Patents by Inventor Dan Teodosiu

Dan Teodosiu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7552148
    Abstract: Aspects of the subject matter described herein relate to shutdown recovery for resource replication systems. In aspects, a mechanism is described in which a machine having replicated data thereon can recover from a dirty shutdown. First, the machine determines whether a dirty shutdown has occurred. If so, the machine automatically performs shutdown recovery by causing resource metadata stored by the machine to be consistent with resource data stored by the machine. This may involve fixing the resource metadata for updates to the resource data that were not flushed to disk or may involve deleting the resource metadata and restoring it from another machine replicating the data.
    Type: Grant
    Filed: February 28, 2006
    Date of Patent: June 23, 2009
    Assignee: Microsoft Corporation
    Inventors: Huisheng Liu, Guhan Suriyanarayanan, Nikolaj S. Bjorner, Dan Teodosiu
  • Publication number: 20090141891
    Abstract: Published resources are made available in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer systems only by encrypting the resource keys in a manner only the authorized peer systems are able to recover them. In one embodiment, the resource keys are encrypted using encryption public keys of the authorized peer systems or the groups to which the authorized peer system are members. In one embodiment, the encryption public keys of individual or groups of authorized peer systems are published for resource publishing peer systems through client and group key files respectively. Group encryption private keys are made available to the group members through published group key files. Further, advanced features including but not limited to resource key file inheritance, password protected publication, obfuscated publication, content signing, secured access via gateways, and secured resource search are supported.
    Type: Application
    Filed: February 9, 2009
    Publication date: June 4, 2009
    Applicant: Microsoft Corporation
    Inventors: Xavier Boyen, Zhenyu Qian, Dan Teodosiu
  • Patent number: 7536458
    Abstract: Binary executables are distributed in a distributed manner by equipping a server with a bootstrap program. The server provides the bootstrap program to a client computer in response to the client's request for the binary executables. The bootstrap program is designed to enable the client computer to obtain the binary executables in one or more portions from one or more peer locations that have already downloaded the said binary executables. In one embodiment, the bootstrap program also monitors the performance associated with obtaining the portions of the binary executables, and reports the performance data to a resource naming service that tracks peer locations that cache the binary executables. In one embodiment, the binary executables also includes a component that registers the client computer as a peer location that caches the binary executables, and provides the binary executables to other client computers responsive to their requests. In various embodiments, content is distributed in like manner.
    Type: Grant
    Filed: April 21, 2005
    Date of Patent: May 19, 2009
    Assignee: Microsoft Corporation
    Inventors: Dan Teodosiu, Xavier Boyen
  • Patent number: 7536465
    Abstract: Peer devices register with a resource locator service so that the peer devices can be uniquely identified in a networking environment. An addressing scheme addresses a peer resource in the networking environment based on the unique identifier of a peer device that is a master publisher of the resource. Based on the addressing scheme, the resource locator service can track the location of the master publisher of the resource as well as additional locations of peer devices that have cached the resource and made it available. In various embodiments, the resource locator service can service requests for peer resources by providing a list of locations where the resource is expected to be available or, in the case of non-compatible requester, provide access to the resource itself.
    Type: Grant
    Filed: July 22, 2005
    Date of Patent: May 19, 2009
    Assignee: Microsoft Corporation
    Inventors: Dan Teodosiu, Nikolaj S. Bjorner, Markus M. Breunig
  • Patent number: 7536426
    Abstract: Described is the differentiation of replicas in a large distributed object store as either being smoothing replicas based on an amount of load on storage nodes (bricks), or as spreading replicas based on a substantially random distribution among the system's bricks. The smoothing replicas are placed among the lowest usage bricks, while the spreading replicas are placed randomly throughout other bricks in the system independent of load. As a result, fast, primarily parallel data repair is facilitated by selecting a spreading replica when repair is needed, while load balancing is facilitated by placing a smoothing replica on a low-usage brick when a new replica is checked in, and selecting a smoothing replica when load balancing is triggered by overloading of a brick and/or addition of a new brick. Check-in, data repair and load balancing policies specify how to use smoothing replicas and spreading replicas.
