Patents by Inventor Asish George Varghese

Asish George Varghese has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11675776
    Abstract: Managing data in a computing device is disclosed, including generating reverse delta updates during an apply operation of a forward delta update. A method includes operations of applying forward update data to an original data object to generate an updated data object from the original data object and generating, during the applying, reverse update data, the reverse update data configured to reverse effects of the forward update data and restore the original data object from the updated data object.
    Type: Grant
    Filed: June 29, 2021
    Date of Patent: June 13, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Jonathon Tucker Ready, Cristian Gelu Petruta, Mark Zagorski, Timothy Patrick Conley, Imran Baig, Alexey Teterev, Asish George Varghese
  • Publication number: 20220292076
    Abstract: Managing data in a computing device is disclosed, including generating reverse delta updates during an apply operation of a forward delta update. A method includes operations of applying forward update data to an original data object to generate an updated data object from the original data object and generating, during the applying, reverse update data, the reverse update data configured to reverse effects of the forward update data and restore the original data object from the updated data object.
    Type: Application
    Filed: June 29, 2021
    Publication date: September 15, 2022
    Inventors: Jonathon Tucker READY, Cristian Gelu PETRUTA, Mark ZAGORSKI, Timothy Patrick CONLEY, Imran BAIG, Alexey TETEREV, Asish George VARGHESE
  • Patent number: 9235827
    Abstract: A computing device may include at least one primary notification module and at least one secondary notification module. A notification controller module may trigger a primary notification module and a secondary notification module to generate notification messages or the controller module may trigger the primary notification module to generate a notification message. A graphics device may generate a composite notification message based at least in part on the notification messages from the primary and the secondary notification modules, where representations of the notification messages are stacked one on-top of the other in the composite notification message.
    Type: Grant
    Filed: November 5, 2012
    Date of Patent: January 12, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Chih-Pin Ben Kao, Hakki Tunc Bostanci, Asish George Varghese, Vinod Chavva, Robert Edgar Fanfant
  • Publication number: 20140129977
    Abstract: A computing device may include at least one primary notification module and at least one secondary notification module. A notification controller module may trigger a primary notification module and a secondary notification module to generate notification messages or the controller module may trigger the primary notification module to generate a notification message. A graphics device may generate a composite notification message based at least in part on the notification messages from the primary and the secondary notification modules, where representations of the notification messages are stacked one on-top of the other in the composite notification message.
    Type: Application
    Filed: November 5, 2012
    Publication date: May 8, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Chih-Pin Ben Kao, Hakki Tunc Bostanci, Asish George Varghese, Vinod Chavva, Robert Edgar Fanfant
  • Publication number: 20130117006
    Abstract: Techniques involving a simulated start-up or “boot” process to detect the introduction of unauthorized code or data into the boot process. In one embodiment, a boot process is performed to initiate a computing system. The boot process is then simulated using the initiated computing system to detect unauthorized modifications introduced into the computing system prior to the computing system's operating system being operational.
    Type: Application
    Filed: November 7, 2011
    Publication date: May 9, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Asish George Varghese, Chih-Pin Kao, Robert Fanfant, Hakki Tunc Bostanci