Patents by Inventor Xiaoxi Tan

Xiaoxi Tan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8701047
    Abstract: A configuration management and monitoring system may use a hierarchical knowledge base to identify configuration settings, resolve conflicts between configuration settings, and implement and monitor the configuration settings for one or more devices in a network environment. The system may produce a file that may be consumed by an application and with which the application may be configured to conform to the configuration settings. The system may also produce a set of settings that may be used to automate deployment and monitor compliance with the settings.
    Type: Grant
    Filed: January 14, 2009
    Date of Patent: April 15, 2014
    Assignee: Microsoft Corporation
    Inventors: Thomas Cloward, Xiaoxi Tan
  • Patent number: 8065534
    Abstract: A state store having state information therein is stored on a computing device. Information at least nearly unique to the computing device is obtained, and a number of locations at which at least a portion of the state store is to be stored at is determined. Pseudo-random file names and corresponding paths are generated based at least in part on the obtained information, whereby the generated file names and corresponding paths are likewise at least nearly unique to the computing device, and the generated file names and path are paired to form the locations. Thereafter, the state store is stored according to the generated locations.
    Type: Grant
    Filed: June 21, 2010
    Date of Patent: November 22, 2011
    Assignee: Microsoft Corporation
    Inventors: Xiaoxi Tan, Caglar Gunyakti, Yue Liu, Karan S. Dhillon, Kristian E. Hatlelid
  • Publication number: 20100257378
    Abstract: A state store having state information therein is stored on a computing device. Information at least nearly unique to the computing device is obtained, and a number of locations at which at least a portion of the state store is to be stored at is determined. Pseudo-random file names and corresponding paths are generated based at least in part on the obtained information, whereby the generated file names and corresponding paths are likewise at least nearly unique to the computing device, and the generated file names and path are paired to form the locations. Thereafter, the state store is stored according to the generated locations.
    Type: Application
    Filed: June 21, 2010
    Publication date: October 7, 2010
    Applicant: Microsoft Corporation
    Inventors: Xiaoxi Tan, Caglar Gunyakti, Yue Liu, Karan S. Dhillon, Kristian E. Hatlelid
  • Patent number: 7774623
    Abstract: A state store having state information therein is stored on a computing device. Information at least nearly unique to the computing device is obtained, and a number of locations at which at least a portion of the state store is to be stored at is determined. Pseudo-random file names and corresponding paths are generated based at least in part on the obtained information, whereby the generated file names and corresponding paths are likewise at least nearly unique to the computing device, and the generated file names and path are paired to form the locations. Thereafter, the state store is stored according to the generated locations.
    Type: Grant
    Filed: September 22, 2008
    Date of Patent: August 10, 2010
    Assignee: Microsoft Corporation
    Inventors: Xiaoxi Tan, Caglar Gunyakti, Yue Liu, Karan S. Dhillon, Kristian E. Hatlelid
  • Publication number: 20100180221
    Abstract: A configuration management and monitoring system may use a hierarchical knowledge base to identify configuration settings, resolve conflicts between configuration settings, and implement and monitor the configuration settings for one or more devices in a network environment. The system may produce a file that may be consumed by an application and with which the application may be configured to conform to the configuration settings. The system may also produce a set of settings that may be used to automate deployment and monitor compliance with the settings.
    Type: Application
    Filed: January 14, 2009
    Publication date: July 15, 2010
    Applicant: Microsoft Corporation
    Inventors: Thomas Cloward, Xiaoxi Tan
  • Patent number: 7644442
    Abstract: A method, system and computer-readable medium for deterring software piracy in a volume license environment. A volume license key embedded within a volume license file is received. The volume license key has first data derived from at least one machine attribute of the environment. The volume license file is authenticated using second data derived from at least one machine attribute of the environment. A software package associated with the volume license key is then activated on at least one computing device in the environment.
    Type: Grant
    Filed: March 24, 2005
    Date of Patent: January 5, 2010
    Assignee: Microsoft Corporation
    Inventors: Ronald W. Miller, Xiaoxi Tan
  • Publication number: 20090031146
    Abstract: A state store having state information therein is stored on a computing device. Information at least nearly unique to the computing device is obtained, and a number of locations at which at least a portion of the state store is to be stored at is determined. Pseudo-random file names and corresponding paths are generated based at least in part on the obtained information, whereby the generated file names and corresponding paths are likewise at least nearly unique to the computing device, and the generated file names and path are paired to form the locations. Thereafter, the state store is stored according to the generated locations.
    Type: Application
    Filed: September 22, 2008
    Publication date: January 29, 2009
    Applicant: Microsoft Corporation
    Inventors: Xiaoxi Tan, Caglar Gunyakti, Yue Liu, Karan S. Dhillon, Kristian E. Hatlelid
  • Patent number: 7447917
    Abstract: A state store having state information therein is stored on a computing device. Information at least nearly unique to the computing device is obtained, and a number of locations at which at least a portion of the state store is to be stored at is determined. Pseudo-random file names and corresponding paths are generated based at least in part on the obtained information, whereby the generated file names and corresponding paths are likewise at least nearly unique to the computing device, and the generated file names and path are paired to form the locations. Thereafter, the state store is stored according to the generated locations.
