Patents by Inventor Kevin Andrew Chan
Kevin Andrew Chan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11494505Abstract: Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to access data that is associated with the heightened authentication protocol is received at the cloud-based storage service. The request may include an indication that the application is configured to interact with data with the heightened authentication protocol. The request is authenticated based on the heightened authentication protocol. In response to authenticating the first request, permission is granted to the application to access the data that is associated with the heightened authentication protocol. In response receiving requests that do not include the indication that the application is configured to interact with data with the heightened authentication protocol, data pertaining to the portion of the data with the heightened authentication protocol is hidden.Type: GrantFiled: May 31, 2019Date of Patent: November 8, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Gabriela Kornelia Kaczka, Gregory P. Young
-
Patent number: 11443052Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A first request to cause a portion of the data to be associated with a heightened authentication protocol is received. In response, the portion of the data is caused to require the heightened authentication protocol for access. A second request for a file that is stored in the area that is associated with the heightened authentication protocol is received. The second request is authenticated based on the heightened authentication protocol. In response to authenticating the second request, permission is granted to access the file. In response to a failure to authenticate the second request, access to the file is denied, while access to files stored in other areas associated with the user account is allowed.Type: GrantFiled: May 31, 2019Date of Patent: September 13, 2022Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Filip C. Lazar, Steven J. Bailey, John D. Rodrigues, Andrew Keith Glover, Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Gregory P. Young, Jacob C. Schieber, Jackson Cowan, Meir E. Abergel
-
Patent number: 11418497Abstract: A system is provided for facilitating access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to receive data that is associated with the heightened authentication protocol is received at the cloud-based storage service. In response to the request, the request is authenticated based on the heightened authentication protocol. In response to authenticating the request, permission is granted for the application to receive the data that is associated with the heightened authentication protocol. In response to a locking of the data that is associated with the heightened authentication protocol, an indication that the data is unavailable is sent to the application.Type: GrantFiled: March 21, 2019Date of Patent: August 16, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Deepak Sreenivas Pemmaraju, Robert C. Turner, Ronakkumar Desai, Patrick Moulhaud
-
Patent number: 11392711Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. A first request is received to access data stored at the cloud-based storage service, the data associated with a user account. The first request is authenticated based on a username and password associated with the user account. A second request is received for a file that is stored in an area associated with a heightened authentication protocol. The heightened authentication protocol is performed to authenticate the second request. In response to authenticating the second request, permission is granted to a temporary strong authentication state. The permission is to access the file that is stored in the area associated with the heightened authentication protocol.Type: GrantFiled: May 31, 2019Date of Patent: July 19, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Jyotsana Rathore, Kevin Andrew Chan, Gabriela Kornelia Kaczka, Deepak Sreenivas Pemmaraju, Robert C. Turner, Gregory P. Young, Jose A. Barreto, Daron Spektor
-
Patent number: 11361095Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. A first request is received to access data stored at the cloud-based storage service, the data associated with a user account. The first request is authenticated based on a username and password associated with the user account. A second request is received for a file that is stored in an area associated with a heightened authentication protocol. The heightened authentication protocol is performed to authenticate the second request. In response to authenticating the second request, permission is granted to a temporary strong authentication state. The permission is to access the file that is stored in the area associated with the heightened authentication protocol.Type: GrantFiled: May 31, 2019Date of Patent: June 14, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Jyotsana Rathore, Kevin Andrew Chan, Gabriela Kornelia Kaczka, Deepak Sreenivas Pemmaraju, Robert C. Turner, Gregory P. Young, Jose A. Barreto, Daron Spektor
-
Patent number: 11132457Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol, a first request receiving, at the cloud-based storage service, for an application to access data that is associated with the heightened authentication protocol. The first request is authenticated based on the heightened authentication protocol. In response to authenticating the first request, permission is granted to the application to access the data that is associated with the heightened authentication protocol. The permission is time-limited. It is determined that the application is editing the data that is associated with the heightened authentication protocol. Permission for the application to access the data while the application is editing the data is temporarily extended.Type: GrantFiled: May 31, 2019Date of Patent: September 28, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Daron Spektor, Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Peter Daniel Henderson, Gabriela Kornelia Kaczka
-
Patent number: 10860373Abstract: Systems, methods, and software technology for governing resource utilization in a computing environment. In an implementation, a governance thread started by a job manager process identifies threads running within the job manager process and associates each of the threads with one of various jobs. The governance thread then tracks a resource utilization level of each of the jobs based on the resource utilization level of each of the threads associated with the job. When the resource utilization level of any of the jobs exceeds a threshold, the governance thread is able to shut down at least one of the threads associated with the job.Type: GrantFiled: October 11, 2016Date of Patent: December 8, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Jahnavi Akella, Kevin Andrew Chan, Shepherd Walker
-
