Patents by Inventor Dinesh Chandnani
Dinesh Chandnani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11922195Abstract: Some embodiments support embedding of a notebooks software component in a surrounding host application, thereby promoting consistency of notebook user interfaces and user experiences between different kinds of applications. For instance, the notebook access added to an integrated development environment (IDE) may be aesthetically consistent with the notebook access added to a business analytics tool from the same vendor as the IDE. Departures from the aesthetic are still supported, e.g., a notebook access provided in a video gaming environment to teach gamers programming skills may have the same aesthetic as the simulated world of the video game, rather than an IDE aesthetic or an enterprise software aesthetic. Direct integration or proxied integration architectures may be used. Efficiencies may be gained by distinguishing between notebook viewing, editing, and executing operations, and providing more computationally expensive resources only as needed for the notebook access being performed.Type: GrantFiled: April 7, 2021Date of Patent: March 5, 2024Assignee: Microsoft Technology Licensing, LLCInventors: John Francis Lam, Safia Abdalla, Shibani Raj Basava, Dinesh Chandnani, Zhu Chen, Kwangje Cho, Ram Kumar Donthula, Katherine Kampf, Daniel Moth, Andrew Christopher Neil, Vaishnavi Sannidhanam, Barry Manh Tu, Vijaya Krishna Upadya, Dileep Yavanmandha
-
Patent number: 11775684Abstract: A rule-based attribution mechanism analyzes documents having different types of data in different formats through the application of script-based rules that apply a tag to the document identifying the type of sensitive data that is contained in the document. Documents having similar tags are aggregated so that the sensitive data is scrubbed from the document leaving the telemetric data available for downstream processing. The scrubbing entails different actions, such as, eliminating the sensitive data, obfuscating the sensitive data, and converting the sensitive data into a non-sensitive value.Type: GrantFiled: August 16, 2022Date of Patent: October 3, 2023Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Brian Boon, Dinesh Chandnani, Zhu Chen, Ram Kumar Donthula, Matthew Sloan Theodore Evans, Andrew Neil, Vijaya Upadya, Geoffrey Staneff, Shibani Basava, Evgenia Steshenko, Carl Brochu, Shaun Miller, Xin Shi
-
Publication number: 20220391538Abstract: A rule-based attribution mechanism analyzes documents having different types of data in different formats through the application of script-based rules that apply a tag to the document identifying the type of sensitive data that is contained in the document. Documents having similar tags are aggregated so that the sensitive data is scrubbed from the document leaving the telemetric data available for downstream processing. The scrubbing entails different actions, such as, eliminating the sensitive data, obfuscating the sensitive data, and converting the sensitive data into a non-sensitive value.Type: ApplicationFiled: August 16, 2022Publication date: December 8, 2022Inventors: BRIAN BOON, DINESH CHANDNANI, ZHU CHEN, RAM KUMAR DONTHULA, MATTHEW SLOAN THEODORE EVANS, ANDREW NEIL, VIJAYA UPADYA, GEOFFREY STANEFF, SHIBANI BASAVA, EVGENIA STESHENKO, CARL BROCHU, SHAUN MILLER, XIN SHI
-
Publication number: 20220334857Abstract: Some embodiments support embedding of a notebooks software component in a surrounding host application, thereby promoting consistency of notebook user interfaces and user experiences between different kinds of applications. For instance, the notebook access added to an integrated development environment (IDE) may be aesthetically consistent with the notebook access added to a business analytics tool from the same vendor as the IDE. Departures from the aesthetic are still supported, e.g., a notebook access provided in a video gaming environment to teach gamers programming skills may have the same aesthetic as the simulated world of the video game, rather than an IDE aesthetic or an enterprise software aesthetic. Direct integration or proxied integration architectures may be used. Efficiencies may be gained by distinguishing between notebook viewing, editing, and executing operations, and providing more computationally expensive resources only as needed for the notebook access being performed.Type: ApplicationFiled: April 7, 2021Publication date: October 20, 2022Inventors: John Francis LAM, Safia ABDALLA, Shibani Raj BASAVA, Dinesh CHANDNANI, Zhu CHEN, Kwangje CHO, Ram Kumar DONTHULA, Katherine KAMPF, Daniel MOTH, Andrew Christopher NEIL, Vaishnavi SANNIDHANAM, Barry Manh TU, Vijaya Krishna UPADYA, Dileep YAVANMANDHA
-
Patent number: 11449635Abstract: A rule-based attribution mechanism analyzes documents having different types of data in different formats through the application of script-based rules that apply a tag to the document identifying the type of sensitive data that is contained in the document. Documents having similar tags are aggregated so that the sensitive data is scrubbed from the document leaving the telemetric data available for downstream processing. The scrubbing entails different actions, such as, eliminating the sensitive data, obfuscating the sensitive data, and converting the sensitive data into a non-sensitive value.Type: GrantFiled: May 9, 2019Date of Patent: September 20, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Brian Boon, Dinesh Chandnani, Zhu Chen, Ram Kumar Donthula, Matthew Sloan Theodore Evans, Andrew Neil, Vijaya Upadya, Geoffrey Staneff, Shibani Basava, Evgenia Steshenko, Carl Brochu, Shaun Miller, Xin Shi
