Patents by Inventor David Charles Oliver
David Charles Oliver has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11327802Abstract: Systems and methods for exporting logical object metadata. In one example, the system includes an electronic processor configured to receive a first input from a user. The first input includes a logical object location and at least one metadata export option. The electronic processor is also configured to create an export job based upon the first input. The electronic processor is also configured to store the export job in a job queue, determine when a computing resource is available to execute the export job, and execute the export job when the computing resource is available. The electronic processor is also configured to store a job manifest in a memory location. In one example, the job manifest includes metadata for each logical object located in the logical object location.Type: GrantFiled: October 9, 2019Date of Patent: May 10, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Wan Chin Wu, Hani Gamal Loza, Joe Keng Yap, Wenyu Cai, David Charles Oliver, Simon Bourdages
-
Patent number: 11226944Abstract: Concepts and technologies are described herein for cache management. In accordance with the concepts and technologies disclosed herein, the server computer can be configured to communicate with a client device configured to execute a cache module to maintain a cache storing data downloaded from and/or uploaded to the server computer by the client device. The server computer can be configured to receive requests for data stored at the server computer. The server computer can be configured to respond to the request with hashes that correspond to the requested data. The client device can search the cache for the hashes, obtain the data from the cache if the hashes are found, and/or download the data from the server computer if the hashes are not found. The client device also can be configured to update the cache upon uploading the data to the server computer.Type: GrantFiled: January 25, 2019Date of Patent: January 18, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Miko Arnab Sakhya Singha Bose, Simon Clarke, David Charles Oliver, Malgorzata Anna Malaczek
-
Publication number: 20210034426Abstract: Systems and methods for exporting logical object metadata. In one example, the system includes an electronic processor configured to receive a first input from a user. The first input includes a logical object location and at least one metadata export option. The electronic processor is also configured to create an export job based upon the first input. The electronic processor is also configured to store the export job in a job queue, determine when a computing resource is available to execute the export job, and execute the export job when the computing resource is available. The electronic processor is also configured to store a job manifest in a memory location. In one example, the job manifest includes metadata for each logical object located in the logical object location.Type: ApplicationFiled: October 9, 2019Publication date: February 4, 2021Inventors: Wan Chin WU, Hani Gamal LOZA, Joe Keng YAP, Wenyu CAI, David Charles OLIVER, Simon BOURDAGES
-
Patent number: 10826689Abstract: A data file is encrypted with a file-specific encryption key and sent to a remote data storage system. The file-specific encryption key is encrypted with a master key. The encrypted file-specific encryption key and the master key are both stored remotely from the encrypted file and they are stored remotely from one another.Type: GrantFiled: July 16, 2018Date of Patent: November 3, 2020Assignee: Microsoft Technology Licensing, LLCInventors: David Charles Oliver, Ming-wei Wang, Mingquan Xue, Christopher Paul Holder, Daniel Keith Winter, Parul Manek
-
Patent number: 10678762Abstract: Data to be moved from a source system to a target system, for a set of tenants, is first identified. It is then isolated into its own container. The contents are then moved.Type: GrantFiled: October 2, 2015Date of Patent: June 9, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Shyam Narayan, Adrian Fanaru, Burra Gopal, James P. Rupke, Parul Manek, Ziyi Wang, David Charles Oliver, Daniel Keith Winter, Yang Xiang
-
Publication number: 20190155798Abstract: Concepts and technologies are described herein for cache management. In accordance with the concepts and technologies disclosed herein, the server computer can be configured to communicate with a client device configured to execute a cache module to maintain a cache storing data downloaded from and/or uploaded to the server computer by the client device. The server computer can be configured to receive requests for data stored at the server computer. The server computer can be configured to respond to the request with hashes that correspond to the requested data. The client device can search the cache for the hashes, obtain the data from the cache if the hashes are found, and/or download the data from the server computer if the hashes are not found. The client device also can be configured to update the cache upon uploading the data to the server computer.Type: ApplicationFiled: January 25, 2019Publication date: May 23, 2019Inventors: Miko Arnab Sakhya Singha Bose, Simon Clarke, David Charles Oliver, Malgorzata Anna Malaczek
-
Patent number: 10261943Abstract: Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.Type: GrantFiled: September 15, 2015Date of Patent: April 16, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Shyam Narayan, Burra Gopal, Adrian Fanaru, James Rupke, David Charles Oliver, Daniel Keith Winter, Parul Manek
-
Publication number: 20190081775Abstract: A data file is encrypted with a file-specific encryption key and sent to a remote data storage system. The file-specific encryption key is encrypted with a master key. The encrypted file-specific encryption key and the master key are both stored remotely from the encrypted file and they are stored remotely from one another.Type: ApplicationFiled: July 16, 2018Publication date: March 14, 2019Inventors: David Charles Oliver, Ming-wei Wang, Mingquan Xue, Christopher Paul Holder, Daniel Keith Winter, Parul Manek
-
Patent number: 10229124Abstract: Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.Type: GrantFiled: October 2, 2015Date of Patent: March 12, 2019Assignee: Microsoft Technology Licensing, LLCInventors: David Charles Oliver, Ming-wei Wang, Gang Zhao, Daniel Keith Winter, Shyam Narayan, Parul Manek
-
