Patents by Inventor Mark Steven Manasse

Mark Steven Manasse has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11947691
    Abstract: Embodiments of the present disclosure provide systems and methods for managing access rights for a copy of an original digital document. The method performed by a server system includes receiving a request for generating a copy of an original document. The method includes performing an authorization of the request for generating the copy of the original document based on the access rights associated with the original document. Further, the method includes generating a copy document of the original document upon successful authorization. The method includes determining the access rights defined for the copy document in the original document. The method further includes transmitting the access rights to the copy document. The method includes sending the copy document with the access rights. The access rights set on the copy document facilitate the user to perform document-related operations on the copy document.
    Type: Grant
    Filed: June 4, 2021
    Date of Patent: April 2, 2024
    Assignee: I2CHAIN, INC.
    Inventors: Mark Steven Manasse, Sanjay Jain, Ajay Jotwani, Dave Swan
  • Patent number: 11374912
    Abstract: Methods and systems for performing exchange of data with third-party applications are described. The method includes receiving a request for performing document related operation on document using a third-party application. The method includes converting third-party application into containerized application using containerization mechanism. The method includes allocating virtual secured space to containerized application. The method includes encrypting document using public key of containerized application. The method includes providing encrypted document to containerized application that implements limitations on encrypted document. The method includes facilitating performance of document related operation on encrypted document to create updated document. The encrypted document is decrypted using private key of containerized application before performing document related operation on encrypted document.
    Type: Grant
    Filed: December 7, 2020
    Date of Patent: June 28, 2022
    Assignee: I2CHAIN, INC.
    Inventors: Mark Steven Manasse, Sanjay Jain, Ravi Jotwani, Ajay Jotwani
  • Patent number: 11343094
    Abstract: Methods and systems for encrypting shared information through its life cycle are described. The method includes receiving and storing a document. The method further includes encrypting document using a primary key. Further, the method includes receiving sharing request from current user of document for sharing document with a next user. The method includes, for each time the document is to be shared with next user in a series, generating a key for next user specified in sharing request. The method further includes encrypting document for next user using key generated for corresponding next user. Furthermore, the method includes binding access rights to document for authorizing request to access document by next user. The method includes sharing encrypted document with next user. Thereafter, the method includes receiving a request to access the document from the next user and providing the access to encrypted document meant for next user to next user.
    Type: Grant
    Filed: July 17, 2020
    Date of Patent: May 24, 2022
    Assignee: I2Chain, Inc.
    Inventors: Mark Steven Manasse, Sanjay Jain, Ajay Jotwani
  • Publication number: 20220116404
    Abstract: Methods and systems for adaptive multi-factored geo-location based access rights management and enforcement for accessing location restricted data services are described. The method performed by server system includes receiving request to access a data service from a user device associated with a user. The method includes accessing geo-location information associated with the user upon receipt of request. The geo-location information includes geo-location data associated with the user device. The method includes generating geo-location signature associated with the user device, based on the geo-location information. The geo-location signature includes a plurality of location context identifiers. The method includes validating the user device when the geo-location signature and a geo-fence of the data service meet a matching threshold condition and transmitting a response message to the user device based on the validating step.
    Type: Application
    Filed: March 22, 2021
    Publication date: April 14, 2022
    Inventors: Mark Steven MANASSE, Sanjay JAIN, Ajay JOTWANI, Ananya JAIN, Patricia BOLTON, Ravi JOTWANI
  • Publication number: 20210383008
    Abstract: Methods and systems for altering access rights set on a digital document, based on the triggering temporal events are described. The method performed by server system includes accessing access rights information associated with a digital document stored by the publisher in a database. The access rights information includes one or more access rights set on the digital document and access rights alteration rules. The method includes restricting access to the digital document for one or more recipients in response to receiving access requests from one or more recipients based, at least in part, on one or more access rights. The method includes monitoring occurrences of a plurality of the triggering temporal events based, at least in part, on a machine learning (ML) model. The method further includes altering one or more access rights set on the digital document based, at least in part, on the access rights alteration rules.
    Type: Application
    Filed: June 4, 2021
    Publication date: December 9, 2021
    Inventors: Mark Steven MANASSE, Sanjay JAIN, Ajay JOTWANI
  • Publication number: 20210383004
    Abstract: Embodiments of the present disclosure provide systems and methods for managing access rights for a copy of an original digital document. The method performed by a server system includes receiving a request for generating a copy of an original document. The method includes performing an authorization of the request for generating the copy of the original document based on the access rights associated with the original document. Further, the method includes generating a copy document of the original document upon successful authorization. The method includes determining the access rights defined for the copy document in the original document. The method further includes transmitting the access rights to the copy document. The method includes sending the copy document with the access rights. The access rights set on the copy document facilitate the user to perform document-related operations on the copy document.
    Type: Application
    Filed: June 4, 2021
    Publication date: December 9, 2021
    Inventors: Mark Steven MANASSE, Sanjay JAIN, Ajay JOTWANI, Dave SWAN
  • Publication number: 20210218719
    Abstract: Methods and systems for performing exchange of data with third-party applications are described. The method includes receiving a request for performing document related operation on document using a third-party application. The method includes converting third-party application into containerized application using containerization mechanism. The method includes allocating virtual secured space to containerized application. The method includes encrypting document using public key of containerized application. The method includes providing encrypted document to containerized application that implements limitations on encrypted document. The method includes facilitating performance of document related operation on encrypted document to create updated document. The encrypted document is decrypted using private key of containerized application before performing document related operation on encrypted document.
