Patents by Inventor Binyan Chen
Binyan Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210216593Abstract: A system and method for configuring an application is described. A mapping definition defines a mapping between a first level attribute, a second level attribute, and a third level attribute of the application. The first level attribute indicates a goal of an operation of the application. The second level attribute indicates a factor that contributes to the goal. The third level attribute indicating a metric associated with the factor. The system accesses metrics that measure of operations of the application by a plurality of user accounts. A graphical user interface is generated for the first level attribute and displays the metric from the third level attribute that is mapped to the second level attribute for a set of user accounts from the plurality of user accounts based on the mapping definition. The system generates a configuration setting for the application of the set of user accounts based on the metric of the third level attribute.Type: ApplicationFiled: January 15, 2020Publication date: July 15, 2021Inventors: Binyan Chen, Anjaneya Malpani, Dheepak Ramaswamy, Andrew Parker Leach, Venkata Anil Kumar Revuru, Ananthatejas Raghavan, Andrew Christian Owen, Kaiqi Zhang, Brian Scott Ruble, Benjamin Douglas Witt, Chuyue Zhang
-
Patent number: 11023615Abstract: Hosted services provided by service provider tenants to their users are an increasingly common software usage model. The usage of such services and handling of data may be subject to regulatory, legal, and industry-based rules, where different rules may be applicable depending on the particular service, handled data, and organization type, for example. Embodiments are directed to providing intelligence and analysis driven security and compliance suggestions for hosted services to reduce the burden on tenant administrators to determine and implement applicable policies and rules. Claims are directed to determination of a suggestion based on an analysis of a tenant's service environment, presentation of the suggestion along with analysis results and a prompt to confirm implementation of the suggestion, and upon receiving confirmation, presentation of an option to customize the suggestion by modifying settings suggested based on analysis results.Type: GrantFiled: January 27, 2020Date of Patent: June 1, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Karissa C. Larson, Churli Su, Wenjie Liang, Binyan Chen, Ben Appleby, Anupama Janardhan, Ning Xu
-
Patent number: 10701100Abstract: Threat intelligence management is provided in a security and compliance environment. A threat explorer platform or module of a security and compliance service may detect, investigate, manage, and provide actionable insights for threats at an organizational level. Working with a data insights platform that collects different types of signals (metadata, documents, activities, etc.) and correlates in a multi-stage evaluation, the threat intelligence module may provide actionable visual information on potential threats, affected areas, and actionable insights derived from internal threat data and external information using contextual correlation of data within the data insight platform. User experience may be dynamically adjusted at multiple levels based on context and allow users to drill down arbitrarily deep.Type: GrantFiled: March 30, 2017Date of Patent: June 30, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Philip K. Newman, Puhazholi Vetrivel, Krishna Kumar Parthasarathy, Binyan Chen, Manas Singh, Ashish Mishra, Sudhakar Narayanamurthy
-
Publication number: 20200159959Abstract: Hosted services provided by service provider tenants to their users are an increasingly common software usage model. The usage of such services and handling of data may be subject to regulatory, legal, and industry-based rules, where different rules may be applicable depending on the particular service, handled data, and organization type, for example. Embodiments are directed to providing intelligence and analysis driven security and compliance suggestions for hosted services to reduce the burden on tenant administrators to determine and implement applicable policies and rules. Claims are directed to determination of a suggestion based on an analysis of a tenant's service environment, presentation of the suggestion along with analysis results and a prompt to confirm implementation of the suggestion, and upon receiving confirmation, presentation of an option to customize the suggestion by modifying settings suggested based on analysis results.Type: ApplicationFiled: January 27, 2020Publication date: May 21, 2020Inventors: Karissa C. LARSON, Churli SU, Wenjie LIANG, Binyan CHEN, Ben APPLEBY, Anupama JANARDHAN, Ning XU
-