    Type: Grant
    Filed: November 12, 2003
    Date of Patent: November 4, 2008
    Assignee: Microsoft Corporation
    Inventors: Xiaoxi Tan, Caglar Gunyakti, Yue Liu, Karan S. Dhillon, Kristian E. Hatlelid
  • Publication number: 20080127354
    Abstract: A condition-based authorization model for data access is provided. According to the model, the owner of a securable software object, such as a file, folder, or process, may specify a security policy that includes an access condition for accessing the object. The access condition may be based on dynamic user or system state information having a value that is updatable while a user is logged on, such as system time or user location. When a later request is received from a user to perform an action on the object via an application programming interface of a computer operating system, a security subsystem of the computer operating system queries a system resource containing information suitable to evaluate the access condition, and determines whether the access condition is met. If the access condition is met, access by the user to the securable software object is permitted. Otherwise, access is denied.
    Type: Application
    Filed: November 28, 2006
    Publication date: May 29, 2008
    Applicant: Microsoft Corporation
    Inventors: Matthew Chase Carpenter, Xiaoxi Tan
  • Patent number: 7379918
    Abstract: A method for reactivation of software products includes activating a first software product associated with a reactivation policy group. A hardware identifier derived from the computer hardware configuration is bound with the first software product activation. A second software product is activated having an associated reactivation binding list. Reactivation is requested for the first software product and an updated hardware identifier is associated with a reactivation policy group of the first software product. The second software product may be spared the request for reactivation if the second product can be associated with the reactivation of the first software product given the binding list is compatible with the reactivation policy group.
    Type: Grant
    Filed: July 30, 2004
    Date of Patent: May 27, 2008
    Assignee: Microsoft Corporation
    Inventors: Xiaoxi Tan, Caglar Gunyakti, Ravindra Nath Pandya, Aidan T. Hughes, Kristjan Hatlelid, Yue Liu
  • Patent number: 7356709
    Abstract: A unique volume license key (VLK) is provided to a volume license holder. A signed file containing the VLK and the data derived from volume license holder's submitted computing environment information is provided to the volume license holder along with the licensed software. The license file is stored in a central location, such as on an installation server, or locally on client machines, in a rather large file of any type. Upon logon, the license file is read, the data authenticated and the system is activated. If license data cannot be authenticated, a connected system either fully functions in grace period or run in reduced functionality mode until authentication succeeds. If the system is disconnected, the system is functional only with disconnected features until it joins a network again. In a completely off-line installation, the license file is generated by the volume license holder using software vendor assigned specific VLK and software vendor provided security hardware device.
    Type: Grant
    Filed: January 31, 2003
    Date of Patent: April 8, 2008
    Assignee: Microsoft Corporation
    Inventors: Caglar Gunyakti, Kristjan E. Hatlelid, Ning Zhang, Xiaoxi Tan
  • Publication number: 20060036552
    Abstract: A method and computer-readable medium for deterring software piracy in a volume license environment. An activation bypass message is generated and sent. Information contained in the activation bypass message is compared to a list of machine identifiers. A binding service message contains a count of the machine identifiers in the list. Once the count reaches a predetermined threshold, software activation bypass may occur.
    Type: Application
    Filed: September 15, 2005
    Publication date: February 16, 2006
    Applicant: Microsoft Corporation
    Inventors: Caglar Gunyakti, Ronald Miller, Xiaoxi Tan
  • Publication number: 20060026604
    Abstract: A method for reactivation of software products includes activating a first software product associated with a reactivation policy group. A hardware identifier derived from the computer hardware configuration is bound with the first software product activation. A second software product is activated having an associated reactivation binding list. Reactivation is requested for the first software product and an updated hardware identifier is associated with a reactivation policy group of the first software product. The second software product may be spared the request for reactivation if the second product can be associated with the reactivation of the first software product given the binding list is compatible with the reactivation policy group.
    Type: Application
    Filed: July 30, 2004
    Publication date: February 2, 2006
    Applicant: Microsoft Corporation
    Inventors: Xiaoxi Tan, Caglar Gunyakti, Ravindra Pandya, Aidan Hughes, Kristjan Hatlelid, Yue Liu
  • Publication number: 20050102528
    Abstract: A state store having state information therein is stored on a computing device. Information at least nearly unique to the computing device is obtained, and a number of locations at which at least a portion of the state store is to be stored at is determined. Pseudo-random file names and corresponding paths are generated based at least in part on the obtained information, whereby the generated file names and corresponding paths are likewise at least nearly unique to the computing device, and the generated file names and path are paired to form the locations. Thereafter, the state store is stored according to the generated locations.
    Type: Application
    Filed: November 12, 2003
    Publication date: May 12, 2005
    Inventors: Xiaoxi Tan, Caglar Gunyakti, Yue Liu, Karan Dhillon, Kristian Hatlelid
  • Publication number: 20040153658
    Abstract: A unique volume license key (VLK) is provided to a volume license holder. A signed file containing the VLK and the data derived from volume license holder's submitted computing environment information is provided to the volume license holder along with the licensed software. The license file is stored in a central location, such as on an installation server, or locally on client machines, in a rather large file of any type. Upon logon, the license file is read, the data authenticated and the system is activated. If license data cannot be authenticated, a connected system either fully functions in grace period or run in reduced functionality mode until authentication succeeds. If the system is disconnected, the system is functional only with disconnected features until it joins a network again. In a completely off-line installation, the license file is generated by the volume license holder using software vendor assigned specific VLK and software vendor provided security hardware device.
    Type: Application
    Filed: January 31, 2003
    Publication date: August 5, 2004
    Applicant: Microsoft Corporation
    Inventors: Caglar Gunyakti, Kristjan E. Hatlelid, Ning Zhang, Xiaoxi Tan