Patents by Inventor Dilesh Dhokia
Dilesh Dhokia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11902327Abstract: Techniques are described herein that are capable of evaluating a result of enforcement of access control policies instead of enforcing the access control policies. For instance, a result of enforcement of an access control policy with regard to sign-in processes is evaluated instead of enforcing the access control policy with regard to the sign-in processes. The evaluation includes monitoring access requests that are received during the sign-in processes. Each access request requests access to a resource. The evaluation further includes comparing attributes of each access request against the access control policy that specifies criteria that are to be satisfied as a prerequisite to granting access to the resource to which access is requested by the respective access request. Metadata associated with the sign-in processes is generated instead of enforcing the access control policy with regard to the sign-in processes.Type: GrantFiled: January 6, 2020Date of Patent: February 13, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Daniel Edward Lee Wood, Caleb Geoffrey Baker, Sarat Subramaniam, Etan Micah Basseri, Carlos Adrian Lopez Castro, Sandra Jiang, Dilesh Dhokia, Jessica Tian-Hueih Lin, Pui Yin Winfred Wong, Robyn Nicole Hicock
-
Method and systems for analyzing security coverage of a set of enterprise access management policies
Patent number: 11659009Abstract: Disclosed in some examples, are methods, systems, and machine-readable mediums for identifying security vulnerabilities across a plurality of access control policies. An administrator of the computing resource may be alerted to these vulnerabilities to allow the administrator to craft a policy, or modify an existing policy, to close these security gaps. In other examples, the system may automatically suggest and/or apply a modification to an existing policy or a new access control policy that closes the security gaps. The vulnerabilities may be determined based upon a comparison of the access control policy criteria in the previously set access control policies and a set of possible values of access control signals to determine access scenarios that are not covered by the access control policies.Type: GrantFiled: February 1, 2021Date of Patent: May 23, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Dilesh Dhokia, Caleb Geffrey Baker, Daniel Edward Lee Wood -
METHOD AND SYSTEMS FOR ANALYZING SECURITY COVERAGE OF A SET OF ENTERPRISE ACCESS MANAGEMENT POLICIES
Publication number: 20220247790Abstract: Disclosed in some examples, are methods, systems, and machine-readable mediums for identifying security vulnerabilities across a plurality of access control policies. An administrator of the computing resource may be alerted to these vulnerabilities to allow the administrator to craft a policy, or modify an existing policy, to close these security gaps. In other examples, the system may automatically suggest and/or apply a modification to an existing policy or a new access control policy that closes the security gaps. The vulnerabilities may be determined based upon a comparison of the access control policy criteria in the previously set access control policies and a set of possible values of access control signals to determine access scenarios that are not covered by the access control policies.Type: ApplicationFiled: February 1, 2021Publication date: August 4, 2022Inventors: Dilesh Dhokia, Caleb Geffrey Baker, Daniel Edward Lee Wood -
Publication number: 20210211470Abstract: Techniques are described herein that are capable of evaluating a result of enforcement of access control policies instead of enforcing the access control policies. For instance, a result of enforcement of an access control policy with regard to sign-in processes is evaluated instead of enforcing the access control policy with regard to the sign-in processes. The evaluation includes monitoring access requests that are received during the sign-in processes. Each access request requests access to a resource. The evaluation further includes comparing attributes of each access request against the access control policy that specifies criteria that are to be satisfied as a prerequisite to granting access to the resource to which access is requested by the respective access request. Metadata associated with the sign-in processes is generated instead of enforcing the access control policy with regard to the sign-in processes.Type: ApplicationFiled: January 6, 2020Publication date: July 8, 2021Inventors: Daniel Edward Lee Wood, Caleb Geoffrey Baker, Sarat Subramaniam, Etan Micah Basseri, Carlos Adrian Lopez Castro, Sandra Jiang, Dilesh Dhokia, Jessica Tian-Hueih Lin, Pui Yin Winfred Wong, Robyn Nicole Hicock
-
Patent number: 9535625Abstract: A method for selectively utilizing a plurality of disparate solid state storage locations is disclosed. The technology initially receives class types for a plurality of disparate solid state storage locations. The characteristics of the received data are determined. The received data is then allocated to one of the plurality of disparate solid state storage locations based upon the determined characteristics of the received data.Type: GrantFiled: December 30, 2011Date of Patent: January 3, 2017Inventors: Bohdan Raciborski, Dilesh Dhokia, Bhrighu Sareen
-
Patent number: 8560760Abstract: In a computer-implemented method for filtering input/output operations of a flash drive, an input/output request directed toward a flash drive is received. It is determined whether the input/output request is associated with a high volume write operation. If the input/output request is associated with the high volume write operation, a flash drive input/output management action to perform is selected. If the input/output request is not associated with the high volume write operation, the input/output request is forwarded to the flash drive.Type: GrantFiled: January 31, 2007Date of Patent: October 15, 2013Assignee: Microsoft CorporationInventors: Dilesh Dhokia, Mukesh Karki, Michael R. Fortin
-
Patent number: 8473670Abstract: A BIOS may provide bad block and wear-leveling services to a flash memory during a boot cycle until a full-functioned memory controller, such as a software memory controller, is available. After the full-functioned memory controller is available, the controller may use data passed by the BIOS to determine what, if any, steps to take to account for write activity during the boot process. Alternatively, the BIOS may use a reserved portion of flash memory so that wear leveling for boot-related data, such as a shut-down flag, is not needed.Type: GrantFiled: November 2, 2011Date of Patent: June 25, 2013Assignee: Microsoft CorporationInventors: Bhrighu Sareen, Dilesh Dhokia
-
