Patents by Inventor RUSTAM LALKAKA

RUSTAM LALKAKA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10037366
    Abstract: Data is validated as it travels through the different nodes of a data pipeline. Instead of having to wait to validate the data when the data reaches an end of the data pipeline, each node in the pipeline may validate the data. Different methods may be used to validate the data. For example, each node may determine metadata about the received data and/or the transformed data. This metadata may be used to determine if the node is receiving the same amount of data as it usually receives, whether the data is in a same format, and the like. A timing of the data through one or more of the nodes may also be used in determining when the data is valid. When a problem is detected at any of the nodes in the pipeline, a report may be sent to one or more users.
    Type: Grant
    Filed: February 7, 2014
    Date of Patent: July 31, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Art Sadovsky, Rustam Lalkaka, Felix Deschamps, Jungrak Kim
  • Publication number: 20160080406
    Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.
    Type: Application
    Filed: November 18, 2015
    Publication date: March 17, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Art Sadovsky, Rustam Lalkaka, Vivek Sharma, Rajmohan Rajagopalan, Alexander Macleod
  • Patent number: 9210183
    Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.
    Type: Grant
    Filed: December 19, 2013
    Date of Patent: December 8, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Art Sadovsky, Rustam Lalkaka, Vivek Sharma, Rajmohan Rajagopalan, Alexander Macleod
  • Publication number: 20150227595
    Abstract: Data is validated as it travels through the different nodes of a data pipeline. Instead of having to wait to validate the data when the data reaches an end of the data pipeline, each node in the pipeline may validate the data. Different methods may be used to validate the data. For example, each node may determine metadata about the received data and/or the transformed data. This metadata may be used to determine if the node is receiving the same amount of data as it usually receives, whether the data is in a same format, and the like. A timing of the data through one or more of the nodes may also be used in determining when the data is valid. When a problem is detected at any of the nodes in the pipeline, a report may be sent to one or more users.
    Type: Application
    Filed: February 7, 2014
    Publication date: August 13, 2015
    Applicant: MICROSOFT CORPORATION
    Inventors: ART SADOVSKY, RUSTAM LALKAKA, FELIX DESCHAMPS, JUNGRAK KIM
  • Publication number: 20150180894
    Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.
    Type: Application
    Filed: December 19, 2013
    Publication date: June 25, 2015
    Applicant: MICROSOFT CORPORATION
    Inventors: ART SADOVSKY, RUSTAM LALKAKA, VIVEK SHARMA, RAJMOHAN RAJAGOPALAN, ALEXANDER MACLEOD