Patent number: 10579821Abstract: Hosted services provided by service provider tenants to their users are an increasingly common software usage model. The usage of such services and handling of data may be subject to regulatory, legal, and industry-based rules, where different rules may be applicable depending on the particular service, handled data, and organization type, for example. Embodiments are directed to providing intelligence and analysis driven security and compliance suggestions for hosted services to reduce the burden on tenant administrators to determine and implement applicable policies and rules. Claims are directed to determination of a suggestion based on an analysis of a tenant's service environment, presentation of the suggestion along with analysis results and a prompt to confirm implementation of the suggestion, and upon receiving confirmation, presentation of an option to customize the suggestion by modifying settings suggested based on analysis results.Type: GrantFiled: March 17, 2017Date of Patent: March 3, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Karissa C. Larson, Churli Su, Wenjie Liang, Binyan Chen, Ben Appleby, Anupama Janardhan, Ning Xu
-
Publication number: 20180255099Abstract: Correlated signals associated with one or more of stored content, content metadata, and activities associated with the stored content of a tenant may be analyzed and alert(s) determined based on alert threshold(s) or broader “abnormal” pattern detection. Different recipients for different alerts or alert levels may be designated and the alert(s) transmitted to the designated recipients. Alerts may also be displayed through an alert management dashboard of a protection service. The alert(s) and the results of the analysis may also be provided to a policy engine for use in adjusting or creating rules within a policy, alert thresholds, and signal collection/analysis. Post-fact investigations may also be initiated upon alerts.Type: ApplicationFiled: March 2, 2017Publication date: September 6, 2018Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Binyan Chen, Ben Appleby, Anupama Janardhan, Rui Chen, Krishna Kumar Parthasarathy, Suresh C. Palani, Puhazholi Vetrivel, Philip K. Newman, Michael A. Wilde
-
Publication number: 20180191771Abstract: Threat intelligence management is provided in a security and compliance environment. A threat explorer platform or module of a security and compliance service may detect, investigate, manage, and provide actionable insights for threats at an organizational level. Working with a data insights platform that collects different types of signals (metadata, documents, activities, etc.) and correlates in a multi-stage evaluation, the threat intelligence module may provide actionable visual information on potential threats, affected areas, and actionable insights derived from internal threat data and external information using contextual correlation of data within the data insight platform. User experience may be dynamically adjusted at multiple levels based on context and allow users to drill down arbitrarily deep.Type: ApplicationFiled: March 30, 2017Publication date: July 5, 2018Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Philip K. Newman, Puhazholi Vetrivel, Krishna Kumar Parthasarathy, Binyan Chen, Manas Singh, Ashish Mishra, Sudhakar Narayanamurthy
-
Publication number: 20180191781Abstract: A multi-purpose platform may collect different types of signals such as metadata, documents, activities, etc. and correlate in a multi-stage evaluation framework in order to allow simple queries from components and clients of a compliance and security environment to be converted into rich analyses on available data. Various signals may be collected from tenant environment and correlated at multiple levels based on their content and context. Queries from components such as a threat intelligence manager, a data explorer module, or even clients of the system may be executed on the correlated data by focusing and/or filtering the queries based on the context, effectively converting a simple query to a comprehensive analysis. The platform may have intelligence to decide which type of data to run a query on based on the request and allow data investigations performing a chain-linked investigation that can go multiple levels deep.Type: ApplicationFiled: March 30, 2017Publication date: July 5, 2018Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Suresh C. Palani, Ben Appleby, Rui Chen, Binyan Chen, Puhazholi Vetrivel, Michael A. Wilde
-
Publication number: 20180189517Abstract: Hosted services provided by service provider tenants to their users are an increasingly common software usage model. The usage of such services and handling of data may be subject to regulatory, legal, and industry-based rules, where different rules may be applicable depending on the particular service, handled data, and organization type, for example. Embodiments are directed to providing intelligence and analysis driven security and compliance suggestions for hosted services to reduce the burden on tenant administrators to determine and implement applicable policies and rules. Claims are directed to determination of a suggestion based on an analysis of a tenant's service environment, presentation of the suggestion along with analysis results and a prompt to confirm implementation of the suggestion, and upon receiving confirmation, presentation of an option to customize the suggestion by modifying settings suggested based on analysis results.Type: ApplicationFiled: March 17, 2017Publication date: July 5, 2018Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Karissa C. Larson, Churli Su, Wenjie Liang, Binyan Chen, Ben Appleby, Anupama Janardhan, Ning Xu