    Type: Grant
    Filed: July 29, 2005
    Date of Patent: May 19, 2009
    Assignee: Microsoft Corporation
    Inventors: Wei Chen, Chao Jin, Dan Teodosiu, Qiao Lian, Shiding Lin, Yu Chen, Zheng Zhang
  • Publication number: 20090100154
    Abstract: Embodiments of the invention provide a method and system for automatically instrumenting a set of web documents, such as web pages, as well as embedding structures that present advertising content via the web pages. The instrumentation automatically embeds tags that enable usage information associated with the web documents to be tracked and recorded. Many hundreds or thousands of web pages can be automatically modified without user intervention, enabling comprehensive reporting and tracking to be performed on each page. The web pages are analyzed and insertion points intelligently located. Changes can be verified to ensure that no undesirable effects resulted from embedding the content. The tags can receive parameters customized to the level of users and pages. The tags, insertion information, and other configuration information can be stored in a central repository to make subsequent tagging easier.
    Type: Application
    Filed: October 12, 2007
    Publication date: April 16, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Daniel C. Stevenson, Olivier Dabrowski, Kresimir Bozic, Dan Teodosiu, Paolo Severini, Cristian Costache, Euan Grant, Erik Zigman
  • Patent number: 7509492
    Abstract: Published resources are made available in an encrypted form, using corresponding resource keys, published through resource key files, with the publications effectively restricted to authorized peer systems only by encrypting the resource keys in a manner only the authorized peer systems are able to recover them. In one embodiment, the resource keys are encrypted using encryption public keys of the authorized peer systems or the groups to which the authorized peer system are members. In one embodiment, the encryption public keys of individual or groups of authorized peer systems are published for resource publishing peer systems through client and group key files respectively. Group encryption private keys are made available to the group members through published group key files. Further, advanced features including but not limited to resource key file inheritance, password protected publication, obfuscated publication, content signing, secured access via gateways, and secured resource search are supported.
    Type: Grant
    Filed: March 27, 2002
    Date of Patent: March 24, 2009
    Assignee: Microsoft Corporation
    Inventors: Xavier Boyen, Zhenyu Qian, Dan Teodosiu
  • Patent number: 7506005
    Abstract: A computing device has a file stored on a storage volume by a file system and accessed through such file system. The file is defined to include data and metadata relating to the data, and at least a portion of the data of the file is removed from the file and stored at an alternate location such that the data does not occupy substantially any space on the volume and the file is in a reduced, ghosted form. The ghosted file is reconstituted for use by retrieving the data from the alternate location and associating such retrieved data with such ghosted file to form the reconstituted file.
    Type: Grant
    Filed: July 14, 2005
    Date of Patent: March 17, 2009
    Assignee: Microsoft Corporation
    Inventors: Sarosh Cyrus Havewala, Guhan Suriyanarayanan, Christophe Franck Robert, Shobana Balakrishnan, Dan Teodosiu, Nikolaj S. Bjorner
  • Publication number: 20080301448
    Abstract: Systems and methods for security against corruption for networked storage are described. In one aspect, a destination device receives a linear combination of packets. The linear combination of packets represents digitally signed blocks of content and public information used to digitally sign segmented blocks of content. The destination device recombines the linear combination of packets to compute new valid signatures as linear combinations of received homomorphic digital signatures. The new valid signatures are for verifying by a requesting computing device recovering data associated with at least a subset of the linear combination of packets, integrity of the at least a subset. This provides the requesting node with security against corruption of data in networked storage.
    Type: Application
    Filed: June 1, 2007
    Publication date: December 4, 2008
    Applicant: Microsoft Corporation
    Inventors: Denis X. Charles, Kamal Jain, Kristin E. Lauter, Jin Li, Dan Teodosiu
  • Publication number: 20080137642
    Abstract: A call is established between a user at a mobile device and a contact logged into a communication service through a computer application. A user selects a contact through a page displayed on a mobile device. The contact may be an email address, a messaging username, or some other contact other than a phone number. A call registration record with the contact data is generated at a network server. The mobile device places a call to a VoIP system, the VoIP system receives the call, retrieves the call registration record and establishes an audio connection between the cell phone and the computer application through which the contact is logged into the communication service. The audio connection is a hybrid connection consisting of a mobile device voice connection between the caller's cell phone and a gateway system and a VoIP connection between a computer and the gateway system.