Patent number: 10198462Abstract: Concepts and technologies are described herein for cache management. In accordance with the concepts and technologies disclosed herein, the server computer can be configured to communicate with a client device configured to execute a cache module to maintain a cache storing data downloaded from and/or uploaded to the server computer by the client device. The server computer can be configured to receive requests for data stored at the server computer. The server computer can be configured to respond to the request with hashes that correspond to the requested data. The client device can search the cache for the hashes, obtain the data from the cache if the hashes are found, and/or download the data from the server computer if the hashes are not found. The client device also can be configured to update the cache upon uploading the data to the server computer.Type: GrantFiled: April 5, 2012Date of Patent: February 5, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Miko Arnab Sakhya Singha Bose, Simon Clarke, David Charles Oliver, Malgorzata Anna Malaczek
-
Patent number: 10050780Abstract: A data file is encrypted with a file-specific encryption key and sent to a remote data storage system. The file-specific encryption key is encrypted with a master key. The encrypted file-specific encryption key and the master key are both stored remotely from the encrypted file and they are stored remotely from one another.Type: GrantFiled: October 2, 2015Date of Patent: August 14, 2018Assignee: Microsoft Technology Licensing, LLCInventors: David Charles Oliver, Ming-wei Wang, Mingquan Xue, Christopher Paul Holder, Daniel Keith Winter, Parul Manek
-
Publication number: 20160321274Abstract: Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.Type: ApplicationFiled: September 15, 2015Publication date: November 3, 2016Inventors: Shyam Narayan, Burra Gopal, Adrian Fanaru, James Rupke, David Charles Oliver, Daniel Keith Winter, Parul Manek
-
Publication number: 20160321276Abstract: Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.Type: ApplicationFiled: October 2, 2015Publication date: November 3, 2016Inventors: David Charles Oliver, Ming-wei Wang, Gang Zhao, Daniel Keith Winter, Shyam Narayan, Parul Manek
-
Publication number: 20160321248Abstract: Data to be moved from a source system to a target system, for a set of tenants, is first identified. It is then isolated into its own container. The contents are then moved.Type: ApplicationFiled: October 2, 2015Publication date: November 3, 2016Inventors: Shyam Narayan, Adrian Fanaru, Burra Gopal, James P. Rupke, Parul Manek, Ziyi Wang, David Charles Oliver, Daniel Keith Winter, Yang Xiang
-
Publication number: 20160321461Abstract: A data file is encrypted with a file-specific encryption key and sent to a remote data storage system. The file-specific encryption key is encrypted with a master key. The encrypted file-specific encryption key and the master key are both stored remotely from the encrypted file and they are stored remotely from one another.Type: ApplicationFiled: October 2, 2015Publication date: November 3, 2016Inventors: David Charles Oliver, Ming-Wei Wang, Mingquan Xue, Christopher Paul Holder, Daniel Keith Winter, Parul Manek
-
Publication number: 20160321133Abstract: A post-encryption checksum is generated for a file to be stored on a remote storage location. It can be generated before sending the encrypted file to the remote storage system. A post-write checksum can be received from the remote storage system. The post-write checksum is generated after the encrypted file is written there. A comparison of the two checksums indicates whether the file has been correctly written to the remote storage system.Type: ApplicationFiled: October 2, 2015Publication date: November 3, 2016Inventors: David Charles Oliver, Ming-wei Wang, Dan Winter, Parul Manek
-
Patent number: 8744999Abstract: As changes are made to a document, each change may be assigned an extended identifier comprising a globally unique identifier (GUID) component and an integer component. Upon determining that the same GUID component is used in identifiers for multiple changes, the GUID component may be mapped to a range of indices. Each index of the range of indices may then be used to represent the same GUID component in each extended identifier.Type: GrantFiled: July 24, 2012Date of Patent: June 3, 2014Assignee: Microsoft CorporationInventors: Simon Peter Clarke, David Charles Oliver, Brent James Van Minnen, Miko Arnab S Bose
-
Publication number: 20130268614Abstract: Concepts and technologies are described herein for cache management. In accordance with the concepts and technologies disclosed herein, the server computer can be configured to communicate with a client device configured to execute a cache module to maintain a cache storing data downloaded from and/or uploaded to the server computer by the client device. The server computer can be configured to receive requests for data stored at the server computer. The server computer can be configured to respond to the request with hashes that correspond to the requested data. The client device can search the cache for the hashes, obtain the data from the cache if the hashes are found, and/or download the data from the server computer if the hashes are not found. The client device also can be configured to update the cache upon uploading the data to the server computer.Type: ApplicationFiled: April 5, 2012Publication date: October 10, 2013Applicant: MICROSOFT CORPORATIONInventors: Miko Arnab Sakhya Singha Bose, Simon Clarke, David Charles Oliver, Malgorzata Anna Malaczek
-
Publication number: 20040134229Abstract: Articles fabricated from prefabricated strings of beads. The strings of beads are joined perpendicularly by applying pressure such that the cords cross and remain crossed due to the tension in the cords. The strings of beads are thus assembled into a mesh or fabric, two such fabrics being optionally interleaved to form a denser fabric; the strings are also assembled into items so as to fit a person's body or cover some other article. The strings of beads are also formed into loops, and formed into fringes to further adorn the articles. Many colors and styles of strings of beads are assembled, both singly and in combination, and designs are incorporated into the articles, producing multiple appearances. A great variety of articles are produced, including all manner of clothing, flags, bags, containers, novelties, wraps, etc.Type: ApplicationFiled: November 6, 2003Publication date: July 15, 2004Inventor: David Charles Oliver