Patents by Inventor Vishu Gupta

Vishu Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20130159519
    Abstract: A content access management system receives an access determination requested identifying an access rule and a requesting user. The access rule may be created in advance by the content owner at the content access management system. The access rule may allow access to content objects based on the requesting user's biographic information, geographic information, affiliation information, payment information, or any other user characteristic. The user information may be entered by the requesting user at a social networking system interface for purposes unrelated to the content object or content owner. The content access management system retrieves the identified access rule and retrieves requesting user information based on the access rule. An access determination is made based on the retrieved access rule and requesting user information, and is transmitted to the content owner.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Inventors: Lincoln W. Hochberg, Vishu Gupta
  • Publication number: 20130159123
    Abstract: A content access management system receives an access determination requested identifying an access rule and a requesting user. The access rule may be created in advance by the content owner at the content access management system. The access rule may allow access to content objects based on the requesting user's biographic information, geographic information, affiliation information, payment information, or any other user characteristic. The user information may be entered by the requesting user at a social networking system interface for purposes unrelated to the content object or content owner. The content access management system retrieves the identified access rule and retrieves requesting user information based on the access rule. An access determination is made based on the retrieved access rule and requesting user information, and is transmitted to the content owner.
    Type: Application
    Filed: December 16, 2011
    Publication date: June 20, 2013
    Inventors: Lincoln W. Hochberg, Vishu Gupta
  • Publication number: 20130012306
    Abstract: To encourage purchases and use, licenses to certain interactive applications and/or content are able to be given as gifts to others as part of a user purchasing a license for herself. In one implementation, each purchase of a license to an application includes the right to give a license to up to a predefined limit of other people. For example, the purchasing user buys a license for herself and the right to name a number of other people to also receive licenses to the same interactive application or content.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Inventors: David Morin, Joshua E. Elman, Vishu Gupta, Blaise A. DiPersia
  • Publication number: 20120239693
    Abstract: An integrated program lookup browser provides an integrated system with an online program lookup web service that assists the user in finding these unrecognized files, protocols and web page objects by allowing the user to perform a program lookup on a web service that can search one or more databases and return the URL to download the appropriate application or protocol or return the actual program or protocol.
    Type: Application
    Filed: June 4, 2012
    Publication date: September 20, 2012
    Applicant: Microsoft Corporation
    Inventors: Linda W. Averett, Tariq Sharif, Roberto A. Franco, Anthony T. Chor, Vishu Gupta, Venkatraman V. Kundallur, Joseph T. Farro
  • Patent number: 8195640
    Abstract: An integrated program lookup browser provides an integrated system with an online program lookup web service that assists the user in finding these unrecognized files, protocols and web page objects by allowing the user to perform a program lookup on a web service that can search one or more databases and return the URL to download the appropriate application or protocol or return the actual program or protocol.
    Type: Grant
    Filed: June 16, 2006
    Date of Patent: June 5, 2012
    Assignee: Microsoft Corporation
    Inventors: Linda W. Averett, Tariq Sharif, Roberto A. Franco, Anthony T. Chor, Vishu Gupta, Venkatraman V. Kudallur, Joseph T. Farro
  • Patent number: 8037135
    Abstract: Automatic distributed downloading (ADD) may involve, for example, enabling the downloading of a resource via a peer-to-peer (P2P)-based protocol from a uniform resource identifier (URI). In an example embodiment, an ADD module includes a directory client that sends to a directory service a mapping request including a URI corresponding to a targeted resource and receives a mapping response including P2P session connection information. The targeted resource can be retrieved over a P2P network via a P2P-based protocol using the P2P session connection information. In another example embodiment, a mapping data structure is accessed with reference to a URI. An entry corresponding to the referenced URI is ascertained and P2P session connection information from the entry is extracted. The URI corresponds to a source making the resource available via a client-server-based protocol, and the P2P session connection information makes the resource available via a P2P-based protocol.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: October 11, 2011
    Assignee: Microsoft Corporation
    Inventors: Dave L Risney, Jr., Vishu Gupta
  • Publication number: 20110125599
    Abstract: To encourage purchases and use, licenses to certain interactive applications and/or content are able to be given as gifts to others as part of a user purchasing a license for herself. In one implementation, each purchase of a license to an application includes the right to give a license to up to a predefined limit of other people. For example, the purchasing user buys a license for herself and the right to name a number of other people to also receive licenses to the same interactive application or content.
    Type: Application
    Filed: November 20, 2009
    Publication date: May 26, 2011
    Inventors: David Morin, Joshua E. Elman, Vishu Gupta, Blaise A. DiPersia
  • Publication number: 20110087526
    Abstract: In a social networking system environment, users can give another user credits, a scarce commodity, as part of commenting on content posted by the other user. These credits can be used as a peer-to-peer recommendation signal, and they can also be used as input to a decision engine that determines what content to display in a highlights section that will be viewed by a wider audience and increasing the likelihood of further engagement with the content. Credits in a social networking system environment have scarcity value. In various embodiments, in order to increase the number of credits in the system, users buy them or an administrator distributes them. In some implementations, the total amount of credits in the system can decrease if a user cashes out the credits for real money. In some implementations, credits can be used to buy virtual or real-world gifts.
    Type: Application
    Filed: April 2, 2010
    Publication date: April 14, 2011
    Inventors: Jared Morgenstern, Joel Seligstein, Soleio Cuervo, Huai Wang, Mark E. Zuckerberg, William Chen, Man-hay Tam, Vishu Gupta
  • Publication number: 20100107251
    Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.