-
Patent number: 11157652Abstract: A real-time event processing system receives event data containing telemetric data and one or more personal identifiers. The personal identifier in the event data is replaced with an obfuscated value so that the telemetric data may be used without reference to the personal identifier. A reversible map is used to reverse the obfuscated personal identifier to its original value. In the case when a request is received to delete the mapped personal identifier, the link to the entry in the reversible map is broken by associating the personal identifier with a different obfuscated value.Type: GrantFiled: December 10, 2018Date of Patent: October 26, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Shibani Basava, Dinesh Chandnani, Zhu Chen, Ram Kumar Donthula, Matthew Sloan Theodore Evans, Siwei Li, George Joshua Michaels, Andrew Christopher Neil, Geoffrey Staneff, Evgenia Steshenko, Vijay Upadya, Shengyu Fu
-
Publication number: 20190354717Abstract: A rule-based attribution mechanism analyzes documents having different types of data in different formats through the application of script-based rules that apply a tag to the document identifying the type of sensitive data that is contained in the document. Documents having similar tags are aggregated so that the sensitive data is scrubbed from the document leaving the telemetric data available for downstream processing. The scrubbing entails different actions, such as, eliminating the sensitive data, obfuscating the sensitive data, and converting the sensitive data into a non-sensitive value.Type: ApplicationFiled: May 9, 2019Publication date: November 21, 2019Inventors: BRIAN BOON, DINESH CHANDNANI, ZHU CHEN, RAM KUMAR DONTHULA, MATTHEW SLOAN THEODORE EVANS, ANDREW NEIL, VIJAYA UPADYA, GEOFFREY STANEFF, SHIBANI BASAVA, EVGENIA STESHENKO, CARL BROCHU, SHAUN MILLER, XIN SHI
-
Publication number: 20190354718Abstract: An offline batch processing system classifies sensitive data contained in consumer data, such as telemetric data, using a manual classification process and a machine learning model. The machine learning model is used to recheck the policy settings used in the manual classification process and to learn relationships between the features in the consumer data in order to identify sensitive data. The identified sensitive data is then scrubbed so that the remaining data may be used.Type: ApplicationFiled: May 15, 2019Publication date: November 21, 2019Inventors: DINESH CHANDNANI, MATTHEW SLOAN THEODORE EVANS, SHENGYU FU, GEOFFREY STANEFF, EVGENIA STESHENKO, NEELAKANTAN SUNDARESAN, CENZHUO YAO, SHAUN MILLER
-
Publication number: 20190354716Abstract: A real-time event processing system receives event data containing telemetric data and one or more personal identifiers. The personal identifier in the event data is replaced with an obfuscated value so that the telemetric data may be used without reference to the personal identifier. A reversible map is used to reverse the obfuscated personal identifier to its original value. In the case when a request is received to delete the mapped personal identifier, the link to the entry in the reversible map is broken by associating the personal identifier with a different obfuscated value.Type: ApplicationFiled: December 10, 2018Publication date: November 21, 2019Inventors: SHIBANI BASAVA, DINESH CHANDNANI, ZHU CHEN, RAM KUMAR DONTHULA, MATTHEW SLOAN THEODORE EVANS, SIWEI LI, GEORGE JOSHUA MICHAELS, ANDREW CHRISTOPHER NEIL, GEOFFREY STANEFF, EVGENIA STESHENKO, VIJAY UPADYA, SHENGYU FU
-
Patent number: 9436449Abstract: Debugging and testing are aided by removing portions of software which are not relevant to a particular scenario. Upon replay, scenario behavior occurs. A reduction tool selects a function exercised during the replay, disables it to provide a test version of the software, replays the scenario to the test version to produce a candidate behavior, and compares the candidate behavior to the scenario behavior. When the candidate behavior matches the scenario behavior the tool removes the disabled function, thereby providing a reduced version of the software which is functionally equivalent to the full version but has fewer functions to manage. The tool may also remove unexercised code. Trimming unexercised code and reducing exercised but irrelevant code may be interleaved. Caching, dynamic uniform resource locator mapping, hypertext markup language code refactoring, and/or avoidance of certain random elements may also facilitate exhibiting, testing, or debugging web applications.Type: GrantFiled: June 2, 2015Date of Patent: September 6, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Dinesh Chandnani, Kunal Pathak, Ritesh Parikh
-
Publication number: 20070006037Abstract: A test result analyzer for processing results of testing software. The analyzer has an interface emulating the interface of a traditional data logger. After analyzing the test results, selected results may be output to a log file or otherwise reported for subsequent use. The test result analyzer compares test results to results in a database of historical data from running test cases. The analyzer filters out results representative of fault conditions already reflected in the historical data, thereby reducing the amount of data that must be processed to identify fault conditions.Type: ApplicationFiled: June 29, 2005Publication date: January 4, 2007Applicant: Microsoft CorporationInventors: Imran Sargusingh, Shauna Roundy, Dinesh Chandnani, Wing Wan