Patents by Inventor Giovanni Della-Libera

Giovanni Della-Libera has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8732667
    Abstract: A computer system displays an interactive development environment including a domain specific language (DSL) grammar input receiving area that allows the user to view and interact with DSL grammar inputs, a DSL language input receiving area that allows the user to view and interact with DSL language inputs and a parse output area that allows the user to view the current state of the DSL parser. The computer system begins stepping through each DSL language input to determine whether the DSL language inputs have created an error relative to the DSL grammar. The computer system also presents the resulting output for each DSL language input, so that as the user provides subsequent step inputs, the interactive development environment successively steps through each DSL language input and presents, at each step, the DSL grammar inputs, the DSL language inputs and the corresponding output in the parse output area.
    Type: Grant
    Filed: November 13, 2009
    Date of Patent: May 20, 2014
    Assignee: Microsoft Corporation
    Inventors: David Michael Miller, David Patrick Wolfe, Neil Alexander MacIntosh, Quetzalcoatl Bradley, Giovanni Della-Libera
  • Publication number: 20120215804
    Abstract: A data-programming environment is disclosed that facilitates data manipulation. Visual representations are presented of available operations with respect to one or more data sources. A preview of data is displayed capturing the state of data with respect to manipulations. Further, a visual representation of a series of selected operations is maintained to capture successive refinements and aid subsequent interaction.
    Type: Application
    Filed: June 17, 2011
    Publication date: August 23, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Erik Christensen, Steve Millet, Jason Falk, Giovanni Della-Libera
  • Publication number: 20110119654
    Abstract: A computer system displays an interactive development environment including a domain specific language (DSL) grammar input receiving area that allows the user to view and interact with DSL grammar inputs, a DSL language input receiving area that allows the user to view and interact with DSL language inputs and a parse output area that allows the user to view the current state of the DSL parser. The computer system begins stepping through each DSL language input to determine whether the DSL language inputs have created an error relative to the DSL grammar. The computer system also presents the resulting output for each DSL language input, so that as the user provides subsequent step inputs, the interactive development environment successively steps through each DSL language input and presents, at each step, the DSL grammar inputs, the DSL language inputs and the corresponding output in the parse output area.
    Type: Application
    Filed: November 13, 2009
    Publication date: May 19, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: David Michael Miller, David Patrick Wolfe, Neil Alexander MacIntosh, Quetzalcoatl Bradley, Giovanni Della-Libera
  • Patent number: 7860989
    Abstract: In a computerized system, a sending computer system and recipient computer system exchange an interchange format message in a resource-efficient manner. For example, a transformation writer at the sending computer system selects and transforms only one or few of a plurality of units of the message at the time. The transformed message units are then streamed to the recipient computer system in accordance with a relevant transformation standard, such as the canonicalization standard in the case of XML messages. A transformation reader at the recipient computer system transforms the messages using a buffer big enough for received message units, and passes the transformed units to a file. Thus, the transformation writer acts as a stream writer to pass a message, and the transformation reader acts as a stream reader at the recipient computer system.
    Type: Grant
    Filed: February 2, 2005
    Date of Patent: December 28, 2010
    Assignee: Microsoft Corporation
    Inventors: Vaithialingam B. Balayoghan, Douglas A. Walter, Giovanni Della-Libera
  • Patent number: 7730094
    Abstract: Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to be described in an extensible manner using protocol-neutral and platform-independent methodologies. A metadata scope refers to a dynamic universe of targets to which the included metadata statements correspond. Metadata properties provide a mechanism to describe the metadata itself, and metadata security can be used to ensure authentic metadata is sent and received. Mechanisms are also provided to allow refinement and replacement of metadata statements. The generic metadata container can be adapted to dynamically define access control rights to a range of objects by a range of users, including granted and denied access rights.
    Type: Grant
    Filed: August 19, 2005
    Date of Patent: June 1, 2010
    Assignee: Microsoft Corporation
    Inventors: Christopher G. Kaler, Giovanni Della-Libera, Elliot Waingold
  • Publication number: 20070226356
    Abstract: A method includes advertising a policy characterizing communication properties supported by a node. The policy may be distributed to another node in response to a request for the policy. Policy expressions in the policy include one or more assertions that may be grouped and related to each other in a plurality of ways. A system includes a policy generator for generating at least one policy characterizing properties of a node. A policy retriever retrieves a policy from another node and a message generator generates a message to the other node, wherein the message conforms to the policy from the other node.
