience is executed on the cloud based service to determine a health of the cloud based service. The synthetic measurements simulate the customer experience which includes a use scenario of a customer of the cloud based service. Failures associated with the health of the cloud based service are aggregated, where the failures are detected from the synthetic measurements. A distribution is generated from the failures. The distribution is presented to a stakeholder.Type: ApplicationFiled: July 30, 2014Publication date: February 4, 2016Inventors: Art Sadovsky, Timur Sadykov, Venkat Narayanan, Smita Ojha, Jon Avner
-
Publication number: 20160036670Abstract: Outage detection in a cloud based service is provided using synthetic measurements and anonymized usage data of the cloud based service. Synthetic measurements and usage data are processed through a shared aggregator to generate aggregated data. The synthetic measurements and the usage data are analyzed through a decision tree to correlate an outage based on the synthetic measurements and the usage data. A confidence value is assigned to the outage. An alert is generated that includes information associated with the outage and the confidence value.Type: ApplicationFiled: July 30, 2014Publication date: February 4, 2016Inventors: Art Sadovsky, Olga Ivanova, Venkat Narayanan, Smita Ojha
-
Publication number: 20160034355Abstract: Usability of a cloud based service is recovered from a system failure. A customer transaction associated with the customer experience is executed to simulate the customer experience in the cloud based service. A failure associated with a subsystem the cloud based service is detected from an output of the customer transaction. A recovery action is determined to be associated with the failure. The recovery action is executed on the subsystem and monitored to determine a success status.Type: ApplicationFiled: August 4, 2014Publication date: February 4, 2016Inventors: Art Sadovsky, Timur Sadykov, Ashish Premaraj, Venkat Narayanan, Smita Ojha
-
Patent number: 9210183Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.Type: GrantFiled: December 19, 2013Date of Patent: December 8, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Art Sadovsky, Rustam Lalkaka, Vivek Sharma, Rajmohan Rajagopalan, Alexander Macleod
-
Publication number: 20150227595Abstract: Data is validated as it travels through the different nodes of a data pipeline. Instead of having to wait to validate the data when the data reaches an end of the data pipeline, each node in the pipeline may validate the data. Different methods may be used to validate the data. For example, each node may determine metadata about the received data and/or the transformed data. This metadata may be used to determine if the node is receiving the same amount of data as it usually receives, whether the data is in a same format, and the like. A timing of the data through one or more of the nodes may also be used in determining when the data is valid. When a problem is detected at any of the nodes in the pipeline, a report may be sent to one or more users.Type: ApplicationFiled: February 7, 2014Publication date: August 13, 2015Applicant: MICROSOFT CORPORATIONInventors: ART SADOVSKY, RUSTAM LALKAKA, FELIX DESCHAMPS, JUNGRAK KIM