Patents by Inventor Vishu Gupta
Vishu Gupta has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20130159519Abstract: A content access management system receives an access determination requested identifying an access rule and a requesting user. The access rule may be created in advance by the content owner at the content access management system. The access rule may allow access to content objects based on the requesting user's biographic information, geographic information, affiliation information, payment information, or any other user characteristic. The user information may be entered by the requesting user at a social networking system interface for purposes unrelated to the content object or content owner. The content access management system retrieves the identified access rule and retrieves requesting user information based on the access rule. An access determination is made based on the retrieved access rule and requesting user information, and is transmitted to the content owner.Type: ApplicationFiled: December 16, 2011Publication date: June 20, 2013Inventors: Lincoln W. Hochberg, Vishu Gupta
-
Publication number: 20130159123Abstract: A content access management system receives an access determination requested identifying an access rule and a requesting user. The access rule may be created in advance by the content owner at the content access management system. The access rule may allow access to content objects based on the requesting user's biographic information, geographic information, affiliation information, payment information, or any other user characteristic. The user information may be entered by the requesting user at a social networking system interface for purposes unrelated to the content object or content owner. The content access management system retrieves the identified access rule and retrieves requesting user information based on the access rule. An access determination is made based on the retrieved access rule and requesting user information, and is transmitted to the content owner.Type: ApplicationFiled: December 16, 2011Publication date: June 20, 2013Inventors: Lincoln W. Hochberg, Vishu Gupta
-
Publication number: 20130012306Abstract: To encourage purchases and use, licenses to certain interactive applications and/or content are able to be given as gifts to others as part of a user purchasing a license for herself. In one implementation, each purchase of a license to an application includes the right to give a license to up to a predefined limit of other people. For example, the purchasing user buys a license for herself and the right to name a number of other people to also receive licenses to the same interactive application or content.Type: ApplicationFiled: September 14, 2012Publication date: January 10, 2013Inventors: David Morin, Joshua E. Elman, Vishu Gupta, Blaise A. DiPersia
-
Publication number: 20120239693Abstract: An integrated program lookup browser provides an integrated system with an online program lookup web service that assists the user in finding these unrecognized files, protocols and web page objects by allowing the user to perform a program lookup on a web service that can search one or more databases and return the URL to download the appropriate application or protocol or return the actual program or protocol.Type: ApplicationFiled: June 4, 2012Publication date: September 20, 2012Applicant: Microsoft CorporationInventors: Linda W. Averett, Tariq Sharif, Roberto A. Franco, Anthony T. Chor, Vishu Gupta, Venkatraman V. Kundallur, Joseph T. Farro
-
Patent number: 8195640Abstract: An integrated program lookup browser provides an integrated system with an online program lookup web service that assists the user in finding these unrecognized files, protocols and web page objects by allowing the user to perform a program lookup on a web service that can search one or more databases and return the URL to download the appropriate application or protocol or return the actual program or protocol.Type: GrantFiled: June 16, 2006Date of Patent: June 5, 2012Assignee: Microsoft CorporationInventors: Linda W. Averett, Tariq Sharif, Roberto A. Franco, Anthony T. Chor, Vishu Gupta, Venkatraman V. Kudallur, Joseph T. Farro
-
Patent number: 8037135Abstract: Automatic distributed downloading (ADD) may involve, for example, enabling the downloading of a resource via a peer-to-peer (P2P)-based protocol from a uniform resource identifier (URI). In an example embodiment, an ADD module includes a directory client that sends to a directory service a mapping request including a URI corresponding to a targeted resource and receives a mapping response including P2P session connection information. The targeted resource can be retrieved over a P2P network via a P2P-based protocol using the P2P session connection information. In another example embodiment, a mapping data structure is accessed with reference to a URI. An entry corresponding to the referenced URI is ascertained and P2P session connection information from the entry is extracted. The URI corresponds to a source making the resource available via a client-server-based protocol, and the P2P session connection information makes the resource available via a P2P-based protocol.Type: GrantFiled: June 29, 2007Date of Patent: October 11, 2011Assignee: Microsoft CorporationInventors: Dave L Risney, Jr., Vishu Gupta
-
Publication number: 20110125599Abstract: To encourage purchases and use, licenses to certain interactive applications and/or content are able to be given as gifts to others as part of a user purchasing a license for herself. In one implementation, each purchase of a license to an application includes the right to give a license to up to a predefined limit of other people. For example, the purchasing user buys a license for herself and the right to name a number of other people to also receive licenses to the same interactive application or content.Type: ApplicationFiled: November 20, 2009Publication date: May 26, 2011Inventors: David Morin, Joshua E. Elman, Vishu Gupta, Blaise A. DiPersia
-
Publication number: 20110087526Abstract: In a social networking system environment, users can give another user credits, a scarce commodity, as part of commenting on content posted by the other user. These credits can be used as a peer-to-peer recommendation signal, and they can also be used as input to a decision engine that determines what content to display in a highlights section that will be viewed by a wider audience and increasing the likelihood of further engagement with the content. Credits in a social networking system environment have scarcity value. In various embodiments, in order to increase the number of credits in the system, users buy them or an administrator distributes them. In some implementations, the total amount of credits in the system can decrease if a user cashes out the credits for real money. In some implementations, credits can be used to buy virtual or real-world gifts.Type: ApplicationFiled: April 2, 2010Publication date: April 14, 2011Inventors: Jared Morgenstern, Joel Seligstein, Soleio Cuervo, Huai Wang, Mark E. Zuckerberg, William Chen, Man-hay Tam, Vishu Gupta
