Patents by Inventor Ameya Bhatawdekar

Ameya Bhatawdekar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9065826
    Abstract: Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers.
    Type: Grant
    Filed: August 8, 2011
    Date of Patent: June 23, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ryan Charles Colvin, Elliott Jeb Haber, Ameya Bhatawdekar, Anthony P. Penta
  • Patent number: 8863291
    Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.
    Type: Grant
    Filed: January 20, 2011
    Date of Patent: October 14, 2014
    Assignee: Microsoft Corporation
    Inventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
  • Patent number: 8606803
    Abstract: Data stored in relational databases can be retrieved using a relational database query language, while data stored in a multidimensional database is typically retrieved using a multidimensional database query language. However, most users do not have a functional working knowledge of multidimensional database query languages, which leaves large amounts of data inaccessible. Further, while some relational database query languages may be translated into a multidimensional database language, the information generated by such translations is often unusable, or returns large numbers of errors. In order to obtain effective translation of a relational database query language to a multidimensional database query language effective translation and filtering needs to occur. Using effective mapping and retrieval of database metadata along with effective, customizable business logic filtering of query components, more effective and reliable results may be achieved.
    Type: Grant
    Filed: April 1, 2008
    Date of Patent: December 10, 2013
    Assignee: Microsoft Corporation
    Inventors: Ameya Bhatawdekar, Alan Hebert, Karthik Subramanyam, Mauli Shah, Jian H. Li
  • Publication number: 20130042294
    Abstract: Malware detection is often based on monitoring a local application binary and/or process, such as detecting patterns of malicious code, unusual local resource utilization, or suspicious application behavior. However, the volume of available software, variety of malware, and sophistication of evasion techniques may reduce the effectiveness of detection based on monitoring local resources. Presented herein are techniques for identifying malware based on the reputations of remote resources (e.g., web content, files, databases, IP addresses, services, and users) accessed by an application. Remote resource accesses may be reported to a reputation service, which may identify reputations of remote resources, and application reputations of applications that utilize such remote resources. These application reputations may be used to adjust the application policies of the applications executed by devices and servers.
    Type: Application
    Filed: August 8, 2011
    Publication date: February 14, 2013
    Applicant: Microsoft Corporation
    Inventors: Ryan Charles Colvin, Elliott Jeb Haber, Ameya Bhatawdekar, Anthony P. Penta
  • Publication number: 20130036466
    Abstract: One or more techniques and/or systems are provided for internet connectivity protection. In particular, reputational information assigned to infrastructure components (e.g., IP addresses, name servers, domains, etc.) may be leveraged to determine whether an infrastructure component associated with a user navigating to content of a URL is malicious or safe. For example, infrastructure component data associated with a web browser navigating to a website of a URL may be collected and sent to a reputation server. The reputation server may return reputation information associated with the infrastructure component data (e.g., an IP address may be known as malicious even though the URL may not yet have a reputation). In this way, the user may be provided with notifications, such as warnings, when various unsafe conditions arise, such as interacting with an infrastructure component with a bad reputation, a resolved IP address not matching the URL, etc.
    Type: Application
    Filed: August 1, 2011
    Publication date: February 7, 2013
    Applicant: Microsoft Corporation
    Inventors: Anthony P. Penta, Elliott Jeb Haber, Ameya Bhatawdekar, Ryan Charles Colvin, David Douglas DeBarr, Geoffrey John Hulten
  • Publication number: 20120192275
    Abstract: The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user.
