Patents by Inventor Ameya Bhatawdekar
Ameya Bhatawdekar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9065826Abstract: Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers.Type: GrantFiled: August 8, 2011Date of Patent: June 23, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Ryan Charles Colvin, Elliott Jeb Haber, Ameya Bhatawdekar, Anthony P. Penta
-
Patent number: 8863291Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.Type: GrantFiled: January 20, 2011Date of Patent: October 14, 2014Assignee: Microsoft CorporationInventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
-
Patent number: 8606803Abstract: Data stored in relational databases can be retrieved using a relational database query language, while data stored in a multidimensional database is typically retrieved using a multidimensional database query language. However, most users do not have a functional working knowledge of multidimensional database query languages, which leaves large amounts of data inaccessible. Further, while some relational database query languages may be translated into a multidimensional database language, the information generated by such translations is often unusable, or returns large numbers of errors. In order to obtain effective translation of a relational database query language to a multidimensional database query language effective translation and filtering needs to occur. Using effective mapping and retrieval of database metadata along with effective, customizable business logic filtering of query components, more effective and reliable results may be achieved.Type: GrantFiled: April 1, 2008Date of Patent: December 10, 2013Assignee: Microsoft CorporationInventors: Ameya Bhatawdekar, Alan Hebert, Karthik Subramanyam, Mauli Shah, Jian H. Li
-
Publication number: 20130042294Abstract: Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers.Type: ApplicationFiled: August 8, 2011Publication date: February 14, 2013Applicant: Microsoft CorporationInventors: Ryan Charles Colvin, Elliott Jeb Haber, Ameya Bhatawdekar, Anthony P. Penta
-
Publication number: 20130036466Abstract: One or more techniques and/or systems are provided for internet connectivity protection. In particular, reputational information assigned to infrastructure components (e.g., IP addresses, name servers, domains, etc.) may be leveraged to determine whether an infrastructure component associated with a user navigating to content of a URL is malicious or safe. For example, infrastructure component data associated with a web browser navigating to a website of a URL may be collected and sent to a reputation server. The reputation server may return reputation information associated with the infrastructure component data (e.g., an IP address may be known as malicious even though the URL may not yet have a reputation). In this way, the user may be provided with notifications, such as warnings, when various unsafe conditions arise, such as interacting with an infrastructure component with a bad reputation, a resolved IP address not matching the URL, etc.Type: ApplicationFiled: August 1, 2011Publication date: February 7, 2013Applicant: Microsoft CorporationInventors: Anthony P. Penta, Elliott Jeb Haber, Ameya Bhatawdekar, Ryan Charles Colvin, David Douglas DeBarr, Geoffrey John Hulten
-
Publication number: 20120192275Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.Type: ApplicationFiled: January 20, 2011Publication date: July 26, 2012Applicant: MICROSOFT CORPORATIONInventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
-
Publication number: 20090249125Abstract: Data stored in relational databases can be retrieved using a relational database query language, while data stored in a multidimensional database is typically retrieved using a multidimensional database query language. However, most users do not have a functional working knowledge of multidimensional database query languages, which leaves large amounts of data inaccessible. Further, while some relational database query languages may be translated into a multidimensional database language, the information generated by such translations is often unusable, or returns large numbers of errors. In order to obtain effective translation of a relational database query language to a multidimensional database query language effective translation and filtering needs to occur. Using effective mapping and retrieval of database metadata along with effective, customizable business logic filtering of query components, more effective and reliable results may be achieved.Type: ApplicationFiled: April 1, 2008Publication date: October 1, 2009Applicant: MICROSOFT CORPORATIONInventors: Ameya Bhatawdekar, Alan Hebert, Karthik Subramanyam, Mauli Shah, Jian H. Li
-
Publication number: 20070239725Abstract: In a client-server computer system, an active cache is utilized by a client-based project management application program to access and manage server-based project files offline. The current status of a connection between the client and the server is monitored. If the status of the connection between the client and server is offline, project files are opened, modified, and saved to the active cache on the client. If the status of the connection between the client and server is online, project files stored in the active cache may be updated by the server prior to being opened. Changes made to project files saved to the cache are synchronized with the server.Type: ApplicationFiled: March 28, 2006Publication date: October 11, 2007Applicant: Microsoft CorporationInventors: Sudin Bhat, Rajendra Vishnumurty, Liang Xiao, Raju Iyer, Pradeep GanapathyRaj, Ameya Bhatawdekar
-
Publication number: 20070101003Abstract: Systems and methods are disclosed for providing proprietary access to a server. The disclosed systems and methods may include receiving a first service request from a client. The first service request may include a client identifier. Furthermore, the disclosed systems and methods may include creating a session identifier when it is determined that the client identifier is valid and transmitting the session identifier to the client. Moreover, the disclosed systems and methods may include receiving a second service request from the client. The second service request may include the session identifier and client data that may have at least one of a proprietary format and a proprietary scheme. In addition, the disclosed systems and methods may include servicing the second service request when it is determined that the session identifier received in the second service request is valid.Type: ApplicationFiled: October 27, 2005Publication date: May 3, 2007Applicant: Microsoft CorporationInventors: Ameya Bhatawdekar, Pradeep GanapathyRaj, Rajendra Vishnumurty, Raju Iyer, Sudin Bhat, Robert Turner, Liang Xiao
-
Publication number: 20060241997Abstract: A project management system is integrated with a workflow engine to provide automatic coordination of project tasks and workflow processes. The workflow engine provides support for defining logical expressions that determine a path of execution for the defined workflow tasks. In addition to composition capabilities, the workflow engine may execute and track the defined processes. The project management system provides a platform for defining the project plan that includes tasks and resources. Tasks are annotated defining their behavior and implementation and exported to the workflow system. The workflow system substitutes project tasks with the appropriate workflow activities and provides feedback upon execution of the activities.Type: ApplicationFiled: April 20, 2005Publication date: October 26, 2006Applicant: Microsoft CorporationInventors: Ameya Bhatawdekar, Imran Aziz
-
Publication number: 20060136933Abstract: The present invention relates to a system for generating events for a server application executing in a first process on a server computer. The system includes a server event service on the server computer executing in a second process independent of the first process. The server event service has a plurality of event handlers each event handler associated with a specified server event. The server event service is capable of receiving a server event from the server application and identifying one or more event handlers associated with the server event. The server event service then passes information related to the server event to the identified event handlers. The event handlers, in response to receiving the information related to an associated server event, generates one or more output events for the server application. In the system, the server event is generated by the server application in response to a request received from a client application on a remote client computer.Type: ApplicationFiled: December 17, 2004Publication date: June 22, 2006Applicant: Microsoft CorporationInventors: Aaron Jensen, Ameya Bhatawdekar