    Type: Application
    Filed: December 8, 2006
    Publication date: June 12, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Dan Teodosiu, Xiaoyong Liu, Lon-Chan Chu, Vinay Gupta
  • Publication number: 20080005188
    Abstract: Content synchronization in a file sharing environment is described. A node in a circle share maintains a version vector that represents that node's knowledge of file synchronization events. Version vector data may be transmitted between nodes of the circle share via a presence service in the form of short notification messages. The version vector data is compared to identify one or more nodes to be synchronized. A resource-aware overlay representing the circle share is computed, and is used to initiate communication to determine which of the available nodes with which to synchronize will provide the most synchronization value to other nodes in the circle share.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Applicant: Microsoft Corporation
    Inventors: Jin Li, Dan Teodosiu, Philip A. Chou, Cheng Huang, Eyal Schwartz, John T. Spivey, Yunnan Wu, Alexandra K. Heron
  • Publication number: 20080005199
    Abstract: Collection-based object replication is described in a system that includes a client computing device (client) connected to a server and multiple data storage nodes. In one aspect, a data storage node generates a replica of multiple replicas of a collection. The collection is a unit of data placement, access, replication, and repair. Other data storage nodes are also configured with a respective replica of the multiple replicas. The data storage node verifies whether an object received directly from the client for storage in the collection has been fully replicated by the other data storage nodes in respective replicas.
    Type: Application
    Filed: June 30, 2006
    Publication date: January 3, 2008
    Applicant: Microsoft Corporation
    Inventors: Wei Chen, Dan Teodosiu, Cristian George Teodorescu, Xuezheng Liu, Zheng Zhang
  • Patent number: 7290019
    Abstract: A method and system for synchronizing objects among members of a replica set. Objects on members of the replica set are quickly synchronized via a join algorithm that takes advantage of version vectors. When an object is deleted, the object is tombstoned (i.e., marked as “dead”). Tombstones are also replicated between the connected members of the replica set. After a period of time (e.g., a timeout), the tombstones are deleted. A slow sync algorithm executes periodically to ensure that objects that were not deleted via replicated tombstones are eventually deleted. An époque algorithm provides that members that have been offline for a long period of time will update their objects before they participate in a join synchronization.
    Type: Grant
    Filed: February 13, 2004
    Date of Patent: October 30, 2007
    Assignee: Microsoft Corporation
    Inventors: Nikolaj S. Bjørner, Dan Teodosiu, Rostislav Yavorskiy
  • Publication number: 20070220328
    Abstract: Aspects of the subject matter described herein relate to shutdown recovery for resource replication systems. In aspects, a mechanism is described in which a machine having replicated data thereon can recover from a dirty shutdown. First, the machine determines whether a dirty shutdown has occurred. If so, the machine automatically performs shutdown recovery by causing resource metadata stored by the machine to be consistent with resource data stored by the machine. This may involve fixing the resource metadata for updates to the resource data that were not flushed to disk or may involve deleting the resource metadata and restoring it from another machine replicating the data.
    Type: Application
    Filed: February 28, 2006
    Publication date: September 20, 2007
    Applicant: Microsoft Corporation
    Inventors: Huisheng Liu, Guhan Suriyanarayanan, Nikolaj Bjorner, Dan Teodosiu
  • Publication number: 20070206610
    Abstract: Various embodiments can utilize a distributed solution for scheduling connections between peers in a file sharing environment. In accordance with at least some embodiments, individual nodes in a peer-to-peer system include scheduling software that enables the nodes to make scheduling decisions with regard to how, when and where connections are made with other peers. Scheduling decisions can be based on a number of different parameters. In at least some embodiments, a synchronization negotiation manager is embodied with logic that drives the negotiation and scheduling process. This logic is represented by an innovative state machine that is designed to implement the negotiation and synchronization process.
