Patents by Inventor Alexandru Gavrilescu
Alexandru Gavrilescu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20090028146Abstract: The invention provides an apparatus and method to establish media sessions for media streams crossing a network boundary. The system includes a media relay controlled by a media configurator control module. The media relay reserves media paths (that include ports in the network boundary), opens the media paths, closes the media paths, and provides information about the media paths. A media configurator is adapted to communicate with the media configurator control module and the media relay. The control module has an event handler handling multimedia session events, a local address resolver that determines if an address identifier of the media session belongs to a private address space and a control element used to establish the media path. The control element manages resources for the media relay. A state-refresh timer is used to maintain state consistency between all media relays controlled by a proxy engine and control elements.Type: ApplicationFiled: September 8, 2008Publication date: January 29, 2009Applicant: Microsoft CorporationInventors: Ilya Kleyman, Alexandru Gavrilescu
-
Publication number: 20090006849Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.Type: ApplicationFiled: June 13, 2008Publication date: January 1, 2009Applicant: MICROSOFT CORPORATIONInventors: Rohit Gupta, Alexandru Gavrilescu, John L. Miller, Graham A. Wheeler
-
Publication number: 20080295170Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.Type: ApplicationFiled: June 13, 2008Publication date: November 27, 2008Applicant: MICROSOFT CORPORATIONInventors: Rohit Gupta, Alexandru Gavrilescu, John L. Miller, Graham A. Wheeler
-
Patent number: 7454510Abstract: The invention provides an apparatus and method to establish media sessions for media streams crossing a network boundary. The system includes a media relay controlled by a media configurator control module. The media relay reserves media paths (that include ports in the network boundary), opens the media paths, closes the media paths, and provides information about the media paths. A media configurator is adapted to communicate with the media configurator control module and the media relay. The control module has an event handler handling multimedia session events, a local address resolver that determines if an address identifier of the media session belongs to a private address space and a control element used to establish the media path. The control element manages resources for the media relay. A state-refresh timer is used to maintain state consistency between all media relays controlled by a proxy engine and control elements.Type: GrantFiled: May 29, 2003Date of Patent: November 18, 2008Assignee: Microsoft CorporationInventors: Ilya Kleyman, Alexandru Gavrilescu
-
Patent number: 7444372Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.Type: GrantFiled: March 15, 2006Date of Patent: October 28, 2008Assignee: Microsoft CorporationInventors: Rohit Gupta, Alexandru Gavrilescu, John L. Miller, Graham A. Wheeler
-
Patent number: 7418479Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.Type: GrantFiled: March 15, 2006Date of Patent: August 26, 2008Assignee: Microsoft CorporationInventors: Rohit Gupta, Alexandru Gavrilescu, John L. Miller, Graham A. Wheeler
-
Patent number: 7397922Abstract: A system and method for providing security to a graph of interconnected nodes includes a grouping multiplexing layer configured to monitor calls to the system, a graphing dynamic link layer configured to transmit and receive data to and from the graph, and a group security manager coupled to the grouping multiplexing layer and coupled to the graphing dynamic link layer; the group security manager is configured to perform security-related acts via interacting with a group database to propagate security-related information to members of a group within the graph. The group security manager is configured to provide role-based authorization on publication of one or more records and provide membership control for admission to a graph of interconnected nodes. The group security manager provides membership control by providing credentials to potential members of the graph to enable a connection and by providing a governed system for renewal and revocation of members.Type: GrantFiled: June 27, 2003Date of Patent: July 8, 2008Assignee: Microsoft CorporationInventors: Alexandru Gavrilescu, Graham A. Wheeler, Grigori M. Somin, John L. Miller, Rohit Gupta
-
Patent number: 7350107Abstract: A network diagnostics system allows determining a root cause for a network problem caused by a local or a remote component of the network, wherein the network diagnostic system may receive the symptoms of such a problem from an application. The network diagnostic system uses a plurality of helper classes, each of the plurality of helper classes providing diagnostic information about an object or a class of objects on the network. Moreover, the network diagnostic system may also use one or more extensible helper classes that are designed to receive information from third party helper classes.Type: GrantFiled: April 29, 2005Date of Patent: March 25, 2008Assignee: Microsoft CorporationInventors: David G. Thaler, Alexandru Gavrilescu, Tin Qian
-
Patent number: 7299351Abstract: A method for use in a peer-to-peer communication system to ensure valid connections are made in a secure manner includes the steps of receiving an address record for a peer node which includes an ID certificate. The ID certificate is validated and checked to verify that the ID certificate has not expired. Further, the method determines if the node from whom the address record was received is to be trusted, and the number of instances of the IP address included in the certificate is already stored in cache. When the foregoing are completed successfully, i.e. the certificate is valid, not expired, has been supplied by a trusted neighbor, and does not point to an IP address that already exists for different ID's multiple times, the method opportunistically verifies ownership of the ID certificate at the peer node's IP address. That is, the verification of ownership only occurs when the advertiser of the ID is the owner of that ID (or when the ID is to be used).Type: GrantFiled: September 19, 2001Date of Patent: November 20, 2007Assignee: Microsoft CorporationInventors: Christian Huitema, John L. Miller, Alexandru Gavrilescu
-
Publication number: 20070245033Abstract: Described is a technology including an Ethernet layer 2 protocol by which a node of a computer network can discover information about other network computing elements, including discovering network topology information, and/or collecting diagnostic information. The protocol allows multiple responders to communicate data with a mapper node for topology discovery, with one or more enumerator nodes for quick enumeration, or with a controller node for network tests that collect diagnostic information. The responders process the received data to determine the type of service (quick discovery, topology discovery or network test) and the service type's related function, and take action based on these and possibly additional criteria in the data. Actions may include responding to the data, following received commands, collecting statistics, responding to queries, and so forth.Type: ApplicationFiled: April 14, 2006Publication date: October 18, 2007Applicant: Microsoft CorporationInventors: Alexandru Gavrilescu, Alvin Tan, Austin Donnelly, Chong Zhang, Glen Ward, Richard Black
