Patents by Inventor Arshish Cyrus Kapadia

Arshish Cyrus Kapadia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9971827
    Abstract: Technologies are described herein for integrating external data from an external system into a client system. A subscription filed is selected. The subscription filed may include a read method and a query method. The read method may define fields of a client cache operating on the client system. The query method may be executed to retrieve, from the external system, field values corresponding to at least a subset of the fields. Upon executing the query method, the read method may also be executed to retrieve, from the external system, additional field values corresponding to a remaining subset of the fields that were not retrieved by executing the query method. The client cache is populated with the field values and the additional field values according to the fields.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: May 15, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia, Wei-Lun Lo
  • Patent number: 9880897
    Abstract: When a software component is starting, such as but not limited to a task or a subtask, the component pushes its identification (ID) onto a stack. The component executes its other instructions. If the component completes its instructions so that it can terminate normally, it pops the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, it will not be able to pop the stack so its ID will remain in the stack. Another software process can read the IDs in the stack to identify which components have failed and can automatically take a specified action, such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component.
    Type: Grant
    Filed: August 7, 2015
    Date of Patent: January 30, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Tarkan Sevilmis, Arshish Cyrus Kapadia, Maxim Lukiyanov, Tittu Jose, Gheorghita Irimescu, Janak Madhusudan Agarwal, Stephen John Clark, Hardik Shah, Sreekanth Lingannapeta
  • Publication number: 20160034337
    Abstract: When a software component is starting, such as but not limited to a task or a subtask, the component pushes its identification (ID) onto a stack. The component executes its other instructions. If the component completes its instructions so that it can terminate normally, it pops the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, it will not be able to pop the stack so its ID will remain in the stack. Another software process can read the IDs in the stack to identify which components have failed and can automatically take a specified action, such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component.
    Type: Application
    Filed: August 7, 2015
    Publication date: February 4, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Tarkan Sevilmis, Arshish Cyrus Kapadia, Maxim Lukiyanov, Tittu Jose, Gheorghita Irimescu, Janak Madhusudan Agarwal, Stephen John Clark, Hardik Shah, Sreekanth Lingannapeta
  • Patent number: 9104561
    Abstract: When a software component is starting (305), such as but not limited to a task or a subtask, the component pushes (310) its identification (ID) onto a stack. The component then executes (315) its other instructions. If the component completes its instructions so that it can terminate normally (320), then it pops (325) the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, then it will not be able to pop the stack so its ID will remain in the stack. Another software process can then read the IDs in the stack to identify (330) which components have failed and can automatically take a specified action (335), such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: August 11, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Tarkan Sevilmis, Arshish Cyrus Kapadia, Maxim Lukiyanov, Tittu Jose, Gheorghita Irimescu, Janak Madhusudan Agarwal, Stephen John Clark, Hardik Shah, Sreekanth Lingannapeta
  • Publication number: 20150081732
    Abstract: Technologies are described herein for integrating external data from an external system into a client system. A subscription filed is selected. The subscription filed may include a read method and a query method. The read method may define fields of a client cache operating on the client system. The query method may be executed to retrieve, from the external system, field values corresponding to at least a subset of the fields. Upon executing the query method, the read method may also be executed to retrieve, from the external system, additional field values corresponding to a remaining subset of the fields that were not retrieved by executing the query method. The client cache is populated with the field values and the additional field values according to the fields.
    Type: Application
    Filed: November 21, 2014
    Publication date: March 19, 2015
    Inventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia, Wei-Lun Lo
  • Patent number: 8898181
    Abstract: Technologies are described herein for integrating external data from an external system into a client system. A subscription filed is selected. The subscription filed may include a read method and a query method. The read method may define fields of a client cache operating on the client system. The query method may be executed to retrieve, from the external system, field values corresponding to at least a subset of the fields. Upon executing the query method, the read method may also be executed to retrieve, from the external system, additional field values corresponding to a remaining subset of the fields that were not retrieved by executing the query method. The client cache is populated with the field values and the additional field values according to the fields.
    Type: Grant
    Filed: June 22, 2010
    Date of Patent: November 25, 2014
    Assignee: Microsoft Corporation
    Inventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia, Wei-Lun Lo
  • Patent number: 8849848
    Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.
