Patents by Inventor Girish Bablani

Girish Bablani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10942760
    Abstract: Various embodiments, methods, and systems for implementing a predictive rightsizing system are provided. Predicted rightsized deployment configurations are generated for virtual machine “VM” deployments having deployment configurations that are modified to predicted rightsized deployment configurations based on a prediction engine. In operation, a VM deployment, associated with a request to deploy one or more VMs on a node, is accessed at a predictive rightsizing controller. A predicted resource utilization for the VM deployment is generated at the prediction engine and accessed at the predictive rightsizing controller. The predicted resource utilization is generated based on a prediction engine that uses past behaviors and features associated with previous VM deployments. Based on the predicted resource utilization, a predicted rightsized deployment configuration is generated for the VM deployment.
    Type: Grant
    Filed: August 28, 2018
    Date of Patent: March 9, 2021
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Marcus Felipe Fontoura, Ricardo Gouvea Bianchini, Girish Bablani
  • Publication number: 20190163517
    Abstract: Various embodiments, methods, and systems for implementing a predictive rightsizing system are provided. Predicted rightsized deployment configurations are generated for virtual machine “VM” deployments having deployment configurations that are modified to predicted rightsized deployment configurations based on a prediction engine. In operation, a VM deployment, associated with a request to deploy one or more VMs on a node, is accessed at a predictive rightsizing controller. A predicted resource utilization for the VM deployment is generated at the prediction engine and accessed at the predictive rightsizing controller. The predicted resource utilization is generated based on a prediction engine that uses past behaviors and features associated with previous VM deployments. Based on the predicted resource utilization, a predicted rightsized deployment configuration is generated for the VM deployment.
    Type: Application
    Filed: August 28, 2018
    Publication date: May 30, 2019
    Inventors: Marcus Felipe FONTOURA, Ricardo Gouvea BIANCHINI, Girish BABLANI
  • Patent number: 8997235
    Abstract: Web applications, systems and services, which are prone to cyber-attacks, can utilize an adaptive fuzzing system and methodology to intelligently employ fuzzer technology to test web site pages for vulnerabilities. A breadth first search and minimal fuzzing testing is performed on identified pages of a web site looking for either a vulnerability or the potential for a vulnerability. Heuristics are gathered and/or generated on each tested web page to determine a vulnerability score for the page that is an indication of the page's potential for hosting a vulnerability. When a page is discovered with a vulnerability score that indicates the page has the potential for a vulnerability a depth first search and expanded fuzzing testing is performed on one or more branches of the web site that begin with the page with the potential vulnerability.
    Type: Grant
    Filed: February 7, 2012
    Date of Patent: March 31, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Marcelo De Barros, Michael Andrews, Manish Mittal, Girish Bablani
  • Publication number: 20130205397
    Abstract: Web applications, systems and services, which are prone to cyber-attacks, can utilize an adaptive fuzzing system and methodology to intelligently employ fuzzer technology to test web site pages for vulnerabilities. A breadth first search and minimal fuzzing testing is performed on identified pages of a web site looking for either a vulnerability or the potential for a vulnerability. Heuristics are gathered and/or generated on each tested web page to determine a vulnerability score for the page that is an indication of the page's potential for hosting a vulnerability. When a page is discovered with a vulnerability score that indicates the page has the potential for a vulnerability a depth first search and expanded fuzzing testing is performed on one or more branches of the web site that begin with the page with the potential vulnerability.
    Type: Application
    Filed: February 7, 2012
    Publication date: August 8, 2013
    Applicant: Microsoft Corporation
    Inventors: Marcelo De Barros, Michael Andrews, Manish Mittal, Girish Bablani
  • Publication number: 20110219424
    Abstract: Some embodiments are directed to an information protection scheme in which devices, users, and domains in an information space may be grouped into zones. When information is transferred across a zone boundary, information protection rules may be applied to determine whether the transfer should be permitted or blocked, and/or whether any other policy actions should be taken (e.g., requiring encryption, prompting the user for confirmation of the intended transfer, or some other action).
    Type: Application
    Filed: March 5, 2010
    Publication date: September 8, 2011
    Applicant: Microsoft Corporation
    Inventors: Anatoliy Panasyuk, Girish Bablani, Charles McColgan, Krishna Kumar Parthasarathy
  • Publication number: 20100266132
    Abstract: Data protection services for portable, handheld, or mobile device are provided in part by one or more cooperating network or data service(s), such as a cloud service, that provide volatile encryption/decryption key information to the device(s). Decryption key(s) are retrieved on demand by a device or application of the device from a network service or other data service based on an analysis of device and user credential(s). Retrieval of keys can be triggered automatically by meeting a set of pre-conditions by the device or application, or explicitly or implicitly requested by input to the device or application. Thus, decryption keys are provided to the mobile device in real time, on-demand, explicitly or implicitly defining a volatile lifetime prior to expiration of the decryption keys.
    Type: Application
    Filed: April 15, 2009
    Publication date: October 21, 2010
    Applicant: Microsoft Corporation
    Inventors: Girish Bablani, Anatoliy Panasyuk, Scott Colin Cottrille, Dennis Batchelder
  • Patent number: 5729745
    Abstract: A method and apparatus for creating a base class and derived classes in an object-oriented computer programming environment that allows an application program to manipulate external data connections in a similar manner. The base class includes sufficient functionality for all external data connections regardless of the protocol of the data transfer mechanism that is utilized for the external data connection such that the specific function calls required from the application to implement each data transfer mechanism is hidden from the application. Thus, the application sees all external data connections as being similar because the application issues function calls only to the base class.
    Type: Grant
    Filed: November 14, 1994
    Date of Patent: March 17, 1998
    Assignee: Microsoft Corporation
    Inventors: Cory Alan Reina, Girish Bablani