-
Publication number: 20100107251Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.Type: ApplicationFiled: January 11, 2010Publication date: April 29, 2010Inventors: Venkatraman V. Kudallur, Shankar Ganesh, Roberto A. Franco, Vishu Gupta, John G. Bedworth
-
Patent number: 7660999Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.Type: GrantFiled: June 22, 2004Date of Patent: February 9, 2010Assignee: Microsoft CorporationInventors: Venkatraman V. Kudallur, Shankar Ganesh, Roberto A. Franco, Vishu Gupta, John G. Bedworth
-
Publication number: 20090006538Abstract: Automatic distributed downloading (ADD) may involve, for example, enabling the downloading of a resource via a peer-to-peer (P2P)-based protocol from a uniform resource identifier (URI). In an example embodiment, an ADD module includes a directory client that sends to a directory service a mapping request including a URI corresponding to a targeted resource and receives a mapping response including P2P session connection information. The targeted resource can be retrieved over a P2P network via a P2P-based protocol using the P2P session connection information. In another example embodiment, a mapping data structure is accessed with reference to a URI. An entry corresponding to the referenced URI is ascertained and P2P session connection information from the entry is extracted. The URI corresponds to a source making the resource available via a client-server-based protocol, and the P2P session connection information makes the resource available via a P2P-based protocol.Type: ApplicationFiled: June 29, 2007Publication date: January 1, 2009Applicant: Microsoft CorporationInventors: Dave L. Risney, JR., Vishu Gupta
-
Publication number: 20070294256Abstract: An integrated program lookup browser provides an integrated system with an online program lookup web service that assists the user in finding these unrecognized files, protocols and web page objects by allowing the user to perform a program lookup on a web service that can search one or more databases and return the URL to download the appropriate application or protocol or return the actual program or protocol.Type: ApplicationFiled: June 16, 2006Publication date: December 20, 2007Applicant: Microsoft CorporationInventors: Linda W. Averett, Tariq Sharif, Roberto A. Franco, Anthony T. Chor, Vishu Gupta, Venkatraman V. Kudallur, Joseph T. Farro
-
Publication number: 20070131865Abstract: Security identifiers are analyzed to mitigate the use of misleading characters. In some embodiments, a language-based character set determination is utilized and looks for characters that are different from those that a user and/or the user's system would expect to see.Type: ApplicationFiled: November 21, 2005Publication date: June 14, 2007Applicant: Microsoft CorporationInventors: Eric Lawrence, Venkatraman Kudallur, Roberto Franco, Anthony Chor, Michel Suignard, James Fox, Vishu Gupta
-
Publication number: 20060010241Abstract: A model restricts un-trusted data/objects from running on a user's machine without permission. The data is received by a protocol layer that reports a MIME type associated with the DATA, and caches the data and related cache file name (CFN). A MIME sniffer is arranged to identify a sniffed MIME type based on the cached data, the CFN, and the reported MIME type. Reconciliation logic evaluates the sniffed MIME type and the CFN to determine a reconciled MIME type, and to update the CFN. A class ID sniffer evaluates the updated CFN, the cached data, and the reconciled MIME type to determine an appropriate class ID. Security logic evaluates the updated CFN, the reported class ID, and other related system parameters to build a security matrix. Parameters from the security matrix are used to intercept data/objects before an un-trusted data/object can create a security breach on the machine.Type: ApplicationFiled: June 22, 2004Publication date: January 12, 2006Applicant: Microsoft CorporationInventors: Venkatraman Kudallur, Shankar Ganesh, Roberto Franco, Vishu Gupta, John Bedworth
-
Patent number: 6975591Abstract: A method for improving TCP throughput over lossy communication links without affecting performance over non-lossy links comprises determining lookahead-loss which is the number of lost packets in a given loss-window; using the loss-window and lookahead-loss to detect congestion in the communication links; and controlling transmission under congestion conditions and under normal conditions, wherein the controlling transmission comprises controlling a size of the loss-window by beginning in a slow-start phase; advancing to a congestion avoidance phase when a slow-start threshold is reached; entering a halt growth phase when the first level of packet loss has been recovered; returning to the congestion avoidance phase when a first level of packet recovery occurs; entering a k-recovery phase when a second level of packet loss occurs. The loss window and slow-start threshold are reduced in half and returned to the congestion avoidance phase when the second level of packet loss has been recovered.Type: GrantFiled: November 22, 2000Date of Patent: December 13, 2005Assignee: International Business Machines CorporationInventors: Rajeev Shorey, Abhay Chrungoo, Vishu Gupta, Huzur Saran
-
Patent number: 6877035Abstract: A method, apparatus, computer program product, and decision support system and for allocating hosting-service resources to clients in at least one shared server. The method comprises discovering utilization patterns of the clients; monitoring the clients to discover the utilization patterns; providing bounds specifying minimum and maximum hosting-service resources for each of the clients; modeling dimensions for client user measures and the utilization patterns; and allocating the resources to the clients dependent on the utilization patterns. The step of allocating is also dependent upon the bounds.Type: GrantFiled: January 29, 2001Date of Patent: April 5, 2005Assignee: International Business Machines CorporationInventors: Johara Shireen Shahabuddin, Kannan Balaji, Sanjiv Kapoor, Sandeep Juneja, Vishu Gupta, Abhay Chrungoo
-
Publication number: 20020143945Abstract: A method, an apparatus, and a computer program product are disclosed for allocating hosting-service resources to clients in at least one shared server. In the method, utilization patterns of the clients are discovered. The resources are then allocated to the clients dependent on the utilization patterns. Preferably, the method includes the step of providing bounds specifying minimum and maximum hosting-service resources for each of the clients, with the allocating step also being dependent upon the bounds.Type: ApplicationFiled: January 29, 2001Publication date: October 3, 2002Inventors: Johara Shireen Shahabuddin, Kannan Balaji, Sanjiv Kapoor, Sandeep Juneja, Vishu Gupta, Abhay Chrungoo