    Type: Grant
    Filed: June 7, 2011
    Date of Patent: September 30, 2014
    Assignee: Microsoft Corporation
    Inventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
  • Publication number: 20140075248
    Abstract: When a software component is starting (305), such as but not limited to a task or a subtask, the component pushes (310) its identification (ID) onto a stack. The component then executes (315) its other instructions. If the component completes its instructions so that it can terminate normally (320), then it pops (325) the stack, which removes its ID from the stack. If the component fails, such as by not being able to complete its instructions, then it will not be able to pop the stack so its ID will remain in the stack. Another software process can then read the IDs in the stack to identify (330) which components have failed and can automatically take a specified action (335), such as by sending an email message to, sending a text message to, or calling by telephone, a person or persons responsible for that software component.
    Type: Application
    Filed: September 13, 2012
    Publication date: March 13, 2014
    Applicant: Microsoft Corporation
    Inventors: Tarkan Sevilmis, Arshish Cyrus Kapadia, Maxim Lukiyanov, Tittu Jose, Gheorghita Irimescu, Janak Madhusudan Agarwal, Stephen John Clark, Hardik Shah, Sreekanth Lingannapeta
  • Patent number: 8533220
    Abstract: A line of business data integration (“LOBI”) stack is provided that is configured to store an abstract representation of a mechanism utilized by a line of business (“LOB”) system to return requested LOB data in batches. When a request is received from a client for the LOB data, the LOBI stack utilizes the abstract representation to retrieve the requested LOB data from the LOB system in batches. In this manner, the batching mechanism utilized by the LOB system is abstracted from the client.
    Type: Grant
    Filed: April 2, 2009
    Date of Patent: September 10, 2013
    Assignee: Microsoft Corporation
    Inventors: Karthik Kalyanaraman, Arshish Cyrus Kapadia, Tarkan Sevilmis, Nazeeruddin Mohammed
  • Patent number: 8494888
    Abstract: Concepts and technologies for offline modification of business data are disclosed. A client device caches a cached version of business data. A business connectivity services (“BCS”) application executing on the client device reviews modifications made to the cached version of the business data and generates one or more operations corresponding to the modifications. The BCS application maintains a queue of operations. The BCS application reviews the operations in the queue and combines or removes operations that can be combined or removed without affecting the dependencies between related operations. The client device accesses a business data server that hosts the business data, and transmits the operations to the business data server in the determined order.
    Type: Grant
    Filed: June 21, 2010
    Date of Patent: July 23, 2013
    Assignee: Microsoft Corporation
    Inventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia
  • Patent number: 8341651
    Abstract: Methods and computer-readable media are provided herein for integrating enterprise search systems with proprietary back-end content store access control APIs. A declarative metadata model is utilized to create and store data defining a custom API exposed by a back-end content store for retrieving access rights for documents stored therein. A normalized API for obtaining access rights for a document is also exposed. When a call is made to the normalized API, the stored data is utilized to transform the call to the normalized API into a call to the custom API.
    Type: Grant
    Filed: January 10, 2007
    Date of Patent: December 25, 2012
    Assignee: Microsoft Corporation
    Inventors: Arshish Cyrus Kapadia, Jonah Sarbin Burke
  • Publication number: 20110314085
    Abstract: Concepts and technologies for offline modification of business data are disclosed. A client device caches a cached version of business data. A business connectivity services (“BCS”) application executing on the client device reviews modifications made to the cached version of the business data and generates one or more operations corresponding to the modifications. The BCS application maintains a queue of operations. The BCS application reviews the operations in the queue and combines or removes operations that can be combined or removed without affecting the dependencies between related operations. The client device accesses a business data server that hosts the business data, and transmits the operations to the business data server in the determined order.
    Type: Application
    Filed: June 21, 2010
    Publication date: December 22, 2011
    Applicant: Microsoft Corporation
    Inventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia
  • Publication number: 20110314047
    Abstract: Technologies are described herein for integrating external data from an external system into a client system. A subscription filed is selected. The subscription filed may include a read method and a query method. The read method may define fields of a client cache operating on the client system. The query method may be executed to retrieve, from the external system, field values corresponding to at least a subset of the fields. Upon executing the query method, the read method may also be executed to retrieve, from the external system, additional field values corresponding to a remaining subset of the fields that were not retrieved by executing the query method. The client cache is populated with the field values and the additional field values according to the fields.
