Patents by Inventor Kumar Rajeev
Kumar Rajeev has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240111556Abstract: The techniques disclosed herein enable a guest operating system (OS) to access and use a media processing component configured on a host OS. The guest OS provides, via an API, a request to create an instance of the media processing component (e.g., a codec, an encryption/decryption component, a DRM component). In association with the request, the guest OS allocates space in memory for media data that is to be processed by the instance of the media processing component configured on the host OS. The guest OS stores the input media data in the allocated memory and provides, via the API, reference(s) to locations of the allocated memory. The reference(s) to the locations of the allocated memory enable the host OS to retrieve the input media data and process the input media data using the instance of the media processing component configured on the host OS.Type: ApplicationFiled: September 30, 2022Publication date: April 4, 2024Inventors: Anton Victor POLINGER, Marcin STANKIEWICZ, Isuru Chamara PATHIRANA, Kumar RAJEEV, Isha SHARMA, Glenn Frederick EVANS, Matthew R. WOZNIAK
-
Patent number: 10642839Abstract: Methods and devices for identifying available applications for use with hardware of a computer device may include generating an application request with at least one device identification and a hardware identification to determine available applications. The methods and devices may include transmitting the application request to a remote application store. The methods and devices may include receiving, from the remote application store, an available application list with one or more applications having application relationship metadata that identifies compatible usage with the at least one hardware identification. The methods and devices may include presenting the available application list on a display of the computer device.Type: GrantFiled: August 1, 2019Date of Patent: May 5, 2020Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Samuel D. Adams, Kumar Rajeev, Benjamin S. McGregor, Doron J. Holan, Viraf R. Gandhi
-
Patent number: 10635666Abstract: Embodiments relate to a system, method, and device for index compilation to optimize index. Once a CREATE INDEX commands is fired, a first check determines if the user requested has to compile this index. If the index is to be compiled, a corresponding C-file is generated, and a DLL is generated out of the C-file. The DLL is then loaded with server. An INDEX DLL is natively compiled and generated corresponding to each INDEX during definition. The INDEX DLL will contain the required structure and method to perform on INDEX, based on the indexed column data-type.Type: GrantFiled: July 24, 2017Date of Patent: April 28, 2020Assignee: Huawei Technologies Co., Ltd.Inventors: Kumar Rajeev Rastogi, Dilip Kumar, Nirmala Sreekantaiah
-
Patent number: 10592660Abstract: Various systems and methods for capability access management are disclosed herein. In one example, a system includes a memory and a processor to send a signed custom capability description (SCCD) received from a first vendor to the memory for storage. The system may send an application received from a second vendor to the memory for storage. The system attempts to match the application to an authorization listing of the SCCD, where the application can be modified to allow access to a previously inaccessible custom capability in response to the application matching the authorization listing of the SCCD.Type: GrantFiled: November 22, 2016Date of Patent: March 17, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Matthew Gonzalez, John Sheehan, Peter Torr, Yifan Wang, Benjamin McGregor, Kumar Rajeev, Dylan D'Silva, Peter Wieland
-
Publication number: 20190362066Abstract: Described are examples for enabling low privileged application to access secure system resources. A request from an application executing at a second privilege level can be received by a broker service executing at a first privilege level, where the request corresponds to accessing secure system resources. It can then be determined whether the application has a defined capability for accessing the secure system resources, whether the application has a protected status, and/or whether a user account associated with executing the application is part of a certain group of user accounts. Based on these determinations, access to the secure system resources can be provided to the application by the broker service.Type: ApplicationFiled: May 25, 2018Publication date: November 28, 2019Inventors: Kumar RAJEEV, Ajay Preetham BARBOZA, Viraf Rusi GANDHI
-
Publication number: 20190354529Abstract: Methods and devices for identifying available applications for use with hardware of a computer device may include generating an application request with at least one device identification and a hardware identification to determine available applications. The methods and devices may include transmitting the application request to a remote application store. The methods and devices may include receiving, from the remote application store, an available application list with one or more applications having application relationship metadata that identifies compatible usage with the at least one hardware identification. The methods and devices may include presenting the available application list on a display of the computer device.Type: ApplicationFiled: August 1, 2019Publication date: November 21, 2019Inventors: Samuel D. ADAMS, Kumar RAJEEV, Benjamin S. MCGREGOR, Doron J. HOLAN, Viraf R. GANDHI
-
