Patents by Inventor Ilia Sacson

Ilia Sacson has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11157388
    Abstract: Identifying a trace based on wait chain coverage analysis comprises identifying a scenario covered by a plurality of traces, as well as a plurality of scenario phases. Each phase has corresponding phase beginning and ending, and is covered by corresponding trace(s) of the plurality of traces. For each prior instance of each phase, a corresponding wait chain comprising a series of wait operations is identified. After identifying signatures configured to match a subset of wait operations in wait chain(s), at least a signature coverage is calculated over the identified corresponding wait chains. The signature coverage characterizes portions(s) of these wait chains that are matched by the signature(s). Based on calculating the signature coverage, one or more of the plurality of traces are identified as having unknown wait states, based on the identified trace(s) corresponding to a larger amount of uncovered wait chain portions than others of the plurality of traces.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: October 26, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Scotia Clover Baker, Ilia Sacson, Deepthi Sri Dhulipalla, James Christopher Gray, Manikanta Reddy Dornala, Minxiao Zhou, Travis Alcantara, Yash Sharma, Vibhor Bhatt, Qi Zhang, Ishfaq Mohammad Ismail
  • Patent number: 10038616
    Abstract: Embodiments relate to classifying network streams and regulating behavior of the streams based on their respective classes. One technique for managing streams involves analyzing applications, obtaining indicia of features of the applications, and using those features to infer classes to which streams of the applications may be assigned. Another technique involves deploying beacon nodes at the edge of a network. The beacon nodes inform a stream manager about network conditions such as latencies with regard to network boundaries or regions. Another embodiment for facilitating management of streams involves a subscription service for UDP applications. A UDP application may subscribe to the service, which may be provided by an operating system hosting the application. Events are published to any subscribed UDP applications to inform the UDP applications of changes in networking conditions. The UDP applications, in turn, may adapt their internal transmission control logic.
    Type: Grant
    Filed: September 25, 2014
    Date of Patent: July 31, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ahmed Talat, Vibhor Bhatt, Jeff Sinnemaki, Alexei Aleksenko, Ilia Sacson, Jeffrey C. Fuller, Milena Salman, Madhusudhan Ravi, Mohammed Karam, Neel Jain
  • Patent number: 9674099
    Abstract: An operating system implements classes of network streams. Applications assign their network streams to the classes. The operating system, in turn, regulates the streams according to which classes the streams are in. As conditions change, network resources may be made available or more fully utilized by regulating streams according to which classes they have been assigned to. Network resources may be made available, perhaps rapidly or preemptively, for streams in higher priority classes by restricting streams in lower priority classes.
    Type: Grant
    Filed: September 25, 2014
    Date of Patent: June 6, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ahmed Talat, Vibhor Bhatt, Jeff Sinnemaki, Alexei Aleksenko, Ilia Sacson, Jeffrey C. Fuller, Milena Salman, Madhusudhan Ravi, Mohammed Karam, Neel Jain
  • Publication number: 20160094464
    Abstract: An operating system implements classes of network streams. Applications assign their network streams to the classes. The operating system, in turn, regulates the streams according to which classes the streams are in. As conditions change, network resources may be made available or more fully utilized by regulating streams according to which classes they have been assigned to. Network resources may be made available, perhaps rapidly or preemptively, for streams in higher priority classes by restricting streams in lower priority classes.
    Type: Application
    Filed: September 25, 2014
    Publication date: March 31, 2016
    Inventors: Ahmed Talat, Vibhor Bhatt, Jeff Sinnemaki, Alexei Aleksenko, Ilia Sacson, Jeffrey C. Fuller, Milena Salman, Madhusudhan Ravi, Mohammed Karam, Neel Jain
  • Publication number: 20160094427
    Abstract: Embodiments relate to classifying network streams and regulating behavior of the streams based on their respective classes. One technique for managing streams involves analyzing applications, obtaining indicia of features of the applications, and using those features to infer classes to which streams of the applications may be assigned. Another technique involves deploying beacon nodes at the edge of a network. The beacon nodes inform a stream manager about network conditions such as latencies with regard to network boundaries or regions. Another embodiment for facilitating management of streams involves a subscription service for UDP applications. A UDP application may subscribe to the service, which may be provided by an operating system hosting the application. Events are published to any subscribed UDP applications to inform the UDP applications of changes in networking conditions. The UDP applications, in turn, may adapt their internal transmission control logic.
    Type: Application
    Filed: September 25, 2014
    Publication date: March 31, 2016
    Inventors: Ahmed Talat, Vibhor Bhatt, Jeff Sinnemaki, Alexei Aleksenko, Ilia Sacson, Jeffrey C. Fuller, Milena Salman, Madhusudhan Ravi, Mohammed Karam, Neel Jain
  • Patent number: 8079065
    Abstract: Methods and computer-readable media for indexing an encrypted file by impersonating a user is provided. A set of keys may be associated with a particular encrypted file. Once these keys are identified, the users who own these keys may then be identified by consulting an association of keys to users, which may be updated immediately upon the addition of new keys. If one of the users is currently logged on, the logon information associated with that user may be used to access the content of the encrypted file. The encrypted file may then be indexed based on the accessed content. To allow more than one user to use the same index, security identifiers may be assigned to index records associated with encrypted files to protect content of encrypted files from unauthorized users.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: December 13, 2011
    Assignee: Microsoft Corporation
    Inventors: Ilia Sacson, Michael Novak, Christopher Clayton McConnell
  • Publication number: 20090327749
    Abstract: Methods and computer-readable media for indexing an encrypted file by impersonating a user is provided. A set of keys may be associated with a particular encrypted file. Once these keys are identified, the users who own these keys may then be identified by consulting an association of keys to users, which may be updated immediately upon the addition of new keys. If one of the users is currently logged on, the logon information associated with that user may be used to access the content of the encrypted file. The encrypted file may then be indexed based on the accessed content. To allow more than one user to use the same index, security identifiers may be assigned to index records associated with encrypted files to protect content of encrypted files from unauthorized users.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: ILIA SACSON, MICHAEL NOVAK, CHRISTOPHER CLAYTON McCONNELL