    Type: Application
    Filed: June 22, 2010
    Publication date: December 22, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: David Koronthaly, Rolando Jimenez-Salgado, Sundaravadivelan Paranthaman, Arshish Cyrus Kapadia, Wei-Lun Lo
  • Publication number: 20110238696
    Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.
    Type: Application
    Filed: June 7, 2011
    Publication date: September 29, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
  • Patent number: 7979458
    Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.
    Type: Grant
    Filed: January 16, 2007
    Date of Patent: July 12, 2011
    Assignee: Microsoft Corporation
    Inventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
  • Publication number: 20100257194
    Abstract: A line of business data integration (“LOBI”) stack is provided that is configured to store an abstract representation of a mechanism utilized by a line of business (“LOB”) system to return requested LOB data in batches. When a request is received from a client for the LOB data, the LOBI stack utilizes the abstract representation to retrieve the requested LOB data from the LOB system in batches. In this manner, the batching mechanism utilized by the LOB system is abstracted from the client.
    Type: Application
    Filed: April 2, 2009
    Publication date: October 7, 2010
    Applicant: Microsoft Corporation
    Inventors: Karthik Kalyanaraman, Arshish Cyrus Kapadia, Tarkan Sevilmis, Nazeeruddin Mohammed
  • Patent number: 7505973
    Abstract: Methods and computer-readable media provide for efficient paging of search results in accordance with the access rights of a user. According to various implementations, a request for a search query results in a calculated number of search results being retrieved and analyzed for user access rights. As documents having user access rights are located, session state information corresponding to the number of located documents having user access rights and to the number of analyzed documents required to locate the number of documents having user access rights is maintained. This information is used to dynamically alter the number of subsequent documents that are retrieved in order to fill a page of results. This minimizes redundant determinations of user access rights and minimizes the number of documents required to be retrieved and analyzed in order to fulfill a search query request.
    Type: Grant
    Filed: January 16, 2007
    Date of Patent: March 17, 2009
    Assignee: Microsoft Corporation
    Inventors: Arshish Cyrus Kapadia, Mark Zellner
  • Publication number: 20080172390
    Abstract: Methods and computer-readable media are provided for associating security trimmers with documents in an enterprise search system. According to one method, a search index is maintained that includes one or more document identifiers corresponding to documents stored at back-end computing systems. Each document identifier in the search index is associated with one or more security trimmer implementations. When a query request is received from a user, the search index is queried to identify documents referenced by the search index that match search terms provided with the query request. For each document that matches the search terms, the associated security trimmer implementations are identified and executed to retrieve the access rights to view the document for the current user from the back-end computing system where the document is stored.
    Type: Application
    Filed: January 16, 2007
    Publication date: July 17, 2008
    Applicant: Microsoft Corporation
    Inventors: Mark Jeremy Zeller, Arshish Cyrus Kapadia, Shajan Dasan
  • Publication number: 20080168037
    Abstract: Methods and computer-readable media are provided herein for integrating enterprise search systems with proprietary back-end content store access control APIs. A declarative metadata model is utilized to create and store data defining a custom API exposed by a back-end content store for retrieving access rights for documents stored therein. A normalized API for obtaining access rights for a document is also exposed. When a call is made to the normalized API, the stored data is utilized to transform the call to the normalized API into a call to the custom API.
    Type: Application
    Filed: January 10, 2007
    Publication date: July 10, 2008
    Applicant: Microsoft Corporation
    Inventors: Arshish Cyrus Kapadia, Jonah Sarbin Burke
  • Patent number: 7039602
    Abstract: A default selection to be presented to a user at configuration time is determined at the time a selection list is presented to the user. A desired function, such as profit maximization or price minimization, is applied against each of the available selections. The selection which thus meets the function's criteria is designated as the default selection, and presented to the user as such. The user may, of course, select any item on the list, but accepting the default selection will tend to maximize desirability of the final product in accordance with the criteria defined by the manufacturer. In accordance with an aspect of the invention, the criteria to be used in choosing default selections may itself be defined at run-time, so that different default selections will be presented to, for example, different users.
    Type: Grant
    Filed: June 14, 1999
    Date of Patent: May 2, 2006
    Assignee: i2 Technologies US, Inc.
    Inventors: Arshish Cyrus Kapadia, Joseph Loyd Self