    Type: Application
    Filed: January 20, 2011
    Publication date: July 26, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Daniel Oliver, Anshul Rawat, Xiang Tu, Ryan Colvin, James Dooley, Elliott Jeb Haber, Ameya Bhatawdekar, Andy Davidson, Jay Dave, Paul Leach, Karanbir Singh, Chris Guzak, Crispin Cowan
  • Publication number: 20090249125
    Abstract: Data stored in relational databases can be retrieved using a relational database query language, while data stored in a multidimensional database is typically retrieved using a multidimensional database query language. However, most users do not have a functional working knowledge of multidimensional database query languages, which leaves large amounts of data inaccessible. Further, while some relational database query languages may be translated into a multidimensional database language, the information generated by such translations is often unusable, or returns large numbers of errors. In order to obtain effective translation of a relational database query language to a multidimensional database query language effective translation and filtering needs to occur. Using effective mapping and retrieval of database metadata along with effective, customizable business logic filtering of query components, more effective and reliable results may be achieved.
    Type: Application
    Filed: April 1, 2008
    Publication date: October 1, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Ameya Bhatawdekar, Alan Hebert, Karthik Subramanyam, Mauli Shah, Jian H. Li
  • Publication number: 20070239725
    Abstract: In a client-server computer system, an active cache is utilized by a client-based project management application program to access and manage server-based project files offline. The current status of a connection between the client and the server is monitored. If the status of the connection between the client and server is offline, project files are opened, modified, and saved to the active cache on the client. If the status of the connection between the client and server is online, project files stored in the active cache may be updated by the server prior to being opened. Changes made to project files saved to the cache are synchronized with the server.
    Type: Application
    Filed: March 28, 2006
    Publication date: October 11, 2007
    Applicant: Microsoft Corporation
    Inventors: Sudin Bhat, Rajendra Vishnumurty, Liang Xiao, Raju Iyer, Pradeep GanapathyRaj, Ameya Bhatawdekar
  • Publication number: 20070101003
    Abstract: Systems and methods are disclosed for providing proprietary access to a server. The disclosed systems and methods may include receiving a first service request from a client. The first service request may include a client identifier. Furthermore, the disclosed systems and methods may include creating a session identifier when it is determined that the client identifier is valid and transmitting the session identifier to the client. Moreover, the disclosed systems and methods may include receiving a second service request from the client. The second service request may include the session identifier and client data that may have at least one of a proprietary format and a proprietary scheme. In addition, the disclosed systems and methods may include servicing the second service request when it is determined that the session identifier received in the second service request is valid.
    Type: Application
    Filed: October 27, 2005
    Publication date: May 3, 2007
    Applicant: Microsoft Corporation
    Inventors: Ameya Bhatawdekar, Pradeep GanapathyRaj, Rajendra Vishnumurty, Raju Iyer, Sudin Bhat, Robert Turner, Liang Xiao
  • Publication number: 20060241997
    Abstract: A project management system is integrated with a workflow engine to provide automatic coordination of project tasks and workflow processes. The workflow engine provides support for defining logical expressions that determine a path of execution for the defined workflow tasks. In addition to composition capabilities, the workflow engine may execute and track the defined processes. The project management system provides a platform for defining the project plan that includes tasks and resources. Tasks are annotated defining their behavior and implementation and exported to the workflow system. The workflow system substitutes project tasks with the appropriate workflow activities and provides feedback upon execution of the activities.
    Type: Application
    Filed: April 20, 2005
    Publication date: October 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Ameya Bhatawdekar, Imran Aziz
  • Publication number: 20060136933
    Abstract: The present invention relates to a system for generating events for a server application executing in a first process on a server computer. The system includes a server event service on the server computer executing in a second process independent of the first process. The server event service has a plurality of event handlers each event handler associated with a specified server event. The server event service is capable of receiving a server event from the server application and identifying one or more event handlers associated with the server event. The server event service then passes information related to the server event to the identified event handlers. The event handlers, in response to receiving the information related to an associated server event, generates one or more output events for the server application. In the system, the server event is generated by the server application in response to a request received from a client application on a remote client computer.
    Type: Application
    Filed: December 17, 2004
    Publication date: June 22, 2006
    Applicant: Microsoft Corporation
    Inventors: Aaron Jensen, Ameya Bhatawdekar