    Type: Application
    Filed: May 29, 2007
    Publication date: September 27, 2007
    Applicant: Microsoft Corporation
    Inventors: David Levin, Erik Christensen, Saurab Nog, Donald Box, Christopher Kaler, Giovanni Della-Libera, Alfred Lee, David Wortendyke
  • Publication number: 20060253699
    Abstract: A distributed security system is provided. The distributed security system uses a security policy that is written in a policy language that is transport and security protocol independent as well as independent of cryptographic technologies. This security policy can be expressed using the language to create different security components allowing for greater scalability and flexibility. By abstracting underlying protocols and technologies, multiple environments and platforms can be supported.
    Type: Application
    Filed: October 20, 2005
    Publication date: November 9, 2006
    Applicant: Microsoft Corporation
    Inventors: Giovanni Della-Libera, Christopher Kaler, Scott Konersmann, Butler Lampson, Paul Leach, Bradford Lovering, Steven Lucco, Stephen Millet, Richard Rashid, John Shewchuk
  • Publication number: 20060253700
    Abstract: A distributed security system is provided. The distributed security system uses a security policy that is written in a policy language that is transport and security protocol independent as well as independent of cryptographic technologies. This security policy can be expressed using the language to create different security components allowing for greater scalability and flexibility. By abstracting underlying protocols and technologies, multiple environments and platforms can be supported.
    Type: Application
    Filed: October 20, 2005
    Publication date: November 9, 2006
    Applicant: Microsoft Corporation
    Inventors: Giovanni Della-Libera, Christopher Kaler, Scott Konersmann, Butler Lampson, Paul Leach, Bradford Lovering, Steven Lucco, Stephen Millet, Richard Rashid, John Shewchuk
  • Publication number: 20060174016
    Abstract: The present invention provides for an automated, user friendly way of constructing and using a binding object. A developer is presenting and selects binding elements that will ultimately be used to create a runtime communication channel for transporting a message between a client and service endpoint. After receiving the user input, metadata, a channel factory and listener factory are created. The metadata describes binding elements and provides an abstract representation of a protocol stack that implements communication aspects at runtime. The channel factory is configured to use the collection of metadata at runtime to generate the runtime communication channel. Further, the listener factory is configured to accept the runtime communication channel for de-multiplex the communication aspects in order to process the message at a service endpoint. The present invention also provides for groupings of binding elements and standardized binging objects organized based on industry need.
    Type: Application
    Filed: February 1, 2005
    Publication date: August 3, 2006
    Applicant: Microsoft Corporation
    Inventors: Craig Critchley, David Wortendyke, Elliot Waingold, Eric Zinda, Erik Christensen, Giovanni Della-Libera, Kenneth Wolf, Michael Vernal, Shy Cohen, Stefan Pharies, Stephen Millet, Stephen Swartz, Tomasz Janczuk, Uday Hegde, Yaniv Pessach
  • Publication number: 20060173899
    Abstract: In a computerized system, a sending computer system and recipient computer system exchange an interchange format message in a resource-efficient manner. For example, a transformation writer at the sending computer system selects and transforms only one or few of a plurality of units of the message at the time. The transformed message units are then streamed to the recipient computer system in accordance with a relevant transformation standard, such as the canonicalization standard in the case of XML messages. A transformation reader at the recipient computer system transforms the messages using a buffer big enough for received message units, and passes the transformed units to a file. Thus, the transformation writer acts as a stream writer to pass a message, and the transformation reader acts as a stream reader at the recipient computer system.
    Type: Application
    Filed: February 2, 2005
    Publication date: August 3, 2006
    Applicant: Microsoft Corporation
    Inventors: Vaithialingam Balayoghan, Douglas Walter, Giovanni Della-Libera
  • Publication number: 20060150200
    Abstract: A web services namespace pertains to an infrastructure for enabling creation of a wide variety of applications. The infrastructure provides a foundation for building message-based applications of various scale and complexity. The infrastructure or framework provides APIs for basic messaging, secure messaging, reliable messaging and transacted messaging. In some embodiments, the associated APIs are factored into a hierarchy of namespaces in a manner that balances utility, usability, extensibility and versionability.
