Patents by Inventor Ashish Consul
Ashish Consul has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8131809Abstract: This disclosure is directed to automatically moving message objects, such as email message objects, from online source mailbox databases to online archive mailbox databases. As described herein, each email message in a source mailbox database is directly or indirectly associated with a retention policy tag. The retention policy tag associated with a message object in a source mailbox database specifies a retention period. The message object remains in source mailbox database until the retention period expires for the message object. When the retention period for the message object expires, the message object is automatically moved to an archive mailbox database.Type: GrantFiled: December 3, 2008Date of Patent: March 6, 2012Assignee: Microsoft CorporationInventors: Ashish Consul, Rajasi Saha
-
Patent number: 8090695Abstract: As described herein, a high-availability server system includes at least a source server system and a target server system that dynamically restore message object search indexes. Both the source server system and the target server system store copies of a mailbox database and a search index for the mailbox database. As changes are requested to the mailbox database, events are added to event lists maintained at the source node and the target node. When the data storage system at the target server system enters an error state, the source server system sends to the target server system a set of data that the target server system can use to generate a copy of search index. The target server system may then resume applying events in the event list to the search index. In this way, it may not be necessary to completely re-index the mailbox database at the target node.Type: GrantFiled: December 5, 2008Date of Patent: January 3, 2012Assignee: Microsoft CorporationInventors: Ashish Consul, Suryanarayana M. Gorti
-
Publication number: 20110320467Abstract: A method is presented for generating a list of frequently used words for an email application on a server computer. When a request is received for a word frequency list for emails stored in a user's mailbox, a word frequency list is returned if one exists. If the word frequency list does not exist, an asynchronous process is started on the server computer to generate a word frequency list. If the word frequency list exists but it is older than an aging limit, an asynchronous process is started on the server computer to regenerate the word frequency list. The word frequency list is stored in the user's mailbox along with a timestamp indicating the date and time that the list was created or updated.Type: ApplicationFiled: September 2, 2011Publication date: December 29, 2011Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Suryanarayana M. Gorti, Michael Geoffrey Andrew Wilson, James C. Kleewein
-
Patent number: 8032537Abstract: A method is presented for generating a list of frequently used words for an email application on a server computer. When a request is received for a word frequency list for emails stored in a user's mailbox, a word frequency list is returned if one exists. If the word frequency list does not exist, an asynchronous process is started on the server computer to generate a word frequency list. If the word frequency list exists but it is older than an aging limit, an asynchronous process is started on the server computer to regenerate the word frequency list. The word frequency list is stored in the user's mailbox along with a timestamp indicating the date and time that the list was created or updated.Type: GrantFiled: December 10, 2008Date of Patent: October 4, 2011Assignee: Microsoft CorporationInventors: Ashish Consul, Suryanarayana M. Gorti, Michael Geoffrey Andrew Wilson, James C. Kleewein
-
Publication number: 20110154376Abstract: A web services request is sent to a server via a network. The server provides a web services API that includes a method that operates to identify responsive content items among a plurality of content items. The plurality of content items is partitioned into a plurality of folders. The plurality of folders is divided into a plurality of hierarchical sets of folders. Each of the hierarchical sets of folders is associated with a different user in a plurality of users. The web services request requests invocation of the method. The responsive content items are ones of the content items that satisfy a specified query condition and that are in a specified one of the folders. A web services response is received from the server in response to the web services request. The web services response specifies one or more properties of at least one of the responsive content items.Type: ApplicationFiled: December 17, 2009Publication date: June 23, 2011Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Suryanarayana M. Gorti
-
Publication number: 20100161737Abstract: Techniques to manage email personal archives are described. A computer-implemented system may comprise a primary mailbox component, associated with a user, and operative to receive and send email. The computer-implemented system may further comprise an alternate mailbox component separate from the primary mailbox component and associated with the user and the primary mailbox, operative to store email. The computer-implemented system may also include a mail client operative on a client computer to access and display contents of the primary and alternate mailboxes substantially simultaneously. Other embodiments are described and claimed.Type: ApplicationFiled: December 23, 2008Publication date: June 24, 2010Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Yogesh Bansal, Karim M. Batthish, Harvey Rook, Lauren B. Lavoie
-
Publication number: 20100145943Abstract: A method is presented for generating a list of frequently used words for an email application on a server computer. When a request is received for a word frequency list for emails stored in a user's mailbox, a word frequency list is returned if one exists. If the word frequency list does not exist, an asynchronous process is started on the server computer to generate a word frequency list. If the word frequency list exists but it is older than an aging limit, an asynchronous process is started on the server computer to regenerate the word frequency list. The word frequency list is stored in the user's mailbox along with a timestamp indicating the date and time that the list was created or updated.Type: ApplicationFiled: December 10, 2008Publication date: June 10, 2010Applicant: Microsoft CorporationInventors: Ashish Consul, Suryanarayana M. Gorti, Michael Geoffrey Andrew Wilson, James C. Kleewein
-
Publication number: 20100145932Abstract: As described herein, a client system is automatically configured to access message objects in a plurality of mailboxes stored at a server system. The client system sends an autodiscover request to the server system. In response, the server system sends to the client system an autodiscover response that contains an autodiscover response document that comprises a primary mailbox element and at least one alternate mailbox element. The client system uses a first set of mailbox identification data specified by the primary mailbox element to access message objects in a primary mailbox stored at the server system and uses sets of mailbox identification data specified by the alternate mailbox elements to access message objects in alternate mailboxes stored at the server system. Email messages are one example type of message objects. The alternate mailbox may be an archive mailbox used to store message objects for occasional reference.Type: ApplicationFiled: December 4, 2008Publication date: June 10, 2010Applicant: MICROSOFT CORPORATIONInventors: Harvey Rook, Ashish Consul, Karim Batthish