Patent number: 10445257Abstract: Described herein is a system for driver execution. A driver is loaded in a first domain with the driver controlling an associated device. In response to a request from the driver, the driver companion is loaded in a second domain different than the first domain, the second domain comprising a secure environment. The driver companion communicates with the associated device. Communications between the driver and the driver companion are managed (e.g., by an operating system framework). In response to a request from the driver, the driver companion is unloaded.Type: GrantFiled: January 9, 2018Date of Patent: October 15, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Shyamal Varma, Kumar Rajeev, Peter William Wieland
-
Patent number: 10417232Abstract: Methods and devices for identifying available applications for use with hardware of a computer device may include generating an application request with at least one device identification and a hardware identification to determine available applications. The methods and devices may include transmitting the application request to a remote application store. The methods and devices may include receiving, from the remote application store, an available application list with one or more applications having application relationship metadata that identifies compatible usage with the at least one hardware identification. The methods and devices may include presenting the available application list on a display of the computer device.Type: GrantFiled: December 22, 2017Date of Patent: September 17, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Samuel D. Adams, Kumar Rajeev, Benjamin S. McGregor, Doron J. Holan, Viraf R. Gandhi
-
Patent number: 10339137Abstract: A system and method of caching and parameterizing intermediate representation code includes receiving, by a database, a query, parsing, by the database, the query to obtain a plan tree comprising a plurality of plan nodes arranged in hierarchical order descending from a top plan node, generating, by the database, node intermediate representations (IRs) for the plan nodes, executing, by the database, a first query using the node IRs, and reusing, by the database, the node IRs to execute subsequent queries.Type: GrantFiled: December 7, 2015Date of Patent: July 2, 2019Assignee: Futurewei Technologies, Inc.Inventors: Kumar Rajeev Rastogi, Yonghua Ding, Cheng Zhu
-
Publication number: 20190197164Abstract: Methods and devices for identifying available applications for use with hardware of a computer device may include generating an application request with at least one device identification and a hardware identification to determine available applications. The methods and devices may include transmitting the application request to a remote application store. The methods and devices may include receiving, from the remote application store, an available application list with one or more applications having application relationship metadata that identifies compatible usage with the at least one hardware identification. The methods and devices may include presenting the available application list on a display of the computer device.Type: ApplicationFiled: December 22, 2017Publication date: June 27, 2019Inventors: Samuel D. ADAMS, Kumar RAJEEV, Benjamin S. MCGREGOR, Doron J. HOLAN, Viraf R. GANDHI
-
Patent number: 10289853Abstract: Techniques described herein enable the implementation of a secure driver framework. In one example, a method includes managing an unsecure operating system execution environment comprising a first user mode and a first kernel mode. The method can also include managing a secure execution environment comprising a second user mode and a second kernel mode, and executing a secure driver within the second user mode of the secure execution environment in response to a system call from an unsecure driver in the first kernel mode or the first user mode, wherein the secure driver enables the unsecure driver to communicate with a secure device. Furthermore, the method can include providing one or more system services of the second kernel mode to the secure driver.Type: GrantFiled: March 31, 2016Date of Patent: May 14, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Minsang Kim, Kumar Rajeev, Jason S. Wohlgemuth, Aacer H. Daken, Peter Wieland
-
Publication number: 20180314651Abstract: Described herein is a system for driver execution. A driver is loaded in a first domain with the driver controlling an associated device. In response to a request from the driver, the driver companion is loaded in a second domain different than the first domain, the second domain comprising a secure environment. The driver companion communicates with the associated device. Communications between the driver and the driver companion are managed (e.g., by an operating system framework). In response to a request from the driver, the driver companion is unloaded.Type: ApplicationFiled: January 9, 2018Publication date: November 1, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Shyamal VARMA, Kumar RAJEEV, Peter William WIELAND
-
Publication number: 20180143915Abstract: Various systems and methods for capability access management are disclosed herein. In one example, a system includes a memory and a processor to send a signed custom capability description (SCCD) received from a first vendor to the memory for storage. The system may send an application received from a second vendor to the memory for storage. The system attempts to match the application to an authorization listing of the SCCD, where the application can be modified to allow access to a previously inaccessible custom capability in response to the application matching the authorization listing of the SCCD.Type: ApplicationFiled: November 22, 2016Publication date: May 24, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Matthew Gonzalez, John Sheehan, Peter Torr, Yifan Wang, Benjamin McGregor, Kumar Rajeev, Dylan D'Silva, Peter Wieland
