Patents by Inventor Daron Spektor
Daron Spektor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130124756Abstract: A redirection object may be obtained, based on a current request of a current requestor. The redirection object request may be associated with a response to a previous request for a redirection to a destination network location, the previous request associated with a previous requestor. A current transmission origination location associated with a current requestor transmission of the current request may be determined. It may be determined whether the current transmission origination location includes a similarity to a previous transmission origination location associated with a previous transmission of the previous request, based on identification information included in the redirection object. It may be determined whether to initiate a redirect operation of the current requestor to the destination network location, based on a result of the determining of the similarity between the current transmission origination location and the previous transmission origination location.Type: ApplicationFiled: November 14, 2011Publication date: May 16, 2013Applicant: MICROSOFT CORPORATIONInventors: Gary Voronel, Daron Spektor
-
Publication number: 20130111011Abstract: One or more techniques and/or systems are provided for selective server-side tracing of user requests that match tracing criteria. For example, internal server processing data and/or a server-side perspective of web traffic data associated with a server processing a user request may be generated server-side as tracing data. The tracing data may be utilized in troubleshooting issues that may arise between a client machine and the server (e.g., error in uploading a photo to a website hosted by the server). Because a web-based resource (e.g., website) may be hosted by a large number of servers configured to process numerous user requests over time, an overwhelming amount of tracing data may be produced in the absence of weeding out requests for which tracing data is not needed. Thus, utilizing tracing criteria to selectively trace particular user requests promotes efficient troubleshooting.Type: ApplicationFiled: October 31, 2011Publication date: May 2, 2013Applicant: Microsoft CorporationInventors: Patrick Moulhaud, Daron Spektor, Federico Emmanuel Gomez Suarez
-
Publication number: 20130067530Abstract: DNS-based content routing techniques are described. In one or more implementations, data is examined that describes interactions via a network with content via a domain name. Responsive to the examination, a policy is adjusted to change how one or more network addresses are resolved for the domain name for access to the content. A communication is formed that includes the adjusted policy to be communicated to one or more domain name system (DNS) servers, the adjusted policy configured to specify which network address are resolved for the domain name by the one or more DNS servers for access to the content.Type: ApplicationFiled: September 9, 2011Publication date: March 14, 2013Applicant: Microsoft CorporationInventors: Daron Spektor, Bradley A. Cleaver
-
Publication number: 20120159564Abstract: Activities of users of a service often involve one or more resources, such as uploading or downloading files in a file system of an FTP server. The activities of the users may be tracked and recorded in an activity log in order to identify frequently performed activities involving particular resources, and for such frequently performed activities, one or more activity actions may be performed. For example, malicious users may upload or utilize an equivalent set of assets stored in several accounts. The frequency of these undesirable activities may be identified, and an activity action may be automatically applied to the users (e.g., banning accounts), resources (e.g., deleting assets), and/or activities (e.g., blocking access to the resources). Conversely, desirable activities involving particular resources may be similarly detected, and the activity action applied to such desirable activities may involve reporting the desirable activity to an administrator of the service.Type: ApplicationFiled: December 15, 2010Publication date: June 21, 2012Applicant: Microsoft CorporationInventors: Daron Spektor, Youngha Joo, Steven Paul Miale, Federico Emmanuel Gomez Suarez
-
Publication number: 20120143826Abstract: The creation and utilization of network restore points is provided by a schema associated with a structured data set that can be conveniently backed up by periodically taking snapshots of the structured data to establish a series of restore points that can be used in the event that the primary structured data becomes lost or corrupted. In general, the snapshots are only taken after the structured data set has undergone a change in content, although they may be taken at other times as well. The snapshot may be taken by a network restore point engine that can be accessed by a user over the Internet. In addition, the snapshot may be stored on an Internet-based storage medium or it may be pushed to or pulled by the client so that the snapshot resides on a client-resident storage medium.Type: ApplicationFiled: February 13, 2012Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Daron Spektor, David Mercer, William D. Hay
