Patents by Inventor Abdelsalam A. Heddaya

Abdelsalam A. Heddaya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10389746
    Abstract: The low latency use of a multi-tenancy environment. To protect against hostility between tenants within different trust domains, tenant(s) of a common trust domain are run within a trust boundary component. Thus, there is security to protect against potential hostility between tenants of different trust domains. In order to quickly start up trust boundary components, there are multiple pre-readied (e.g., initialized, pre-booted, and/or snapshotted) trust boundary components that may be started up quickly when a new trust boundary is to be established. Processes within the trust boundary component may additionally be run within a resource container that facilitates allocation of resources amongst the various processes. Because trust boundary components may be started up quickly, the multi-tenancy environment may have security (as provided by the trust boundary components) while still being lower latency (due to the fast availability of pre-readied trust boundaries).
    Type: Grant
    Filed: September 27, 2016
    Date of Patent: August 20, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Sarvesh Sakalanaga, Abdelsalam Heddaya, Mitchel Chinedu Arene
  • Publication number: 20170093903
    Abstract: The low latency use of a multi-tenancy environment. To protect against hostility between tenants within different trust domains, tenant(s) of a common trust domain are run within a trust boundary component. Thus, there is security to protect against potential hostility between tenants of different trust domains. In order to quickly start up trust boundary components, there are multiple pre-readied (e.g., initialized, pre-booted, and/or snapshotted) trust boundary components that may be started up quickly when a new trust boundary is to be established. Processes within the trust boundary component may additionally be run within a resource container that facilitates allocation of resources amongst the various processes. Because trust boundary components may be started up quickly, the multi-tenancy environment may have security (as provided by the trust boundary components) while still being lower latency (due to the fast availability of pre-readied trust boundaries).
    Type: Application
    Filed: September 27, 2016
    Publication date: March 30, 2017
    Inventors: Sarvesh Sakalanaga, Abdelsalam Heddaya, Mitchel Chinedu Arene
  • Patent number: 8286033
    Abstract: A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.
    Type: Grant
    Filed: March 24, 2011
    Date of Patent: October 9, 2012
    Assignee: Microsoft Corporation
    Inventors: Paul L. Li, Andrew J. Lagattuta, Matthew Jeremiah Eason, Baskar Sridharan, Abdelsalam Heddaya, Stephan Doll
  • Patent number: 8117505
    Abstract: Resource exhaustion is anticipated, a cause of the resource exhaustion is identified and options are identified to address the resource exhaustion.
    Type: Grant
    Filed: November 7, 2005
    Date of Patent: February 14, 2012
    Assignee: Microsoft Corporation
    Inventors: Baskar Sridharan, Elsie Nallipogu, Abdelsalam Heddaya, Mario R. Garzia, Björn Levidow
  • Publication number: 20110214015
    Abstract: A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.
    Type: Application
    Filed: March 24, 2011
    Publication date: September 1, 2011
    Applicant: Microsoft Corporation
    Inventors: Paul L. Li, Andrew J. Lagattuta, Matt Eason, Baskar Sridharan, Abdelsalam Heddaya, Stephan Doll
  • Patent number: 7934129
    Abstract: A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.
    Type: Grant
    Filed: September 5, 2008
    Date of Patent: April 26, 2011
    Assignee: Microsoft Corporation
    Inventors: Paul L. Li, Andrew J. Lagattuta, Matt Eason, Baskar Sridharan, Abdelsalam Heddaya, Stephan Doll
  • Patent number: 7908521
    Abstract: Process reflection techniques are described in which a reflected process is created to facilitate analysis of a process. Events are detected to initiate reflection of a target process. Process reflection of a target process may be initiated by an external process or by the target process itself. A reflected process of the target process is created. In an implementation, data defining the target process is replicated, copied, or otherwise collected from the target process to create the reflected process. Then, analysis may be performed on the reflected process while execution of the target process continues.
    Type: Grant
    Filed: June 25, 2008
    Date of Patent: March 15, 2011
    Assignee: Microsoft Corporation
    Inventors: Baskar Sridharan, Abdelsalam A. Heddaya, Jonathan D. Morrison, Mujtaba S. Khambatti, Anthony J. Lorelli, Tristan P. K. Schmelcher
  • Patent number: 7774741
    Abstract: The resource leak detector attempts to identify the causes of resource leaks and fix the causes if possible. At a minimum, the located resource leaks are reported to an operating system manufacture for additional study and possible correction, either by the operating system manufacturer or the application manufacturer that is causing the resource leak. In an embodiment, in operation, a leak trigger for starting leak detection is started. If the leak trigger is activated, leak detection is started when an application begins. Resource allocations are tracked for the leaked resource and each leaked resource is matched to a corresponding allocation call stack. A type of the leaked resource may be identified. The leak detection and the leak trigger may be controlled according to at least one of a local policy and a global policy.