    Type: Application
    Filed: January 11, 2010
    Publication date: April 29, 2010
    Inventors: Venkatraman V. Kudallur, Shankar Ganesh, Roberto A. Franco, Vishu Gupta, John G. Bedworth
  • Patent number: 7660999
    Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.
    Type: Grant
    Filed: June 22, 2004
    Date of Patent: February 9, 2010
    Assignee: Microsoft Corporation
    Inventors: Venkatraman V. Kudallur, Shankar Ganesh, Roberto A. Franco, Vishu Gupta, John G. Bedworth
  • Publication number: 20090006538
    Abstract: Automatic distributed downloading (ADD) may involve, for example, enabling the downloading of a resource via a peer-to-peer (P2P)-based protocol from a uniform resource identifier (URI). In an example embodiment, an ADD module includes a directory client that sends to a directory service a mapping request including a URI corresponding to a targeted resource and receives a mapping response including P2P session connection information. The targeted resource can be retrieved over a P2P network via a P2P-based protocol using the P2P session connection information. In another example embodiment, a mapping data structure is accessed with reference to a URI. An entry corresponding to the referenced URI is ascertained and P2P session connection information from the entry is extracted. The URI corresponds to a source making the resource available via a client-server-based protocol, and the P2P session connection information makes the resource available via a P2P-based protocol.
    Type: Application
    Filed: June 29, 2007
    Publication date: January 1, 2009
    Applicant: Microsoft Corporation
    Inventors: Dave L. Risney, JR., Vishu Gupta
  • Publication number: 20070294256
    Abstract: An integrated program lookup browser provides an integrated system with an online program lookup web service that assists the user in finding these unrecognized files, protocols and web page objects by allowing the user to perform a program lookup on a web service that can search one or more databases and return the URL to download the appropriate application or protocol or return the actual program or protocol.
    Type: Application
    Filed: June 16, 2006
    Publication date: December 20, 2007
    Applicant: Microsoft Corporation
    Inventors: Linda W. Averett, Tariq Sharif, Roberto A. Franco, Anthony T. Chor, Vishu Gupta, Venkatraman V. Kudallur, Joseph T. Farro
  • Publication number: 20070131865
    Abstract: Security identifiers are analyzed to mitigate the use of misleading characters. In some embodiments, a language-based character set determination is utilized and looks for characters that are different from those that a user and/or the user's system would expect to see.
    Type: Application
    Filed: November 21, 2005
    Publication date: June 14, 2007
    Applicant: Microsoft Corporation
    Inventors: Eric Lawrence, Venkatraman Kudallur, Roberto Franco, Anthony Chor, Michel Suignard, James Fox, Vishu Gupta
  • Publication number: 20060010241
    Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.
    Type: Application
    Filed: June 22, 2004
    Publication date: January 12, 2006
    Applicant: Microsoft Corporation
    Inventors: Venkatraman Kudallur, Shankar Ganesh, Roberto Franco, Vishu Gupta, John Bedworth
  • Patent number: 6975591
    Abstract: A method for improving TCP throughput over lossy communication links without affecting performance over non-lossy links comprises determining lookahead-loss which is the number of lost packets in a given loss-window; using the loss-window and lookahead-loss to detect congestion in the communication links; and controlling transmission under congestion conditions and under normal conditions, wherein the controlling transmission comprises controlling a size of the loss-window by beginning in a slow-start phase; advancing to a congestion avoidance phase when a slow-start threshold is reached; entering a halt growth phase when the first level of packet loss has been recovered; returning to the congestion avoidance phase when a first level of packet recovery occurs; entering a k-recovery phase when a second level of packet loss occurs. The loss window and slow-start threshold are reduced in half and returned to the congestion avoidance phase when the second level of packet loss has been recovered.
    Type: Grant
    Filed: November 22, 2000
    Date of Patent: December 13, 2005
    Assignee: International Business Machines Corporation
    Inventors: Rajeev Shorey, Abhay Chrungoo, Vishu Gupta, Huzur Saran
  • Patent number: 6877035
    Abstract: A method, apparatus, computer program product, and decision support system and for allocating hosting-service resources to clients in at least one shared server. The method comprises discovering utilization patterns of the clients; monitoring the clients to discover the utilization patterns; providing bounds specifying minimum and maximum hosting-service resources for each of the clients; modeling dimensions for client user measures and the utilization patterns; and allocating the resources to the clients dependent on the utilization patterns. The step of allocating is also dependent upon the bounds.
    Type: Grant
    Filed: January 29, 2001
    Date of Patent: April 5, 2005
    Assignee: International Business Machines Corporation
    Inventors: Johara Shireen Shahabuddin, Kannan Balaji, Sanjiv Kapoor, Sandeep Juneja, Vishu Gupta, Abhay Chrungoo
  • Publication number: 20020143945
    Abstract: A method, an apparatus, and a computer program product are disclosed for allocating hosting-service resources to clients in at least one shared server. In the method, utilization patterns of the clients are discovered. The resources are then allocated to the clients dependent on the utilization patterns. Preferably, the method includes the step of providing bounds specifying minimum and maximum hosting-service resources for each of the clients, with the allocating step also being dependent upon the bounds.
    Type: Application
    Filed: January 29, 2001
    Publication date: October 3, 2002
    Inventors: Johara Shireen Shahabuddin, Kannan Balaji, Sanjiv Kapoor, Sandeep Juneja, Vishu Gupta, Abhay Chrungoo