Patents by Inventor Joris Claessens
Joris Claessens has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11080159Abstract: A monitor-mine-manage cycle is described, for example, for managing a data center, a manufacturing process, an engineering process or other processes. In various example, the following steps are performed as a continuous automated loop: receiving raw events from an observed system; monitoring the raw events and transforming them into complex events; mining the complex events and reasoning on results; making a set of proposed actions based on the mining; and managing the observed system by applying one or more of the proposed actions to the system. In various examples, the continuous automated loop proceeds while raw events are continuously received from the observed system and monitored. In some examples an application programming interface is described comprising programming statements which allow a user to implement a monitor-mine-manage loop.Type: GrantFiled: September 20, 2018Date of Patent: August 3, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Panos Periorellis, Eldar Akchurin, Joris Claessens, Ivo Jose Garcia dos Santos, Oliver Nano
-
Publication number: 20190034806Abstract: A monitor-mine-manage cycle is described, for example, for managing a data center, a manufacturing process, an engineering process or other processes. In various example, the following steps are performed as a continuous automated loop: receiving raw events from an observed system; monitoring the raw events and transforming them into complex events; mining the complex events and reasoning on results; making a set of proposed actions based on the mining; and managing the observed system by applying one or more of the proposed actions to the system. In various examples, the continuous automated loop proceeds while raw events are continuously received from the observed system and monitored. In some examples an application programming interface is described comprising programming statements which allow a user to implement a monitor-mine-manage loop.Type: ApplicationFiled: September 20, 2018Publication date: January 31, 2019Inventors: Panos PERIORELLIS, Eldar AKCHURIN, Joris CLAESSENS, Ivo Jose Garcia dos SANTOS, Oliver NANO
-
Patent number: 10095978Abstract: A monitor-mine-manage cycle is described, for example, for managing a data center, a manufacturing process, an engineering process or other processes. In various example, the following steps are performed as a continuous automated loop: receiving raw events from an observed system; monitoring the raw events and transforming them into complex events; mining the complex events and reasoning on results; making a set of proposed actions based on the mining; and managing the observed system by applying one or more of the proposed actions to the system. In various examples, the continuous automated loop proceeds while raw events are continuously received from the observed system and monitored. In some examples an application programming interface is described comprising programming statements which allow a user to implement a monitor-mine-manage loop.Type: GrantFiled: January 5, 2013Date of Patent: October 9, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Panos Periorellis, Eldar Akchurin, Joris Claessens, Ivo Jose Garcia dos Santos, Oliver Nano
-
Publication number: 20140195465Abstract: A monitor-mine-manage cycle is described, for example, for managing a data center, a manufacturing process, an engineering process or other processes. In various example, the following steps are performed as a continuous automated loop: receiving raw events from an observed system; monitoring the raw events and transforming them into complex events; mining the complex events and reasoning on results; making a set of proposed actions based on the mining; and managing the observed system by applying one or more of the proposed actions to the system. In various examples, the continuous automated loop proceeds while raw events are continuously received from the observed system and monitored. In some examples an application programming interface is described comprising programming statements which allow a user to implement a monitor-mine-manage loop.Type: ApplicationFiled: January 5, 2013Publication date: July 10, 2014Applicant: MICROSOFT CORPORATIONInventors: Panos Periorellis, Eldar Akchurin, Joris Claessens, Ivo Jose Garcia dos Santos, Olivier Nano
-
Patent number: 7913309Abstract: Information rights management (IRM) systems enable information to be protected after it has been accessed by or delivered to an authorized individual. For example, this might be to allow an email to be viewed for a limited time by specified individuals but to prevent that email from being forwarded. However, existing IRM systems are limited in the situations in which they may operate. An IRM server is provided which communicates with one or more policy evaluators which are independent of the IRM server. Results from the different policy evaluators may be combined by the IRM server and one or more identity providers may be used in conjunction with each policy evaluator. By enabling the IRM server to act as a broker between authors, recipients and policy evaluators situations in which IRM systems may operate are greatly extended.Type: GrantFiled: June 13, 2007Date of Patent: March 22, 2011Assignee: Microsoft CorporationInventors: Dmitry V Starostin, Joris Claessens, Alexey Orlov
-
Patent number: 7827407Abstract: A scoped federation is described which is referenced by a unique identifier and messages relating to the federation include this unique identifier. The federation is scoped by rules which are stored associated with the unique identifier and upon receipt of a request containing the unique identifier, the related rules are checked to determine if the request is valid.Type: GrantFiled: June 29, 2006Date of Patent: November 2, 2010Assignee: Microsoft CorporationInventors: Joris Claessens, Christian Geuer-Pollman, Laurent Bussard
-
Publication number: 20100082989Abstract: A method of storing a composite service on an untrusted host without enabling the untrusted host to access resources called by the composite service is described. In an embodiment, the delegator provides a delegatee with credentials to enable verification of the composite service and to enable access to the resources. The credential which is provided to enable access to the resources may be a credential which can be used to decrypt access credentials for each of the resources. These access credentials are stored in encrypted form in a credential store. The delegatee downloads the composite service and the encrypted access credentials and executes the composite service once it has been verified.Type: ApplicationFiled: September 26, 2008Publication date: April 1, 2010Applicant: Microsoft CorporationInventors: Laurent Bussard, Ulrich Pinsdorf, Anna Nano, Joris Claessens, Christian Geuer-Pollmann
-
Publication number: 20090259591Abstract: Information rights management (IRM) systems are used to protect the use of information within a data item. An IRM system is provided which will allow access to a data item following at least two interactions with one or more licensing entities. In some examples, the license entities may each issue a license containing part of the information required to access the data item. Each license part may correspond to part of a use policy. For example, a first licensing entity may issue a license to access a document based on one requirement and a second licensing entity may issue a license based on a different requirement. In other examples, a licensing entity may require a second licensing entity to perform a validation before it issues a use license.Type: ApplicationFiled: April 11, 2008Publication date: October 15, 2009Applicant: Microsoft CorporationInventors: Dmitry Starostin, Joris Claessens
-
Publication number: 20080313699Abstract: Information rights management (IRM) systems enable information to be protected after it has been accessed by or delivered to an authorized individual. For example, this might be to allow an email to be viewed for a limited time by specified individuals but to prevent that email from being forwarded. However, existing IRM systems are limited in the situations in which they may operate. An IRM server is provided which communicates with one or more policy evaluators which are independent of the IRM server. Results from the different policy evaluators may be combined by the IRM server and one or more identity providers may be used in conjunction with each policy evaluator. By enabling the IRM server to act as a broker between authors, recipients and policy evaluators situations in which IRM systems may operate are greatly extended.Type: ApplicationFiled: June 13, 2007Publication date: December 18, 2008Applicant: Microsoft CorporationInventors: Dmitry V. Starostin, Joris Claessens, Alexey Orlov
-
Publication number: 20080002696Abstract: A scoped federation is described which is referenced by a unique identifier and messages relating to the federation include this unique identifier. The federation is scoped by rules which are stored associated with the unique identifier and upon receipt of a request containing the unique identifier, the related rules are checked to determine if the request is valid.Type: ApplicationFiled: June 29, 2006Publication date: January 3, 2008Applicant: Microsoft CorporationInventors: Joris Claessens, Christian Geuer-Pollman, Laurent Bussard