    Type: Grant
    Filed: May 22, 2006
    Date of Patent: August 10, 2010
    Assignee: Microsoft Corporation
    Inventors: Baskar Sridharan, Jason Stewart Wohlgemuth, Abdelsalam A. Heddaya, Elsie Nallipogu
  • Publication number: 20100064177
    Abstract: A method of detecting a network hang and restoring an application that communicates on a connection giving rise to the network hang. A user experience may be improved by providing the user with an option to restore the hung application without losing unsaved data or state information. The network hang may be detected when the user tries to terminate the application. The method may include determining whether the network hang is recoverable, which may involve diagnosing a type of the hang. If recoverable, a network connection reset mechanism may be triggered by instructing a network stack of the computer to terminate the network connection.
    Type: Application
    Filed: September 5, 2008
    Publication date: March 11, 2010
    Applicant: Microsoft Corporation
    Inventors: Paul L. Li, Andrew J. Lagattuta, Matt Eason, Baskar Sridharan, Abdelsalam Heddaya, Stephan Doll
  • Publication number: 20090327815
    Abstract: Process reflection techniques are described in which a reflected process is created to facilitate analysis of a process. Events are detected to initiate reflection of a target process. Process reflection of a target process may be initiated by an external process or by the target process itself. A reflected process of the target process is created. In an implementation, data defining the target process is replicated, copied, or otherwise collected from the target process to create the reflected process. Then, analysis may be performed on the reflected process while execution of the target process continues.
    Type: Application
    Filed: June 25, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Baskar Sridharan, Abdelsalam A. Heddaya, Jonathan D. Morrison, Mujtaba S. Khambatti, Anthony J. Lorelli, Tristan P.K. Schmelcher
  • Publication number: 20070271418
    Abstract: The resource leak detector attempts to identify the causes of resource leaks and fix the causes if possible. At a minimum, the located resource leaks are reported to an operating system manufacture for additional study and possible correction, either by the operating system manufacturer or the application manufacturer that is causing the resource leak.
    Type: Application
    Filed: May 22, 2006
    Publication date: November 22, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Baskar Sridharan, Jason Stewart Wohlgemuth, Abdelsalam A. Heddaya, Elsie Nallipogu
  • Publication number: 20070106636
    Abstract: Resource exhaustion is anticipated, a cause of the resource exhaustion is identified and options are identified to address the resource exhaustion.
    Type: Application
    Filed: November 7, 2005
    Publication date: May 10, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Baskar Sridharan, Elsie Nallipogu, Abdelsalam Heddaya, Mario Garzia, Bjorn Levidow
  • Publication number: 20070101338
    Abstract: A computer configured for managing multiple processing threads is susceptible to deadlocks or hangs when resources needed by one process are locked by another process that is not progressing. Locking relationships are created and released so quickly that rigidly monitoring these relationships would consume more computer power than are being monitored. An approach to determining the existence of a deadlock or hang uses a first ‘snapshot’ showing an approximation of locking relationships and then verifies a deadlock or hang using a second snapshot to determine if a suspected deadlock or hang is still present.
    Type: Application
    Filed: October 31, 2005
    Publication date: May 3, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Abdelsalam Heddaya, Stephan Doll, Bradley Waters, William Barnes
  • Patent number: 6892218
    Abstract: A technique fulfills service requests in a system of computers that communicate as nodes within a network. The technique involves sending, in response to an initial service request that requests a service provided by a primary server node, a mobile agent from the primary server node to an intermediate node. The mobile agent indicates to the intermediate node that a secondary server node is capable of providing the service. The technique further involves intercepting, at the intermediate node, a subsequent service request sent from a client node to the primary server node, the subsequent service request requesting the service, and sending an instruction from the intermediate node to the secondary server node. The instruction instructs the secondary server node to provide the service. The technique further includes providing, in response to the instruction, the service from the secondary server node to the client node.
    Type: Grant
    Filed: September 15, 2003
    Date of Patent: May 10, 2005
    Assignee: Certeon, Inc.
