Patents by Inventor Chad E. Verbowski
Chad E. Verbowski has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7890807Abstract: A method and system for identifying a configuration parameter of a “sick” computer system that is at fault for causing an undesired behavior based on analysis of configuration parameters from other computer systems is provided. In one embodiment, a troubleshooting system collects “suspect” values for “suspect” configuration parameters used by a “sick” application when the undesired behavior was exhibited by the sick computer system. The troubleshooting system then compares the suspect values to sample values of the suspect configuration parameters retrieved from sample computer systems. The troubleshooting system uses that comparison to identify one or more suspect configuration parameters that are likely at fault for causing the application to exhibit the undesired behavior.Type: GrantFiled: June 13, 2007Date of Patent: February 15, 2011Assignee: Microsoft CorporationInventors: Chad E. Verbowski, Jiahe Helen Wang, John C. Platt, Ruyun Zhang, Yu Chen
-
Patent number: 7784101Abstract: A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.Type: GrantFiled: August 29, 2005Date of Patent: August 24, 2010Assignee: Microsoft CorporationInventors: Chad E Verbowski, John D. Dungan, Shuo Chen, Yi-Min Wang
-
Patent number: 7779480Abstract: A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.Type: GrantFiled: August 29, 2005Date of Patent: August 17, 2010Assignee: Microsoft CorporationInventors: Chad E Verbowski, John D. Dunagan, Shuo Chen, Yi-Min Wang
-
Patent number: 7765592Abstract: As computer programs grow more complex, extensible, and connected, it becomes increasingly difficult for users to understand what has changed on their machines and what impact those changes have. An embodiment of the invention is described via a software tool, called AskStrider, that answers those questions by correlating volatile process information with persistent-state context information and change history. AskStrider scans a system for active components, matches them against a change log to identify recently updated and hence more interesting state, and searches for context information to help users understand the changes. Several real-world cases are provided to demonstrate the effectiveness of using AskStrider to quickly identify the presence of unwanted software, to determine if a software patch is potentially breaking an application, and to detect lingering components left over from an unclean uninstallation.Type: GrantFiled: April 22, 2004Date of Patent: July 27, 2010Assignee: Microsoft CorporationInventors: Yi-Min Wang, Aaron R. Johnson, David C. Ladd, Roussi A. Roussev, Chad E. Verbowski
-
Patent number: 7627898Abstract: A method and system for detecting that a software system has been infected by software that attempts to hide properties related to the software system is provided. A detection system identifies that a suspect operating system has been infected by malware by comparing properties related to the suspect operating system as reported by the suspect operating system to properties as reported by another operating system that is assumed to be clean. The detection system compares the reported properties to the actual properties to identify any significant differences. A significant difference, such as the presence of an actual file not reported by the suspect operating system, may indicate that the suspect storage device is infected.Type: GrantFiled: November 23, 2004Date of Patent: December 1, 2009Assignee: Microsoft CorporationInventors: Douglas Reed Beck, Aaron Roy Johnson, Roussi A. Roussev, Chad E. Verbowski, Binh Dou Vo, Yi-Min Wang
-
Patent number: 7620995Abstract: A technique for identifying dependencies of an application upon a given security context includes monitoring security checks generated by the application. The security checks requiring elevated rights are identified and the state of execution of the application corresponding to the identified security checks may be logged. The security checks requiring elevated rights may be identified by monitoring access checks, monitoring privilege checks, checking user/group identifiers against a list of known identifiers associated with elevated rights, or the like.Type: GrantFiled: August 29, 2005Date of Patent: November 17, 2009Assignee: Microsoft CorporationInventors: Chad E Verbowski, John D. Dunagan, Shuo Chen, Yi-Min Wang
-
Patent number: 7614046Abstract: A method and system for analyzing the impact on software of an update to a software system is provided. The impact analysis system identifies resources that are affected by an update to the software system and identifies resources that are accessed by various software components during execution of the software components. To analyze the effects of an update, the impact analysis system identifies those accessed resources of the software components that are affected by the update as being impacted resources. The impact analysis system considers those software components that access the impacted resources to be impacted software components. The impact analysis system provides a user interface through which a user can view and analyze the impact of an update.Type: GrantFiled: November 24, 2004Date of Patent: November 3, 2009Assignee: Microsoft CorporationInventors: Bradford Ruffin Daniels, John Dunagan, Roussi A. Roussev, Chad E. Verbowski, Yi-Min Wang
-
Patent number: 7584382Abstract: A method and system for identifying a configuration parameter of a “sick” computer system that is at fault for causing an undesired behavior based on analysis of configuration parameters from other computer systems is provided. In one embodiment, a troubleshooting system collects “suspect” values for “suspect” configuration parameters used by a “sick” application when the undesired behavior was exhibited by the sick computer system. The troubleshooting system then compares the suspect values to sample values of the suspect configuration parameters retrieved from sample computer systems. The troubleshooting system uses that comparison to identify one or more suspect configuration parameters that are likely at fault for causing the application to exhibit the undesired behavior.Type: GrantFiled: August 13, 2004Date of Patent: September 1, 2009Assignee: Microsoft CorporationInventors: Chad E. Verbowski, Jiahe Helen Wang, John C. Platt, Ruyun Zhang, Yu Chen
-
Patent number: 7200675Abstract: A system and method for enabling highly scalable multi-node event distribution networks through the use of summary-based routing, particularly event distribution networks using a content-based publish/subscribe model to distribute information. By allowing event routers to use imprecise summaries of the subscriptions hosted by matcher nodes, an event router can eliminate itself as a bottleneck thus improving overall event distribution network throughput even though the use of imprecise summaries results in some false positive event traffic. False positive event traffic is reduced by using a filter set partitioning that provides for good subscription set locality at each matcher node, while at the same time avoiding overloading any one matcher node. Good subscription set locality is maintained by routing new subscriptions to a matcher node with a subscription summary that best covers the new subscription.Type: GrantFiled: March 14, 2003Date of Patent: April 3, 2007Assignee: Microsoft CorporationInventors: Yi-Min Wang, Lili Qiu, Chad E. Verbowski, Demetrios Achlioptas, Gautam Das, Per-Ake Larson
-
Publication number: 20040181588Abstract: A system and method for enabling highly scalable multi-node event distribution networks through the use of summary-based routing, particularly event distribution networks using a content-based publish/subscribe model to distribute information. By allowing event routers to use imprecise summaries of the subscriptions hosted by matcher nodes, an event router can eliminate itself as a bottleneck thus improving overall event distribution network throughput even though the use of imprecise summaries results in some false positive event traffic. False positive event traffic is reduced by using a filter set partitioning that provides for good subscription set locality at each matcher node, while at the same time avoiding overloading any one matcher node. Good subscription set locality is maintained by routing new subscriptions to a matcher node with a subscription summary that best covers the new subscription.Type: ApplicationFiled: March 13, 2003Publication date: September 16, 2004Applicant: Microsoft CorporationInventors: Yi-Min Wang, Lili Qiu, Chad E. Verbowski, Demetrios Achlioptas, Gautam Das, Per-Ake Larson