Publication number: 20120110264Abstract: A method for selectively utilizing a plurality of disparate solid state storage locations is disclosed. The technology initially receives class types for a plurality of disparate solid state storage locations. The characteristics of the received data are determined. The received data is then allocated to one of the plurality of disparate solid state storage locations based upon the determined characteristics of the received data.Type: ApplicationFiled: December 30, 2011Publication date: May 3, 2012Applicant: Microsoft CorporationInventors: Bohdan Raciborski, Dilesh Dhokia, Bhrighu Sareen
-
Patent number: 8126939Abstract: A method for selectively utilizing a plurality of disparate solid state storage locations is disclosed. The technology initially receives class types for a plurality of disparate solid state storage locations. The characteristics of the received data are determined. The received data is then allocated to one of the plurality of disparate solid state storage locations based upon the determined characteristics of the received data.Type: GrantFiled: December 16, 2009Date of Patent: February 28, 2012Assignee: Microsoft CorporationInventors: Bohdan Raciborski, Dilesh Dhokia, Bhrighu Sareen
-
Publication number: 20120047323Abstract: A BIOS may provide bad block and wear-leveling services to a flash memory during a boot cycle until a full-functioned memory controller, such as a software memory controller, is available. After the full-functioned memory controller is available, the controller may use data passed by the BIOS to determine what, if any, steps to take to account for write activity during the boot process. Alternatively, the BIOS may use a reserved portion of flash memory so that wear leveling for boot-related data, such as a shut-down flag, is not needed.Type: ApplicationFiled: November 2, 2011Publication date: February 23, 2012Applicant: Microsoft CorporationInventors: Bhrighu Sareen, Dilesh Dhokia
-
Patent number: 8082384Abstract: A BIOS may provide bad block and wear-leveling services to a flash memory during a boot cycle until a full-functioned memory controller, such as a software memory controller, is available. After the full-functioned memory controller is available, the controller may use data passed by the BIOS to determine what, if any, steps to take to account for write activity during the boot process. Alternatively, the BIOS may use a reserved portion of flash memory so that wear leveling for boot-related data, such as a shut-down flag, is not needed.Type: GrantFiled: March 26, 2008Date of Patent: December 20, 2011Assignee: Microsoft CorporationInventors: Bhrighu Sareen, Dilesh Dhokia
-
Publication number: 20100095083Abstract: A method for selectively utilizing a plurality of disparate solid state storage locations is disclosed. The technology initially receives class types for a plurality of disparate solid state storage locations. The characteristics of the received data are determined. The received data is then allocated to one of the plurality of disparate solid state storage locations based upon the determined characteristics of the received data.Type: ApplicationFiled: December 16, 2009Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Bohdan Raciborski, Dilesh Dhokia, Bhrighu Sareen
-
Patent number: 7657572Abstract: A method for selectively utilizing a plurality of disparate solid state storage locations is disclosed. The technology initially receives class types for a plurality of disparate solid state storage locations. The characteristics of the received data are determined. The received data is then allocated to one of the plurality of disparate solid state storage locations based upon the determined characteristics of the received data.Type: GrantFiled: March 6, 2007Date of Patent: February 2, 2010Assignee: Microsoft CorporationInventors: Bohdan Raciborski, Dilesh Dhokia, Bhrighu Sareen
-
Publication number: 20090254898Abstract: Re-purposing a computer from one operating system to another is both simplified and made less susceptible to error by moving original system firmware to a backup location and then installing both new firmware and the new operating system in one process. Because the original firmware is maintained and accessible, should the new firmware, for example, a BIOS, fail, the original firmware can be restored and the process restarted. To assist in the seamless change from one operating system to another, an inventory of computer assets may be used to built an installation program and removable memory for use in the upgrade.Type: ApplicationFiled: April 8, 2008Publication date: October 8, 2009Applicant: MICROSOFT CORPORATIONInventors: Bhrighu Sareen, Dilesh Dhokia
-
Publication number: 20090249052Abstract: A BIOS may provide bad block and wear-leveling services to a flash memory during a boot cycle until a full-functioned memory controller, such as a software memory controller, is available. After the full-functioned memory controller is available, the controller may use data passed by the BIOS to determine what, if any, steps to take to account for write activity during the boot process. Alternatively, the BIOS may use a reserved portion of flash memory so that wear leveling for boot-related data, such as a shut-down flag, is not needed.Type: ApplicationFiled: March 26, 2008Publication date: October 1, 2009Applicant: MICROSOFT CORPORATIONInventors: Bhrighu Sareen, Dilesh Dhokia
-
Publication number: 20080222346Abstract: A method for selectively utilizing a plurality of disparate solid state storage locations is disclosed. The technology initially receives class types for a plurality of disparate solid state storage locations. The characteristics of the received data are determined. The received data is then allocated to one of the plurality of disparate solid state storage locations based upon the determined characteristics of the received data.Type: ApplicationFiled: March 6, 2007Publication date: September 11, 2008Applicant: Microsoft CorporationInventors: Bohdan Raciborski, Dilesh Dhokia, Bhrighu Sareen
-
Publication number: 20080183918Abstract: In a computer-implemented method for filtering input/output operations of a flash drive, an input/output request directed toward a flash drive is received. It is determined whether the input/output request is associated with a high volume write operation. If the input/output request is associated with the high volume write operation, a flash drive input/output management action to perform is selected. If the input/output request is not associated with the high volume write operation, the input/output request is forwarded to the flash drive.Type: ApplicationFiled: January 31, 2007Publication date: July 31, 2008Applicant: Microsoft CorporationInventors: Dilesh Dhokia, Mukesh Karki, Michael R. Fortin