    Inventors: Abdelsalam A. Heddaya, Kevin T. Lewis, Sulaiman A. Mirdad, David J. Yates, Ian C. Yates
  • Publication number: 20040153499
    Abstract: A technique fulfills service requests in a system of computers that communicate as nodes within a network. The technique involves sending, in response to an initial service request that requests a service provided by a primary server node, a mobile agent from the primary server node to an intermediate node. The mobile agent indicates to the intermediate node that a secondary server node is capable of providing the service. The technique further involves intercepting, at the intermediate node, a subsequent service request sent from a client node to the primary server node, the subsequent service request requesting the service, and sending an instruction from the intermediate node to the secondary server node. The instruction instructs the secondary server node to provide the service. The technique further includes providing, in response to the instruction, the service from the secondary server node to the client node.
    Type: Application
    Filed: September 15, 2003
    Publication date: August 5, 2004
    Applicant: Certeon, Inc.
    Inventors: Abdelsalam A. Heddaya, Kevin T. Lewis, Sulaiman A. Mirdad, David J. Yates, Ian C. Yates
  • Patent number: 6622157
    Abstract: A technique fulfills service requests in a system of computers that communicate as nodes within a network. The technique involves sending, in response to an initial service request that requests a service provided by a primary server node, a mobile agent from the primary server node to an intermediate node. The mobile agent indicates to the intermediate node that a secondary server node is capable of providing the service. The technique further involves intercepting, at the intermediate node, a subsequent service request sent from a client node to the primary server node, the subsequent service request requesting the service, and sending an instruction from the intermediate node to the secondary server node. The instruction instructs the secondary server node to provide the service. The technique further includes providing, in response to the instruction, the service from the secondary server node to the client node.
    Type: Grant
    Filed: September 24, 1999
    Date of Patent: September 16, 2003
    Assignee: Certeon, Inc.
    Inventors: Abdelsalam A. Heddaya, Kevin T. Lewis, Sulaiman A. Mirdad, David J. Yates, Ian C. Yates
  • Publication number: 20020082858
    Abstract: A configuration management service in a client-server data processing system that manages distribution and installation of different versions and formats of resources so that they remain compatible with each other. When the resources are application programs, the service only distributes combinations of applications that are compatible with one another. This provides the advantages of local execution of application programs on a client computer while at the same time providing the advantages of managed configuration from the central server location. The applications continue to run on the clients and network hosting is not used. The service thus separates execution of applications from the control over their distribution. In a preferred embodiment, a hierarchical, networked cache storage arrangement is used to coordinate the actual physical storage and distribution of the resources as demands are made for them.
    Type: Application
    Filed: September 12, 2001
    Publication date: June 27, 2002
    Applicant: InfoLibria, Inc.
    Inventors: Abdelsalam A. Heddaya, Sulaiman A. Mirdad
  • Patent number: 6205481
    Abstract: A technique for automatic, transparent, distributed, scalable and robust replication of document copies in a computer network wherein request messages for a particular document follow paths from the clients to a home server that form a routing graph. Client request messages are routed up the graph towards the home server as would normally occur in the absence of caching. However, cache servers are located along the route, and may intercept requests if they can be serviced. In order to be able to service requests in this manner without departing from standard network protocols, the cache server needs to be able to insert a packet filter into the router associated with it, and needs also to proxy for the home server from the perspective of the client. Cache servers cooperate to update cache content by communicating with neighboring caches whenever information is received about invalid cache copies.
    Type: Grant
    Filed: March 17, 1998
    Date of Patent: March 20, 2001
    Assignee: InfoLibria, Inc.
    Inventors: Abdelsalam A. Heddaya, Sulaiman A. Mirdad, David J. Yates, Ian C. Yates
  • Patent number: 6167438
    Abstract: A technique for automatic, transparent, distributed, scalable and robust caching, prefetching, and replication in a computer network that request messages for a particular document follow paths from the clients to a home server that form a routing graph. Client request messages are routed up the graph towards the home server as would normally occur in the absence of caching. However, cache servers are located along the route, and may intercept requests if they can be serviced. In order to be able to service requests in this manner without departing from standard network protocols, the cache server needs to be able to insert a packet filter into the router associated with it, and needs also to proxy for the home server from the perspective of the client. Cache servers may cooperate to service client requests by caching and discarding documents based on its local load, the load on its neighboring caches, attached communication path load, and on document popularity.
    Type: Grant
    Filed: May 22, 1997
    Date of Patent: December 26, 2000
    Assignee: Trustees of Boston University
    Inventors: David J. Yates, Abdelsalam A. Heddaya, Sulaiman A. Mirdad