    Type: Application
    Filed: December 3, 2004
    Publication date: July 6, 2006
    Applicant: Microsoft Corporation
    Inventors: Shy Cohen, Geary Eppley, Douglas Purdy, James Johnson, Stephen Millet, Stephen Swartz, Vijay Gajjala, Aaron Stern, Alexander DeJarnatt, Alfred Lee, Anand Rjagopalan, Anastasios Kasiolas, Chaitanya Upadhyay, Christopher Kaler, Craig Critchley, David Levin, David Driver, David Wortendyke, Douglas Walter, Elliot Waingold, Erik Christensen, Erin Honeycutt, Eugene Shvets, Evgeny Osovetsky, Giovanni Della-Libera, Jesus Ruiz-Scougall, John Doty, Jonathan Wheeler, Kapil Gupta, Kenneth Wolf, Krishnan Srinivasan, Lance Olson, Matthew Tavis, Mauro Ottaviani, Max Feingold, Michael Coulson, Michael Marucheck, Michael Vernal, Michael Dice, Mohamed-Hany Ramadan, Mohammad Makarechian, Natasha Jethanandani, Richard Dievendorff, Richard Hill, Ryan Sturgell, Saurab Nog, Scott Seely, Serge Sverdlov, Siddhartha Puri, Sowmyanarayanan Srinivasan, Stefan Batres, Stefan Pharies, Tirunelveli Vishwanath, Tomasz Janczuk, Uday Hegde, Umesh Madan, Vaithialingam Balayogan, Vipul Modi, Yaniv Pessach, Yasser Shohoud
  • Publication number: 20060130127
    Abstract: A data structure with endpoint address and security information. The data structure includes an address field that includes one or more endpoint addresses for an entity. The data structure further includes a security field that includes one or more keys for facilitating secure communications with the entity. The data structure may also be such that the contents of the address field and the security field are serialized in the data structure. The data structure may be extensible such that new address fields and security fields may be added.
    Type: Application
    Filed: December 10, 2004
    Publication date: June 15, 2006
    Applicant: Microsoft Corporation
    Inventors: Christopher Kaler, Douglas Walter, Giovanni Della-Libera, Melissa Dunn, Richard Hasha, Tomasz Janczuk
  • Publication number: 20060041929
    Abstract: A distributed security system is provided. The distributed security system uses a security policy that is written in a policy language that is transport and security protocol independent as well as independent of cryptographic technologies. This security policy can be expressed using the language to create different security components allowing for greater scalability and flexibility. By abstracting underlying protocols and technologies, multiple environments and platforms can be supported.
    Type: Application
    Filed: October 20, 2005
    Publication date: February 23, 2006
    Applicant: Microsoft Corporation
    Inventors: Giovanni Della-Libera, Christopher Kaler, Scott Konersmann, Butler Lampson, Paul Leach, Bradford Lovering, Steven Lucco, Stephen Millet, Richard Rashid, John Shewchuk
  • Publication number: 20060041743
    Abstract: A distributed security system is provided. The distributed security system uses a security policy that is written in a policy language that is transport and security protocol independent as well as independent of cryptographic technologies. This security policy can be expressed using the language to create different security components allowing for greater scalability and flexibility. By abstracting underlying protocols and technologies, multiple environments and platforms can be supported.
    Type: Application
    Filed: October 20, 2005
    Publication date: February 23, 2006
    Applicant: Microsoft Corporation
    Inventors: Giovanni Della-Libera, Christopher Kaler, Scott Konersmann, Butler Lampson, Paul Leach, Bradford Lovering, Steven Lucco, Stephen Millet, Richard Rashid, John Shewchuk
  • Publication number: 20050278390
    Abstract: Methods, systems, and data structures for communicating object metadata are provided. A generic metadata container is presented that allows object metadata to be described in an extensible manner using protocol-neutral and platform-independent methodologies. A metadata scope refers to a dynamic universe of targets to which the included metadata statements correspond. Metadata properties provide a mechanism to describe the metadata itself, and metadata security can be used to ensure authentic metadata is sent and received. Mechanisms are also provided to allow refinement and replacement of metadata statements. The generic metadata container can be adapted to dynamically define access control rights to a range of objects by a range of users, including granted and denied access rights.