-
Publication number: 20100146056Abstract: A method is presented for searching for email messages that on a server computer. A request is received on the server computer to search for one or more email messages in one or more mailboxes on the server computer. Each of the one or more mailboxes includes a dumpster folder. The request includes search criteria including a parameter indicating whether the dumpster folder associated with a mailbox should be searched. The dumpster folder stores one or more email messages that have been deleted from a deleted items folder in the mailbox. One or more mailboxes that satisfy the search criteria in the request are identified. If the parameter indicates that the dumpster folder should be searched, the dumpster folder of each of the identified mailboxes that satisfy the search criteria is queried and any email messages in each dumpster folder that satisfy the search criteria are identified.Type: ApplicationFiled: December 4, 2008Publication date: June 10, 2010Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Suryanarayana M. Gorti, Shengquan Yan, Andrei Marinescu, Julian Alexander Zbogar-Smith
-
Publication number: 20100145933Abstract: As described herein, a high-availability server system includes at least a source server system and a target server system that dynamically restore message object search indexes. Both the source server system and the target server system store copies of a mailbox database and a search index for the mailbox database. As changes are requested to the mailbox database, events are added to event lists maintained at the source node and the target node. When the data storage system at the target server system enters an error state, the source server system sends to the target server system a set of data that the target server system can use to generate a copy of search index. The target server system may then resume applying events in the event list to the search index. In this way, it may not be necessary to completely re-index the mailbox database at the target node.Type: ApplicationFiled: December 5, 2008Publication date: June 10, 2010Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Suryanarayana M. Gorti
-
Publication number: 20100145970Abstract: A textual search index is used to identify data objects that have numerical properties that satisfy search queries. As described herein, a search index contains search index entries, each of which specifies a reference string and a set of data object identifiers. When an original search query is received, the search query is transformed into a transformed search query such that numerical comparison query elements in the original search query are transformed into equivalent textual comparison query elements. The search index is then used to identify ones of the data objects that satisfy the transformed search query. A list of the identified data objects may then be provided in response to the original search query.Type: ApplicationFiled: December 4, 2008Publication date: June 10, 2010Applicant: MICROSOFT CORPORATIONInventors: Suryanarayana M. Gorti, Ashish Consul, Graham Smith, Pingjun Hu
-
Publication number: 20100138500Abstract: This disclosure is directed to automatically moving message objects, such as email message objects, from online source mailbox databases to online archive mailbox databases. As described herein, each email message in a source mailbox database is directly or indirectly associated with a retention policy tag. The retention policy tag associated with a message object in a source mailbox database specifies a retention period. The message object remains in source mailbox database until the retention period expires for the message object. When the retention period for the message object expires, the message object is automatically moved to an archive mailbox database.Type: ApplicationFiled: December 3, 2008Publication date: June 3, 2010Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Rajasi Saha
-
Publication number: 20100094809Abstract: Techniques to manage retention policy tags are described. A system may comprise a tagging component operative to tag a message with an expiration tag to form an expiration tagged message, the expiration tag having expiration information used to expire the expiration tagged message in accordance with a retention policy. The system may further comprise a presentation component communicatively coupled to the tagging component, the presentation component operative to present a view of the expiration tagged message with an expiration field having the expiration information for the expiration tagged message. Other embodiments are described and claimed.Type: ApplicationFiled: September 25, 2008Publication date: April 15, 2010Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Harvey Rook, Rajasi Saha, Andrew Sullivan, Galen Elias, Julian Zbogar-Smith
-
Publication number: 20090319483Abstract: Technologies are described herein for generating a mailbox specific frequent word list associated with a mailbox. In one method, an index scan is performed on catalogs to retrieve search data mapping words to emails containing the words. The search data is provided across multiple mailboxes. A universal frequent word list is generated based on the search data. The mailbox specific frequent word list is generated based on the universal frequent word list.Type: ApplicationFiled: June 19, 2008Publication date: December 24, 2009Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Suryanarayana Murty Gorti, Andrew E. Goodsell
-
Publication number: 20090319456Abstract: Architecture that employs machine-based learning to automatically categorize data on a per-user basis. Auto-tagging reduces the burden on infoworkers by creating a machine learning model to learn from user tagging behavior or preferences. Once this information is obtained, a trained model for this specific user is used to assign tags to incoming data, such as emails. The architecture finds particular applicability to compliance and message retention policies that otherwise would mandate extra work for the infoworker. The architecture learns the tagging behavior of a user and uses this learned behavior to automatically tag data based on the user's prior tagging habits. A regression algorithm is employed to process the training data according to an n-dimensional framework for prediction and application of the tag(s) to the incoming messages.Type: ApplicationFiled: June 19, 2008Publication date: December 24, 2009Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Harvey Rook, Rajasi Saha, Shengquan Yan
-
Publication number: 20090177704Abstract: Architecture for retention policy tagging of data items such as messages for expiring data items without data reorganization. Retention policy tags can be applied to items, conversations, folders, and/or distribution lists, for example. Retention policy tags provide a way to manage (e.g., expire) data items such as email, for example, and reduce the corporate burden for compliance in documents of all types. Tags can be applied to data items individually and in-place, and do not impose changes to the natural workflow of the user. The use of expiry policy tags provides a solution by removing the pain point around physically moving messages to an unfamiliar folder hierarchy.Type: ApplicationFiled: January 9, 2008Publication date: July 9, 2009Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Rajasi Saha, Harvey Rook