Patents by Inventor David Nissimoff
David Nissimoff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12254069Abstract: The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.Type: GrantFiled: December 26, 2023Date of Patent: March 18, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Sunay Vaishnav, Merwan Vishnu Hade, Stephen Christopher Siciliano, David Nissimoff, Fnu Anubhav
-
Patent number: 12212461Abstract: Solutions for balancing speed and risk by managing configuration changes include: receiving a second configuration item for displacement, in an exposure group, of a first configuration item; receiving an exposure state, wherein the exposure state indicates an exposure tree comprising a first configuration item branch and a second configuration item branch; determining, based at least on the exposure state: a first portion of the exposure group to continue with the first configuration item, and a second portion of the exposure group to receive the second configuration item; deploying the second configuration item to the second portion of the exposure group, in accordance with the exposure state; receiving, from the central orchestrator, an updated exposure state; and deploying the second configuration item in accordance with the updated exposure state. In some examples, the exposure tree is a hierarchical binary tree. An exemplary configuration item includes a software application version.Type: GrantFiled: December 14, 2022Date of Patent: January 28, 2025Assignee: Microsoft Technology Licensing, LLC.Inventors: David Nissimoff, Romit Chattopadhyay
-
Patent number: 12166630Abstract: Solutions for balancing speed and risk by managing configuration changes include: receiving a second configuration item for displacement, in an exposure group, of a first configuration item; receiving an exposure state, wherein the exposure state indicates an exposure tree comprising a first configuration item branch and a second configuration item branch; determining, based at least on the exposure state: a first portion of the exposure group to continue with the first configuration item, and a second portion of the exposure group to receive the second configuration item; deploying the second configuration item to the second portion of the exposure group, in accordance with the exposure state; receiving, from the central orchestrator, an updated exposure state; and deploying the second configuration item in accordance with the updated exposure state. In some examples, the exposure tree is a hierarchical binary tree. An exemplary configuration item includes a software application version.Type: GrantFiled: December 14, 2022Date of Patent: December 10, 2024Assignee: Microsoft Technology Licensing, LLC.Inventors: David Nissimoff, Romit Chattopadhyay
-
Publication number: 20240126846Abstract: The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.Type: ApplicationFiled: December 26, 2023Publication date: April 18, 2024Inventors: Sunay VAISHNAV, Merwan Vishnu HADE, Stephen Christopher SICILIANO, David NISSIMOFF, FNU Anubhav
-
Patent number: 11899761Abstract: The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.Type: GrantFiled: May 26, 2022Date of Patent: February 13, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Sunay Vaishnav, Merwan Vishnu Hade, Stephen Christopher Siciliano, David Nissimoff, Fnu Anubhav
-
Publication number: 20230124985Abstract: Solutions for balancing speed and risk by managing configuration changes include: receiving a second configuration item for displacement, in an exposure group, of a first configuration item; receiving an exposure state, wherein the exposure state indicates an exposure tree comprising a first configuration item branch and a second configuration item branch; determining, based at least on the exposure state: a first portion of the exposure group to continue with the first configuration item, and a second portion of the exposure group to receive the second configuration item; deploying the second configuration item to the second portion of the exposure group, in accordance with the exposure state; receiving, from the central orchestrator, an updated exposure state; and deploying the second configuration item in accordance with the updated exposure state. In some examples, the exposure tree is a hierarchical binary tree. An exemplary configuration item includes a software application version.Type: ApplicationFiled: December 14, 2022Publication date: April 20, 2023Inventors: David NISSIMOFF, Romit CHATTOPADHYAY
-
Patent number: 11558250Abstract: Solutions for balancing speed and risk by managing configuration changes include: receiving a second configuration item for displacement, in an exposure group, of a first configuration item; receiving an exposure state, wherein the exposure state indicates an exposure tree comprising a first configuration item branch and a second configuration item branch; determining, based at least on the exposure state: a first portion of the exposure group to continue with the first configuration item, and a second portion of the exposure group to receive the second configuration item; deploying the second configuration item to the second portion of the exposure group, in accordance with the exposure state; receiving, from the central orchestrator, an updated exposure state; and deploying the second configuration item in accordance with the updated exposure state. In some examples, the exposure tree is a hierarchical binary tree. An exemplary configuration item includes a software application version.Type: GrantFiled: August 19, 2020Date of Patent: January 17, 2023Assignee: Microsoft Technology Licensing, LLCInventors: David Nissimoff, Romit Chattopadhyay
-
Publication number: 20220292167Abstract: The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.Type: ApplicationFiled: May 26, 2022Publication date: September 15, 2022Inventors: Sunay Vaishnav, Merwan Vishnu Hade, Stephen Christopher Siciliano, David Nissimoff, FNU Anubhav
-
Patent number: 11379565Abstract: The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.Type: GrantFiled: May 11, 2018Date of Patent: July 5, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Sunay Vaishnav, Merwan Vishnu Hade, Stephen Christopher Siciliano, David Nissimoff, Fnu Anubhav
-
Patent number: 11165868Abstract: Systems and methods are provided and include a processor, memory, and an application that is stored in the memory and includes instructions. The instructions are configured to initiate a stateful session for the application by sending a session initiation request addressed to a global endpoint and receive a response to the session initiation request from a first server of a first server cluster, the response including a cluster identification associated with the first server cluster. The instructions are further configured to send a session request addressed to the global endpoint, the session request including the cluster identification associated with the first server cluster. The instructions are further configured to receive an error message in response to the session request from a second server of a second server cluster to resend the session request addressed to the first server cluster in response to receiving the error message.Type: GrantFiled: March 30, 2017Date of Patent: November 2, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Weijia Mao, Mariyan Dimitrov Fransazov, Yasser Elsayed Shaaban, David Nissimoff
