Patents by Inventor Irina Gorbach

Irina Gorbach has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9894040
    Abstract: Embodiments are directed to securing data in the cloud, securely encrypting data that is to be stored in the cloud and to securely decrypting data accessed from the cloud. In one scenario, an instantiated trust service receives information indicating that a trust server is to be instantiated. The trust service instantiates the trust server, which is configured to store key references and encrypted keys. The trust service receives the public key portion of a digital certificate for each publisher and subscriber that is to have access to various specified portions of encrypted data. A data access policy is then defined that specifies which encrypted data portions can be accessed by which subscribers.
    Type: Grant
    Filed: September 11, 2012
    Date of Patent: February 13, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Irina Gorbach, Venkatesh Krishnan, Andrey Shur, Dmitry Denisov, Lars Kuhtz, Sumalatha Adabala, Roy Peter D'Souza, Michael Entin, Michael Ray Clark, Gitika Aggarwal Saubhasik
  • Patent number: 9647837
    Abstract: Embodiments include method, systems, and computer program products for filtering trust services records. Embodiments include receiving a trust services record that includes a plurality of security components and that is usable to secure data that is stored in an untrusted location. It is determined whether the trust services record has been tampered with, including verifying each of the plurality of security components of the trust services record. The trust services record is filtered based on the determination of whether the trust services record has been tampered with. The filtering includes, when the trust services record is determined to have not been tampered with, allowing performance of at least one task with respect to the secured data; and, when the trust services record is determined to have been tampered with, disallowing performance of any task with respect to the secured data.
    Type: Grant
    Filed: January 29, 2015
    Date of Patent: May 9, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Irina Gorbach, Venkatesh Krishnan, Andrey Shur, Dmitry Denisov, Lars Kuhtz, Sumant Mehta, Marina Galata
  • Patent number: 9189648
    Abstract: Embodiments are directed to mapping encryption policies to data stored in a database using a policy identifier, and to accessing data stored in a database using a policy identifier. In one scenario, a computer system receives an indication that identifies which type of encryption is to be applied when encrypting a specified portion of data stored in a database. The database has a database schema identified by a database schema identifier, where the database schema defines relationships for data stored in the database. The computer system then accesses a namespace that identifies a set of databases in which the specified portion of data is accessed in the same manner. The computer system also generates a policy identifier, which contains information including the namespace and the database schema identifier.
    Type: Grant
    Filed: August 13, 2014
    Date of Patent: November 17, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Michael Entin, Dmitry Denisov, Lars Kuhtz, Irina Gorbach, Venkatesh Krishnan, Andrey Shur
  • Publication number: 20150302051
    Abstract: A mechanism to visualize data to a user in a sufficient manner. The user selects a visualization type to visualize a selected subset of a data model. To fit the data well into a visualization of that visualization type, the system then evaluates the user selections of the visualization type of the subset of data against the rule set. Based on the evaluation, the system determines that the subset of data overpopulates the visualization type. In some embodiments, the system further identifies one or more filters to apply to the subset of data which would decrease the population of data within the virtualization type. Then, a visualization of the selected visualization type is to be displayed using at least one of the one or more identified filter.
    Type: Application
    Filed: April 21, 2014
    Publication date: October 22, 2015
    Applicant: Microsoft Corporation
    Inventors: Patrick J. Baumgartner, Pedram Faghihi Rezaei, Sharath Kodi Udupa, Irina Gorbach, Adam David Wilson
  • Publication number: 20150278315
    Abstract: A mechanism to visualize data to a user in a sufficient manner. The user selects a visualization type to visualize a selected subset of a data model. To fit the data well into a visualization of that visualization type, the system then evaluates the user selections of the visualization type of the subset of data against the rule set. Based on the evaluation, the system determines that the subset of data does not populate or insufficiently populates the visualization type. In some embodiments, the system further recommends additional data to supplement the selected subset of data to more sufficiently utilize the visualization to display the subset of data in conjunction with the supplemented data. The system may further display the visualization based on the selected subset of the data model perhaps before and/or after supplemented with the supplemented data.