    Type: Application
    Filed: August 19, 2005
    Publication date: December 15, 2005
    Applicant: Microsoft Corporation
    Inventors: Christopher Kaler, Giovanni Della-Libera, Elliot Waingold
  • Publication number: 20050267906
    Abstract: A method of tracking data through a multi-tier computing architecture includes initializing a first row pointer of a dataset with data form a database, placing changes to the data in the second row pointer of the dataset, comparing the first and second row pointers, and declaring a state of the data in response to comparing the first and second row pointers. A system for tracking data through a multi-tier architecture includes an initialize module, a change module, a compare module, and a declare module. The initialize module initializes a first row pointer of a dataset with data from a database. The change module places changes to the data in a second row pointer of the dataset. The compare module compares the first and second row pointers. The declare module declares a state of the data in response to comparing the first and second row pointers.
    Type: Application
    Filed: August 2, 2005
    Publication date: December 1, 2005
    Applicant: Microsoft Corporation
    Inventors: Robert Brigham, Giovanni Della-Libera, Patrick Dengler, Paul Kuklinski
  • Publication number: 20050198098
    Abstract: A method includes advertising a policy characterizing communication properties supported by a node. The policy may be distributed to another node in response to a request for the policy. Policy expressions in the policy include one or more assertions that may be grouped and related to each other in a plurality of ways. A system includes a policy generator for generating at least one policy characterizing properties of a node. A policy retriever retrieves a policy from another node and a message generator generates a message to the other node, wherein the message conforms to the policy from the other node.
    Type: Application
    Filed: February 20, 2004
    Publication date: September 8, 2005
    Inventors: David Levin, Erik Christensen, Saurab Nog, Donald Box, Christopher Kaler, Giovanni Della-Libera, Alfred Lee, David Wortendyke
  • Publication number: 20050193202
    Abstract: A signature system with a mechanism to identify element(s) of a signed document includes a sender having a signature module with a digest generator. The digest generator generates digests for identifying selected elements of the document. The resulting “identifying” digests are then used in generating a signature in which the sender signs the digests rather than the original elements. The receiver can then process the signature and use these digests to distinguish between elements, as needed.
    Type: Application
    Filed: February 26, 2004
    Publication date: September 1, 2005
    Inventors: Vijay Gajjala, Giovanni Della-Libera, V.B. Balayoghan, Tomasz Janczuk
  • Publication number: 20050182941
    Abstract: A system for processing multiple types of security schemes includes a server having a claims engine that extracts claim(s) from security token(s) and maps extracted claims to other claims. The term claim as used in this context is a statement about a token's subject. The claims engine can extract claim(s) from one or more different types of security tokens corresponding to the multiple security schemes. These extracted claim(s) can then be selectively mapped to other claims using mapping information that is accessible to the server. The security decision can then be based on the extracted and/or derived claim(s) rather than tokens. This system can thereby support multiple security schemes and simplify the security process for the user.
    Type: Application
    Filed: February 16, 2004
    Publication date: August 18, 2005
    Inventors: Giovanni Della-Libera, Vijay Gajjala, Tomasz Janczuk, John Lambert, Elliot Waingold
  • Publication number: 20050182957
    Abstract: A security system with a mechanism to identify types of information that need to be secured and another mechanism to specify how the types are to be secured. The system includes a sender having an application and a receiver having a security module and one or more datastores to store information related to types of information that need to be secured (e.g. “scopes”), how information is to be secured (e.g., “profiles”), and a mapping (e.g., “bindings”) between the scopes and profiles. Scopes can be implemented by application developers. Profiles can be implemented by application deployers and/or administrators. The security module determines which scope is appropriate for the message, and then determines the profile that is mapped to the scope. The security module can then make an access control decision using the profile.
    Type: Application
    Filed: February 16, 2004
    Publication date: August 18, 2005
    Inventors: Giovanni Della-Libera, Vijay Gajjala, Tomasz Janczuk, John Lambert