    Type: Application
    Filed: December 16, 2005
    Publication date: September 6, 2007
    Applicant: Microsoft Corporation
    Inventors: Dan Teodosiu, Philip Chou, Alexandra Heron, Cheng Huang, Tom Kleinpeter, Jin Li, Eyal Schwartz, John Spivey, David Steere
  • Patent number: 7257639
    Abstract: A sender email client, in response to a request to send an email with attachment, determines whether a recipient of the email has distributed storage separate from an incoming email server of the recipient for storing email attachments. If so, a location server is consulted for the distributed storage's network address and its availability is determined. The send request is then serviced accordingly. An email service, in response to receiving an email with attachment, determines whether a recipient of the email has distributed storage for storing email attachments. If so, its network address and availability are likewise determined. The attachments are forwarded to the recipient's distributed storage for storage, when it becomes available. An email recipient client, in response to a request to access an email attachment, retrieves the attachment from the recipient's distributed storage or the incoming email server, as appropriate.
    Type: Grant
    Filed: July 25, 2001
    Date of Patent: August 14, 2007
    Assignee: Microsoft Corporation
    Inventors: Lily C. Li, Dan Teodosiu, Ryoji Watanabe
  • Publication number: 20070185932
    Abstract: Various embodiments introduce the notion of a replication entity which implements a highly scalable file replication system. In one embodiment, the replication entity resides in the form of a scalable replication service. In at least some embodiments, the replication service provides a “drive in the sky” facility that can be used by individuals, such as subscribers, to synchronize their individual machines, such that their files are automatically replicated to a safe and always-on location. Alternatively or additionally, individuals such as subscribers can also access their files via a web-based interface when they are away from their machines.
    Type: Application
    Filed: February 1, 2006
    Publication date: August 9, 2007
    Applicant: Microsoft Corporation
    Inventors: Dan Teodosiu, David Steere, Muthukaruppan Annamalai, Nikolaj Bjorner, Michael Bohlander, Huisheng Liu, Patrick Bozeman
  • Publication number: 20070150558
    Abstract: The claimed invention adapts an existing operating system native replication service component to interface with a general application running on a peer-to-peer network. The claimed invention provides the general application with replication services without the need for coding this functionality from scratch. The claimed invention also adapts the replication service functionality to create a topology of connections based on information received from a peer-to-peer network component, thereby making the replication service function more efficiently with a peer-to-peer network.
    Type: Application
    Filed: December 22, 2005
    Publication date: June 28, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Dan Teodosiu, Ravi Rao, Ryan Kim, Sandeep Singhal, Todd Manion
  • Publication number: 20070094731
    Abstract: Various embodiments provide integrated solutions for detecting and treating undesirable activities. Detection and treatment solutions are integrated with software entities, such as applications, DLLs and the like, and provide status notifications for the user as to the status of the detection and treatment activities. In at least some embodiments, an integrated user interface is provided and gives the user the option to provide input and affect at least some of the treatment options.
    Type: Application
    Filed: October 25, 2005
    Publication date: April 26, 2007
    Applicant: Microsoft Corporation
    Inventors: Dan Teodosiu, Daniel Gwozdz, Sean Purcell, Amy Wu, Alexandra Heron, Elissa Murphy, Bo Rohlfsen
  • Publication number: 20070094348
    Abstract: Virtual machine hard drive image files (VHDs) are stored in a virtual machine image store by a virtual machine image server. The BITS protocol with integrated Remote Differential Compression (RDC) is used to transfer one or more VHDs to a virtual machine client. The RDC may compare segments of preexisting VHDs on the virtual machine client with segments of the requested VHDs to minimize the number of segments that are transferred to the virtual machine client. The requested VHD may then be reconstructed from the received segments and the segments preexisting on the virtual machine client. In addition, the host operating system or applications of the virtual machine client may also be used as a source of segments for the RDC, for example.
    Type: Application
    Filed: October 6, 2006
    Publication date: April 26, 2007
    Applicant: Microsoft Corporation
    Inventors: Bill Scheidel, Dario Bejarano, Anders Vinberg, Dan Teodosiu, Robert Fries