    Type: Application
    Filed: April 1, 2014
    Publication date: October 1, 2015
    Applicant: Microsoft Corporation
    Inventors: Patrick J. Baumgartner, Pedram Faghihi Rezaei, Sharath Kodi Udupa, Irina Gorbach, Adam David Wilson
  • Publication number: 20150143127
    Abstract: Embodiments include method, systems, and computer program products for filtering trust services records. Embodiments include receiving a trust services record that includes a plurality of security components and that is usable to secure data that is stored in an untrusted location. It is determined whether the trust services record has been tampered with, including verifying each of the plurality of security components of the trust services record. The trust services record is filtered based on the determination of whether the trust services record has been tampered with. The filtering includes, when the trust services record is determined to have not been tampered with, allowing performance of at least one task with respect to the secured data; and, when the trust services record is determined to have been tampered with, disallowing performance of any task with respect to the secured data.
    Type: Application
    Filed: January 29, 2015
    Publication date: May 21, 2015
    Inventors: Irina Gorbach, Venkatesh Krishnan, Andrey Shur, Dmitry Denisov, Lars Kuhtz, Sumant Mehta, Marina Galata
  • Patent number: 8959351
    Abstract: Embodiments are directed to securely filtering trust services records. In one scenario, a client computer system receives at least one of the following trust services records: a trust services certificate, a principal certificate, a group certificate and a trust services policy. The client computer system performs a time validity check to validate the trust services record's timestamp, performs an integrity check to validate the integrity of the trust services record and performs a signature validity check to ensure that the entity claiming to have created the trust services record is the actual creator of the trust services record. The client computer system then, based on the time validity check, the integrity check and the signature validity check, determines that the trust services record is valid and allows a client computer system user to perform a specified task using the validated trust services record.
    Type: Grant
    Filed: September 13, 2012
    Date of Patent: February 17, 2015
    Assignee: Microsoft Corporation
    Inventors: Irina Gorbach, Venkatesh Krishnan, Andrey Shur, Dmitry Denisov, Lars Kuhtz, Sumant Mehta, Marina Galata
  • Publication number: 20140351884
    Abstract: Embodiments are directed to mapping encryption policies to data stored in a database using a policy identifier, and to accessing data stored in a database using a policy identifier. In one scenario, a computer system receives an indication that identifies which type of encryption is to be applied when encrypting a specified portion of data stored in a database. The database has a database schema identified by a database schema identifier, where the database schema defines relationships for data stored in the database. The computer system then accesses a namespace that identifies a set of databases in which the specified portion of data is accessed in the same manner. The computer system also generates a policy identifier, which contains information including the namespace and the database schema identifier.
    Type: Application
    Filed: August 13, 2014
    Publication date: November 27, 2014
    Inventors: Michael Entin, Dmitry Denisov, Lars Kuhtz, Irina Gorbach, Venkatesh Krishnan, Andrey Shur
  • Patent number: 8819770
    Abstract: Embodiments are directed to mapping encryption policies to user data stored in a database using a policy column uniform resource identifier (URI). In one scenario, a computer system receives the following: a database schema name that identifies the name of a specified schema within a relational database in which user data is stored, a table name that identifies a specified table within the relational database, a column name that identifies a specified column in the specified table and a namespace identifier that identifies a set of relational databases. The computer system also receives an indication that identifies which type of encryption is to be applied when encrypting the column of data specified by the column name. The computer system then generates a policy column URI that includes a hierarchical string comprising the namespace identifier, the database schema name, the table name and the column name.
    Type: Grant
    Filed: October 4, 2012
    Date of Patent: August 26, 2014
    Assignee: Microsoft Corporation
    Inventors: Michael Entin, Dmitry Denisov, Lars Kuhtz, Irina Gorbach, Venkatesh Krishnan, Andrey Shur
  • Publication number: 20140115327
    Abstract: In one scenario, a computer system accesses a first principal's public key to generate a group private key that is encrypted using the first principal's public key. The generated group private key provides access to data keys that are used to encrypt data resources. The computer system accesses a second principal's public key to encrypt the generated group private key using the second principal's public key and encrypts at least one of the data keys using a group public key, where the data key allows access to encrypted data resources. The first principal then decrypts the group private key using the first principal's private key, decrypts the data key using the decrypted group private key and accesses the data resource using the decrypted data key. The second principal also performs these functions with their private key to access the data resource.