-
Publication number: 20180011901Abstract: A method of optimizing query execution by associating functions with columns includes receiving, by a query optimization server, data definition statement including information of one or more columns and function information for each of the one or more columns. The query optimization server associates the columns having the function information with corresponding predefined functions and stores in a memory. Upon receiving a query comprising a function associated to a column, the query optimization server compares the function with predefined functions stored in the memory. The query optimization server accesses the predefined function from the memory for executing the query based on the comparison.Type: ApplicationFiled: August 14, 2017Publication date: January 11, 2018Inventors: Dilip Kumar, Kumar Rajeev Rastogi, Nirmala Sreekantaiah
-
Publication number: 20170329822Abstract: Embodiments relate to a system, method, and device for index compilation to optimize index. Once a CREATE INDEX commands is fired, a first check determines if the user requested has to compile this index. If the index is to be compiled, a corresponding C-file is generated, and a DLL is generated out of the C-file. The DLL is then loaded with server. An INDEX DLL is natively compiled and generated corresponding to each INDEX during definition. The INDEX DLL will contain the required structure and method to perform on INDEX, based on the indexed column data-type.Type: ApplicationFiled: July 24, 2017Publication date: November 16, 2017Inventors: Kumar Rajeev Rastogi, Dilip Kumar, Nirmala Sreekantaiah
-
Publication number: 20170322973Abstract: A system and method to optimize queries on a view comprise a processor coupled to a memory storing a plurality of instructions for directing the processor to receive a query comprising a part of query on view, check, based on the part of query on view, in system table, wherein the system table comprises a status associated with the view indicating the compilation of the view, and if the part of query on view found in the system table, fetch a shared object file storing at least one compilation function associated with the part of query on view, use the compilation function as a part of a query execution plan, and execute the query execution plan to display the result.Type: ApplicationFiled: July 11, 2017Publication date: November 9, 2017Inventors: Nirmala Sreekantaiah, Dilip Kumar, Kumar Rajeev Rastogi
-
Publication number: 20170322963Abstract: An apparatus and method for creating user defined variable size tags on records in relational database management systems (RDBMS)are disclosed. When creating a table, one of the columns may be created as a new data-type called a “TAG” data-type. The new data-type called “TAG” is used to store various values for a single column against the single record.Type: ApplicationFiled: July 11, 2017Publication date: November 9, 2017Inventors: Prasanna Venkatesh Ramamurthi, Kumar Rajeev Rastogi, Dilip Kumar
-
Publication number: 20170308575Abstract: A method for optimizing query execution comprises receiving one or more optimizing parameters from a user device for optimizing a query execution plan. The one or more optimizing parameters comprise at least one of a query statement, a planning time and a plan execution time. The one or more optimizing parameters are received when duration of execution of the one or more queries using the query execution plan is greater than a predefined time period required for executing the one or more queries. The query execution plan is latest of one or more query execution plans for executing one or more queries. The method comprises generating an optimized query execution plan by iterating optimization of the query execution plan until the optimization satisfies the one or more optimizing parameters.Type: ApplicationFiled: July 12, 2017Publication date: October 26, 2017Inventors: Dilip Kumar, Kumar Rajeev Rastogi, Prasanna Venkatesh Ramamurthi
-
Publication number: 20170286701Abstract: Techniques described herein enable the implementation of a secure driver framework. In one example, a method includes managing an unsecure operating system execution environment comprising a first user mode and a first kernel mode. The method can also include managing a secure execution environment comprising a second user mode and a second kernel mode, and executing a secure driver within the second user mode of the secure execution environment in response to a system call from an unsecure driver in the first kernel mode or the first user mode, wherein the secure driver enables the unsecure driver to communicate with a secure device. Furthermore, the method can include providing one or more system services of the second kernel mode to the secure driver.Type: ApplicationFiled: March 31, 2016Publication date: October 5, 2017Applicant: Microsoft Technology Licensing, LLCInventors: Minsang Kim, Kumar Rajeev, Jason S. Wohlgemuth, Aacer H. Daken, Peter Wieland
-
Publication number: 20170161325Abstract: A system and method of caching and parameterizing intermediate representation code includes receiving, by a database, a query, parsing, by the database, the query to obtain a plan tree comprising a plurality of plan nodes arranged in hierarchical order descending from a top plan node, generating, by the database, node intermediate representations (IRs) for the plan nodes, executing, by the database, a first query using the node IRs, and reusing, by the database, the node IRs to execute subsequent queries.Type: ApplicationFiled: December 7, 2015Publication date: June 8, 2017Inventors: Kumar Rajeev Rastogi, Yonghua Ding, Cheng Zhu