-
Patent number: 8117164Abstract: The creation and utilization of network restore points is provided by a schema associated with a structured data set that can be conveniently backed up by periodically taking snapshots of the structured data to establish a series of restore points that can be used in the event that the primary structured data becomes lost or corrupted. In general, the snapshots are only taken after the structured data set has undergone a change in content, although they may be taken at other times as well. The snapshot may be taken by a network restore point engine that can be accessed by a user over the Internet. In addition, the snapshot may be stored on an Internet-based storage medium or it may be pushed to or pulled by the client so that the snapshot resides on a client-resident storage medium.Type: GrantFiled: December 19, 2007Date of Patent: February 14, 2012Assignee: Microsoft CorporationInventors: Daron Spektor, David Mercer, William D. Hay
-
Publication number: 20100293016Abstract: Various embodiments provide an evaluation module that is configured to monitor activities of new users and ascertain, from monitored activities, a reputation associated with the new users. In at least some embodiments, the evaluation module comprises an activity store and/or a reputation service. The activity store can monitor different types of actions associated with new users. For example, the activity store can monitor content-based actions that pertain to particular pieces of content and/or user behaviors associated with new users. The reputation service, which may or may not comprise part of the evaluation module, can ascertain from information provided from the activity store, information, such as a reputation category, associated with content-based actions and/or user behaviors associated with new users. Based on a new user's information, e.g. reputation category, the new user can be assigned an activity type which, in turn, defines allowed and disallowed activities for the new user.Type: ApplicationFiled: May 15, 2009Publication date: November 18, 2010Applicant: MICROSOFT CORPORATIONInventors: Daron Spektor, Chinna B. Polinati
-
Publication number: 20100235325Abstract: Techniques and environments that increase the convenience, efficiency and variety of cloud services are offered to clients. User data having an original representational format is losslessly transformed to form one or more alternate renditions having various representational formats based on the lossless transforms. The renditions, which may be pre-generated, can be stored on a network server instead of the identical user data to thereby reduce redundant computation and storage costs. In some cases both the renditions and the original use data may be stored. The original user data may be reconstructed, recreated, or restored using the alternate renditions.Type: ApplicationFiled: March 12, 2009Publication date: September 16, 2010Applicant: MICROSOFT CORPORATIONInventors: Hasrat Godil, Daron Spektor
-
Publication number: 20090164527Abstract: The creation and utilization of network restore points is provided by a schema associated with a structured data set that can be conveniently backed up by periodically taking snapshots of the structured data to establish a series of restore points that can be used in the event that the primary structured data becomes lost or corrupted. In general, the snapshots are only taken after the structured data set has undergone a change in content, although they may be taken at other times as well. The snapshot may be taken by a network restore point engine that can be accessed by a user over the Internet. In addition, the snapshot may be stored on an Internet-based storage medium or it may be pushed to or pulled by the client so that the snapshot resides on a client-resident storage medium.Type: ApplicationFiled: December 19, 2007Publication date: June 25, 2009Applicant: MICROSOFT CORPORATIONInventors: Daron Spektor, David Mercer, William D. Hay
-
Publication number: 20090165124Abstract: An arrangement for reducing the occurrence of harmful cross-site scripting is provided by segregating on-line content or other resources so that they are accessible at different domains or subdomains, each of which corresponds to a set of users, called a “sharing set,” where each user in the set has identical access privileges to certain resources. The sharing set is provided with an identifier (which may or may not be unique), so that the identifier may be used as the name of the domain or subdomain for which any member of the sharing set is authorized to access the resources located there. In this way, script that is embedded with the content can only be executed among members of the sharing set. Users who are not members of the sharing set are unable to invoke cross site-scripting attacks that would allow them to gain access to data from sharing set members.Type: ApplicationFiled: December 19, 2007Publication date: June 25, 2009Applicant: MICROSOFT CORPORATIONInventor: Daron Spektor