    Type: Application
    Filed: October 22, 2012
    Publication date: April 24, 2014
    Applicant: Microsoft Corporation
    Inventors: Irina Gorbach, Venkatesh Krishnan, Rafayel Bezirganyan, Andrey Shur, Dmitry Denisov, Lars Kuhtz
  • Publication number: 20140101713
    Abstract: Embodiments are directed to mapping encryption policies to user data stored in a database using a policy column uniform resource identifier (URI). In one scenario, a computer system receives the following: a database schema name that identifies the name of a specified schema within a relational database in which user data is stored, a table name that identifies a specified table within the relational database, a column name that identifies a specified column in the specified table and a namespace identifier that identifies a set of relational databases. The computer system also receives an indication that identifies which type of encryption is to be applied when encrypting the column of data specified by the column name. The computer system then generates a policy column URI that includes a hierarchical string comprising the namespace identifier, the database schema name, the table name and the column name.
    Type: Application
    Filed: October 4, 2012
    Publication date: April 10, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Michael Entin, Dmitry Denisov, Lars Kuhtz, Irina Gorbach, Venkatesh Krishnan, Andrey Shur
  • Publication number: 20140075196
    Abstract: Embodiments are directed to securely filtering trust services records. In one scenario, a client computer system receives at least one of the following trust services records: a trust services certificate, a principal certificate, a group certificate and a trust services policy. The client computer system performs a time validity check to validate the trust services record's timestamp, performs an integrity check to validate the integrity of the trust services record and performs a signature validity check to ensure that the entity claiming to have created the trust services record is the actual creator of the trust services record. The client computer system then, based on the time validity check, the integrity check and the signature validity check, determines that the trust services record is valid and allows a client computer system user to perform a specified task using the validated trust services record.
    Type: Application
    Filed: September 13, 2012
    Publication date: March 13, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Irina Gorbach, Venkatesh Krishnan, Andrey Shur, Dmitry Denisov, Lars Kuhtz, Sumant Mehta, Marina Galata
  • Publication number: 20140075184
    Abstract: Embodiments are directed to securing data in the cloud, securely encrypting data that is to be stored in the cloud and to securely decrypting data accessed from the cloud. In one scenario, an instantiated trust service receives information indicating that a trust server is to be instantiated. The trust service instantiates the trust server, which is configured to store key references and encrypted keys. The trust service receives the public key portion of a digital certificate for each publisher and subscriber that is to have access to various specified portions of encrypted data. A data access policy is then defined that specifies which encrypted data portions can be accessed by which subscribers.
    Type: Application
    Filed: September 11, 2012
    Publication date: March 13, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Irina Gorbach, Venkatesh Krishnan, Andrey Shur, Dmitry Denisov, Lars Kuhtz, Sumalatha Adabala, Roy Peter D'Souza, Michael Entin, Michael Ray Clark, Gitika Aggarwal Saubhasik
  • Patent number: 7958122
    Abstract: Systems and method for creating multidimensional data cubes containing data domains for analyzing large amounts of data are provided. Data domains may be included in the major object of a multidimensional data cube. Further embodiments of the present invention provide methods for querying multidimensional data cubes having data domains. Embodiments of the present invention provide for defining data domains by any object in the major object model and for defining parent and child data domains.
    Type: Grant
    Filed: March 5, 2008
    Date of Patent: June 7, 2011
    Assignee: Microsoft Corporation
    Inventors: Mosha Pasumansky, Alexander Berger, Dmitry Berger, Irina Gorbach, Marius Dumitru
  • Patent number: 7756739
    Abstract: A simple interface may be provided that enables the user to define parameters for aggregation of a semi-additive measure. The interface may enable the user to designate a measure as a semi-additive measure and to pair the measure with an additive aggregation function. The interface may also enable the user to select non-additive dimensions and to pair each non-additive dimension with a corresponding aggregation function. One such aggregation function is a by account aggregation function, which enables each account in an account dimension to be aggregated across a corresponding non-additive dimension according to an associated account type.