Publication number: 20200302075Abstract: Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to access data that is associated with the heightened authentication protocol is received at the cloud-based storage service. The request may include an indication that the application is configured to interact with data with the heightened authentication protocol. The request is authenticated based on the heightened authentication protocol. In response to authenticating the first request, permission is granted to the application to access the data that is associated with the heightened authentication protocol. In response receiving requests that do not include the indication that the application is configured to interact with data with the heightened authentication protocol, data pertaining to the portion of the data with the heightened authentication protocol is hidden.Type: ApplicationFiled: May 31, 2019Publication date: September 24, 2020Inventors: Jyotsana RATHORE, Jose A. BARRETO, Kevin Andrew CHAN, Gabriela Kornelia KACZKA, Gregory P. YOUNG
-
Publication number: 20200304481Abstract: A system is provided for facilitating access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to receive data that is associated with the heightened authentication protocol is received at the cloud-based storage service. In response to the request, the request is authenticated based on the heightened authentication protocol. In response to authenticating the request, permission is granted for the application to receive the data that is associated with the heightened authentication protocol. In response to a locking of the data that is associated with the heightened authentication protocol, an indication that the data is unavailable is sent to the application.Type: ApplicationFiled: March 21, 2019Publication date: September 24, 2020Inventors: Jyotsana RATHORE, Jose A. BARRETO, Kevin Andrew CHAN, Deepak Sreenivas PEMMARAJU, Robert C. TURNER, Ronakkumar DESAI, Patrick MOULHAUD
-
Publication number: 20200304511Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. A first request is received to access data stored at the cloud-based storage service, the data associated with a user account. The first request is authenticated based on a username and password associated with the user account. A second request is received for a file that is stored in an area associated with a heightened authentication protocol. The heightened authentication protocol is performed to authenticate the second request. In response to authenticating the second request, permission is granted to a temporary strong authentication state. The permission is to access the file that is stored in the area associated with the heightened authentication protocol.Type: ApplicationFiled: May 31, 2019Publication date: September 24, 2020Inventors: Jyotsana RATHORE, Kevin Andrew CHAN, Gabriela Kornelia KACZKA, Deepak Sreenivas PEMMARAJU, Robert C. TURNER, Gregory P. YOUNG, Jose A. BARRETO, Daron SPEKTOR
-
Publication number: 20200304487Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. a first request receiving, at the cloud-based storage service, for an application to access data that is associated with the heightened authentication protocol. The first request is authenticated based on the heightened authentication protocol. In response to authenticating the first request, permission is granted to the application to access the data that is associated with the heightened authentication protocol. The permission is time-limited. It is determined that the application is editing the data that is associated with the heightened authentication protocol. Permission for the application to access the data while the application is editing the data is temporarily extended.Type: ApplicationFiled: May 31, 2019Publication date: September 24, 2020Inventors: Daron SPEKTOR, Jyotsana RATHORE, Jose A. BARRETO, Kevin Andrew CHAN, Peter Daniel HENDERSON, Gabriela Kornelia KACZKA
-
Publication number: 20200304516Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A first request to cause a portion of the data to be associated with a heightened authentication protocol is received. In response, the portion of the data is caused to require the heightened authentication protocol for access. A second request for a file that is stored in the area that is associated with the heightened authentication protocol is received. The second request is authenticated based on the heightened authentication protocol. In response to authenticating the second request, permission is granted to access the file. In response to a failure to authenticate the second request, access to the file is denied, while access to files stored in other areas associated with the user account is allowed.Type: ApplicationFiled: May 31, 2019Publication date: September 24, 2020Inventors: Filip C. LAZAR, Steven J. BAILEY, John D. RODRIGUES, Andrew Keith GLOVER, Jyotsana RATHORE, Jose A. BARRETO, Kevin Andrew CHAN, Gregory P. YOUNG, Jacob C. SCHIEBER, Jackson COWAN, Meir E. ABERGEL
-
Publication number: 20180101407Abstract: Systems, methods, and software technology for governing resource utilization in a computing environment. In an implementation, a governance thread started by a job manager process identifies threads running within the job manager process and associates each of the threads with one of various jobs. The governance thread then tracks a resource utilization level of each of the jobs based on the resource utilization level of each of the threads associated with the job. When the resource utilization level of any of the jobs exceeds a threshold, the governance thread is able to shut down at least one of the threads associated with the job.Type: ApplicationFiled: October 11, 2016Publication date: April 12, 2018Inventors: Jahnavi Akella, Kevin Andrew Chan, Shepherd Walker
-
Patent number: 9020892Abstract: One or more techniques and/or systems are disclosed for efficiently storing metadata of partitioned data (e.g., directed to a specific individual/user). A first subset of data is identified from the set of partitioned data. The first subset of data comprises data that has a high frequency of access, and may be identified, at least in part, by frequency of access metadata that is associated with the data in the set. Metadata, such as discovery information, permissions, version info, etc., that is associated with the data in the first subset can be stored in low latency (e.g., fast) storage, proving more efficient access. Metadata associated with data from the set of partitioned data that is not in the first subset (e.g., that is not accessed frequently) can be stored in higher latency (e.g., slower, less expensive) storage.Type: GrantFiled: July 8, 2011Date of Patent: April 28, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Kevin Andrew Chan, Bruce Wayne Copeland, Aakash Kambuj
-
Publication number: 20130013561Abstract: One or more techniques and/or systems are disclosed for efficiently storing metadata of partitioned data (e.g., directed to a specific individual/user). A first subset of data is identified from the set of partitioned data. The first subset of data comprises data that has a high frequency of access, and may be identified, at least in part, by frequency of access metadata that is associated with the data in the set. Metadata, such as discovery information, permissions, version info, etc., that is associated with the data in the first subset can be stored in low latency (e.g., fast) storage, proving more efficient access. Metadata associated with data from the set of partitioned data that is not in the first subset (e.g., that is not accessed frequently) can be stored in higher latency (e.g., slower, less expensive) storage.Type: ApplicationFiled: July 8, 2011Publication date: January 10, 2013Applicant: Microsoft CorporationInventors: Kevin Andrew Chan, Bruce Wayne Copeland, Aakash Kambuj