-
Publication number: 20070201384Abstract: A graphical user interface integrates into a single view multiple network devices discovered over a plurality of network protocols. The graphical user interface provides an intuitive user interface to indicate to a user the existence of all potential resources as defined by a network profile, the characteristics and properties of the resources via the representation of the device, and an interaction process specific to each discovered device that is customizable and extensible.Type: ApplicationFiled: February 28, 2006Publication date: August 30, 2007Applicant: MICROSOFT CORPORATIONInventors: Aaron Cunningham, Marieke Watson, Patrice Miner, Alexandru Gavrilescu, Haiyong Wang
-
Publication number: 20070204231Abstract: The claimed method and system provides a graphical user interface that illustrates network topology information, including connection paths between devices on the local network and an external network such as the Internet. The claimed method and system may use a three column format for presenting the topology that is more intuitive for a user. Also, the claimed method and system may aggregate context and connection information from multiple different protocols to provide the topology display. Further, the claimed method and system may use a device registry to enable customized and extensible representations of the network devices.Type: ApplicationFiled: February 28, 2006Publication date: August 30, 2007Applicant: MICROSOFT CORPORATIONInventors: Aaron Cunningham, Marieke Watson, Patrice Miner, Alexandru Gavrilescu, Haiyong Wang, Dennis Morgan
-
Publication number: 20070177499Abstract: By reviewing incoming packets, the network connectivity of a network access site may be determined. The review can be passive where incoming packets are reviewed and no additional network traffic is generated or the review may be active where packet probes are sent to locations and the response are reviewed to determine connectivity.Type: ApplicationFiled: January 31, 2006Publication date: August 2, 2007Applicant: MICROSOFT CORPORATIONInventors: Alexandru Gavrilescu, Tin Qian
-
Patent number: 7251694Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.Type: GrantFiled: March 15, 2006Date of Patent: July 31, 2007Assignee: Microsoft CorporationInventors: Rohit Gupta, Alexandru Gavrilescu, John L. Miller, Graham A. Wheeler
-
Publication number: 20070168512Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.Type: ApplicationFiled: March 15, 2006Publication date: July 19, 2007Applicant: MICROSOFT CORPORATIONInventors: Rohit Gupta, Alexandru Gavrilescu, John Miller, Graham Wheeler
-
Patent number: 7188254Abstract: Disclosed are peer-to-peer computer program products, methods, and systems in which a remote peer on a peer-to-peer network is granted or denied access to a resource based on the credentials presented by the remote peer. In accordance with the disclosed subject matter, an access token that includes one or more security identification values which represent respectively one or more access rights in an access control system is generated. An execution thread that is associated with the access token thus generated attempts to access the resource on behalf of the remote peer. In some embodiments, the access control system includes a generic user account, and the access token that is generated for the remote peer includes the security identification value associated with the generic user account in the access control system.Type: GrantFiled: August 20, 2003Date of Patent: March 6, 2007Assignee: Microsoft CorporationInventors: Grigori M. Somin, David Mowers, Alexandru Gavrilescu
-
Publication number: 20060248389Abstract: A network diagnostics system allows determining a root cause for a network problem caused by a local or a remote component of the network, wherein the network diagnostic system may receive the symptoms of such a problem from an application. The network diagnostic system uses a plurality of helper classes, each of the plurality of helper classes providing diagnostic information about an object or a class of objects on the network. Moreover, the network diagnostic system may also use one or more extensible helper classes that are designed to receive information from third party helper classes.Type: ApplicationFiled: April 29, 2005Publication date: November 2, 2006Applicant: MICROSOFT CORPORATIONInventors: David Thaler, Alexandru Gavrilescu, Tin Qian
-
Publication number: 20060230134Abstract: A network experience rating system and method determines a network connection quality for a computer by monitoring characteristics of data traffic through a connection with another computer on the network. The network experience rating system statistically analyzes the characteristic data and compares the statistically analyzed data to historical data gathered for the computer. The network experience rating system thus provides a rating that is individualized for a particular computer based on the computer's network usage.Type: ApplicationFiled: April 11, 2005Publication date: October 12, 2006Inventors: Tin Qian, Alexandru Gavrilescu, Alvin Tan
-
Publication number: 20060179139Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.Type: ApplicationFiled: March 15, 2006Publication date: August 10, 2006Applicant: MICROSOFT CORPORATIONInventors: Rohit Gupta, Alexandru Gavrilescu, John Miller, Graham Wheeler
-
Publication number: 20060174005Abstract: A security infrastructure and methods are presented that inhibit the ability of a malicious node from disrupting the normal operations of a peer-to-peer network. The methods of the invention allow both secure and insecure identities to be used by nodes by making them self-verifying. When necessary or opportunistic, ID ownership is validated by piggybacking the validation on existing messages. The probability of connecting initially to a malicious node is reduced by randomly selecting to which node to connect. Further, information from malicious nodes is identified and can be disregarded by maintaining information about prior communications that will require a future response. Denial of service attacks are inhibited by allowing the node to disregard requests when its resource utilization exceeds a predetermined limit. The ability for a malicious node to remove a valid node is reduced by requiring that revocation certificates be signed by the node to be removed.Type: ApplicationFiled: March 15, 2006Publication date: August 3, 2006Applicant: MICROSOFT CORPORATIONInventors: Rohit Gupta, Alexandru Gavrilescu, John Miller, Graham Wheeler