    Type: Grant
    Filed: February 12, 2004
    Date of Patent: July 13, 2010
    Assignee: Microsoft Corporation
    Inventors: Thierry D'hers, Thomas Conlon, Mosha Pasumansky, Irina Gorbach, Alexander Berger
  • Publication number: 20090228436
    Abstract: Systems and method for creating multidimensional data cubes containing data domains for analyzing large amounts of data are provided. Data domains may be included in the major object of a multidimensional data cube. Further embodiments of the present invention provide methods for querying multidimensional data cubes having data domains. Embodiments of the present invention provide for defining data domains by any object in the major object model and for defining parent and child data domains.
    Type: Application
    Filed: March 5, 2008
    Publication date: September 10, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: MOSHA PASUMANSKY, ALEXANDER BERGER, DMITRY BERGER, IRINA GORBACH, MARIUS DUMITRU
  • Publication number: 20060020933
    Abstract: The subject invention pertains to the integration of an object model and a multidimensional database query language such as MDX. In particular, multidimensional declarative query language entities can be exposed through objects in an object model. The object model enables generation and employment of procedural language functions, routines, or procedures that interact with multidimensional database data. This effectively provides an extension for multidimensional query languages. For example, procedures can be stored and invoked from a declarative language query. Furthermore, the object model disclosed herein can expose a context object to enable conditional procedures based on the context of execution.
    Type: Application
    Filed: April 28, 2005
    Publication date: January 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Mosha Pasumansky, Irina Gorbach, Alexander Balikov, Alexander Berger, Marius Dumitru, Thomas Conlon
  • Publication number: 20060020620
    Abstract: The subject disclosure pertains to extensible data mining systems, means, and methodologies. For example, a data mining system is disclosed that supports plug-in or integration of non-native mining algorithms, perhaps provided by third parties, such that they function the same as built-in algorithms. Furthermore, non-native data mining viewers may also be seamlessly integrated into the system for displaying the results of one or more algorithms including those provided by third parties as well as those built-in. Still further yet, support is provided for extending data mining languages to include user-defined functions (UDFs).
    Type: Application
    Filed: June 21, 2005
    Publication date: January 26, 2006
    Applicant: Microsoft Corporation
    Inventors: Raman Iyer, Ioan Crivat, C. MacLennan, Scott Oveson, Rong Guan, ZhaoHui Tang, Pyungchul Kim, Irina Gorbach
  • Publication number: 20060007731
    Abstract: A system that facilitates one or more of querying and updating a multi-dimensional structure comprises a component that receives a statement in a declarative language relating to a typed object associated with a multi-dimensional structure. A conversion component analyzes context associated with the statement and automatically converts the object to a disparate type as a function of the analysis. For example, an execution engine can comprise the conversion component, and the execution engine can be an Online Analytical Processing (OLAP) engine.
    Type: Application
    Filed: March 1, 2005
    Publication date: January 12, 2006
    Applicant: Microsoft Corporation
    Inventors: Marius Dumitru, Amir Netz, Mosha Pasumansky, Cristian Petculescu, Richard Tkachuk, Alexander Berger, Irina Gorbach, Grzegorz Guzik
  • Publication number: 20060010110
    Abstract: A system that facilitates data mining comprises a reception component that receives command(s) in a declarative language that relate to utilizing an output of a first data mining model as an input to a second data mining model. An implementation component analyzes the received command(s) and implements the command(s) with respect to the first and second data mining models. In another aspect of the subject invention, the reception component can receive further command(s) in a declarative language with respect to causing one or more of the first and second data mining models to output a prediction, the prediction desirably generated without prediction input, the implementation component causes the one or more of the first and second data mining models to output the prediction.
    Type: Application
    Filed: February 2, 2005
    Publication date: January 12, 2006
    Applicant: Microsoft Corporation
    Inventors: Pyungchul Kim, ZhaoHui Tang, Ioan Crivat, C. MacLennan, Raman Iyer, Irina Gorbach