-
Publication number: 20210036914Abstract: Solutions for balancing speed and risk by managing configuration changes include: receiving a second configuration item for displacement, in an exposure group, of a first configuration item; receiving an exposure state, wherein the exposure state indicates an exposure tree comprising a first configuration item branch and a second configuration item branch; determining, based at least on the exposure state: a first portion of the exposure group to continue with the first configuration item, and a second portion of the exposure group to receive the second configuration item; deploying the second configuration item to the second portion of the exposure group, in accordance with the exposure state; receiving, from the central orchestrator, an updated exposure state; and deploying the second configuration item in accordance with the updated exposure state. In some examples, the exposure tree is a hierarchical binary tree. An exemplary configuration item includes a software application version.Type: ApplicationFiled: August 19, 2020Publication date: February 4, 2021Inventors: David NISSIMOFF, Romit CHATTOPADHYAY
-
Patent number: 10785106Abstract: Solutions for balancing speed and risk by managing configuration changes include: receiving a second configuration item for displacement, in an exposure group, of a first configuration item; receiving an exposure state, wherein the exposure state indicates an exposure tree comprising a first configuration item branch and a second configuration item branch; determining, based at least on the exposure state: a first portion of the exposure group to continue with the first configuration item, and a second portion of the exposure group to receive the second configuration item; deploying the second configuration item to the second portion of the exposure group, in accordance with the exposure state; receiving, from the central orchestrator, an updated exposure state; and deploying the second configuration item in accordance with the updated exposure state. In some examples, the exposure tree is a hierarchical binary tree. An exemplary configuration item includes a software application version.Type: GrantFiled: July 29, 2019Date of Patent: September 22, 2020Assignee: Microsoft Technology Licensing LLCInventors: David Nissimoff, Romit Chattopadhyay
-
Patent number: 10673955Abstract: Systems and methods are provided and include a processor, memory, and an application that is stored in the memory and includes instructions. The instructions are configured to initiate a stateful session for the application and receive an initial server response including at least one configuration parameter to be used during the stateful session. The instructions are further configured to determine whether the at least one configuration parameter is not acceptable and send an initial client response to the server in response to a determination that the at least one configuration parameter is not acceptable, the initial client response including a proposed adjustment to the at least one configuration parameter.Type: GrantFiled: April 4, 2017Date of Patent: June 2, 2020Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Mariyan Dimitrov Fransazov, David Nissimoff
-
Publication number: 20190102525Abstract: The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.Type: ApplicationFiled: May 11, 2018Publication date: April 4, 2019Inventors: Sunay Vaishnav, Merwan Vishnu Hade, Stephen Christopher Siciliano, David Nissimoff, FNU Anubhav
-
Publication number: 20180314559Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions that are to cause the processor to store a copy of an external resource on the apparatus, transmit a request for renewal of a lock lease for the external resource, and based on a failure to receive a reply to the renewal request, enter the apparatus into a state in which: the processor processes a new operation on the stored copy of the external resource, and following a determination that the lock lease is lost, the processor outputs a notification that the apparatus lost the lock lease.Type: ApplicationFiled: December 22, 2017Publication date: November 1, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Karthik Gurumoorthy Subramanya Bharathy, Abdelmoumen Bouabdallah, David Nissimoff
-
Publication number: 20180288163Abstract: Systems and methods are provided and include a processor, memory, and an application that is stored in the memory and includes instructions. The instructions are configured to initiate a stateful session for the application by sending a session initiation request addressed to a global endpoint and receive a response to the session initiation request from a first server of a first server cluster, the response including a cluster identification associated with the first server cluster. The instructions are further configured to send a session request addressed to the global endpoint, the session request including the cluster identification associated with the first server cluster. The instructions are further configured to receive an error message in response to the session request from a second server of a second server cluster to resend the session request addressed to the first server cluster in response to receiving the error message.Type: ApplicationFiled: March 30, 2017Publication date: October 4, 2018Inventors: Weijia MAO, Mariyan Dimitrov FRANSAZOV, Yasser Elsayed SHAABAN, David NISSIMOFF
-
Publication number: 20180288165Abstract: Systems and methods are provided and include a processor, memory, and an application that is stored in the memory and includes instructions. The instructions are configured to initiate a stateful session for the application and receive an initial server response including at least one configuration parameter to be used during the stateful session. The instructions are further configured to determine whether the at least one configuration parameter is not acceptable and send an initial client response to the server in response to a determination that the at least one configuration parameter is not acceptable, the initial client response including a proposed adjustment to the at least one configuration parameter.Type: ApplicationFiled: April 4, 2017Publication date: October 4, 2018Inventors: Mariyan Dimitrov FRANSAZOV, David NISSIMOFF
-
Publication number: 20170286379Abstract: A facility for using gestures to attach visual inflection to displayed text is described. The facility receives first user input specifying text, and causes the text specified by the first user input to be displayed in a first manner. The facility receives second user input corresponding to a gesture performed with respect to at least a portion of the displayed text, the performed gesture specifying an inflection type. Based at least in part on receiving the second user input, the facility causes the text specified by the first user input to be displayed in a manner that visually reflects application of the inflection type specified by the performed gesture to the at least a portion of the displayed text with respect to which the gesture was performed.Type: ApplicationFiled: April 4, 2016Publication date: October 5, 2017Inventors: Unnati Jigar Dani, Jiwon Choi, David Nissimoff, Vineeth Karanam