    Type: Application
    Filed: December 7, 2020
    Publication date: July 15, 2021
    Inventors: Mark Steven MANASSE, Sanjay JAIN, Ravi JOTWANI, Ajay JOTWANI
  • Publication number: 20210218570
    Abstract: Methods and systems for encrypting shared information through its life cycle are described. The method includes receiving and storing a document. The method further includes encrypting document using a primary key. Further, the method includes receiving sharing request from current user of document for sharing document with a next user. The method includes, for each time the document is to be shared with next user in a series, generating a key for next user specified in sharing request. The method further includes encrypting document for next user using key generated for corresponding next user. Furthermore, the method includes binding access rights to document for authorizing request to access document by next user. The method includes sharing encrypted document with next user. Thereafter, the method includes receiving a request to access the document from the next user and providing the access to encrypted document meant for next user to next user.
    Type: Application
    Filed: July 17, 2020
    Publication date: July 15, 2021
    Inventors: Mark Steven MANASSE, Sanjay JAIN, Ajay JOTWANI
  • Patent number: 9875810
    Abstract: A memory region can durably self-identify as being faulty when read. Information that would have been assigned to the faulty memory region can be assigned to another of that sized region in memory using a replacement encoding technique. For phase change memory, at least two fault states can be provided for durably self-identifying a faulty memory region; one state at a highest resistance range and the other state at a lowest resistance range. Replacement cells can be used to shift or assign data when a self-identifying memory fault is present. A memory controller and memory module, alone or in combination may manage replacement cell use and facilitate driving a newly discovered faulty cell to a fault state if the faulty cell is not already at the fault state.
    Type: Grant
    Filed: July 24, 2013
    Date of Patent: January 23, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: John D. Davis, Karin Strauss, Mark Steven Manasse, Parikshit S. Gopalan, Sergey Yekhanin
  • Patent number: 9442799
    Abstract: A memory controller can include an error correction module for extended lifetime memory that tracks at least one sized block of non-fault consecutive bits within the disabled page as spare blocks and reuses the spare blocks from the disabled pages as an error correction resource for active blocks. The active blocks can store data, data and metadata, or metadata only (e.g., error correction metadata). A method for extended lifetime memory can include, for an active block of metadata containing at least one fault, using at least one spare block to correct the data of the active block. For an active block of data containing at least one fault, the data can be initially corrected via XOR correction with a first spare block and then ultimately corrected via XOR correction with a second spare block.
    Type: Grant
    Filed: June 26, 2014
    Date of Patent: September 13, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mark Steven Manasse, Sergey Yekhanin, Parikshit S. Gopalan, Karin Strauss, John D. Davis
  • Publication number: 20150378821
    Abstract: A memory controller can include an error correction module for extended lifetime memory that tracks at least one sized block of non-fault consecutive bits within the disabled page as spare blocks and reuses the spare blocks from the disabled pages as an error correction resource for active blocks. The active blocks can store data, data and metadata, or metadata only (e.g., error correction metadata). A method for extended lifetime memory can include, for an active block of metadata containing at least one fault, using at least one spare block to correct the data of the active block. For an active block of data containing at least one fault, the data can be initially corrected via XOR correction with a first spare block and then ultimately corrected via XOR correction with a second spare block.
    Type: Application
    Filed: June 26, 2014
    Publication date: December 31, 2015
    Inventors: Mark Steven Manasse, Sergey Yekhanin, Parikshit S. Gopalan, Karin Strauss, John D. Davis
  • Publication number: 20150033064
    Abstract: A memory region can durably self-identify as being faulty when read. Information that would have been assigned to the faulty memory region can be assigned to another of that sized region in memory using a replacement encoding technique. For phase change memory, at least two fault states can be provided for durably self-identifying a faulty memory region; one state at a highest resistance range and the other state at a lowest resistance range. Replacement cells can be used to shift or assign data when a self-identifying memory fault is present. A memory controller and memory module, alone or in combination may manage replacement cell use and facilitate driving a newly discovered faulty cell to a fault state if the faulty cell is not already at the fault state.
    Type: Application
    Filed: July 24, 2013
    Publication date: January 29, 2015
    Applicant: Microsoft Corporation
    Inventors: John D. Davis, Karin Strauss, Mark Steven Manasse, Parikshit S. Gopalan, Sergey Yekhanin
  • Publication number: 20140244604
    Abstract: The subject disclosure is directed towards predicting compressibility of a data block, and using the predicted compressibility in determining whether a data block if compressed will be sufficiently compressible to justify compression. In one aspect, data of the data block is processed to obtain an entropy estimate of the data block, e.g., based upon distinct value estimation. The compressibility prediction may be used in conjunction with a chunking mechanism of a data deduplication system.
    Type: Application
    Filed: February 28, 2013
    Publication date: August 28, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Paul Adrian Oltean, Cosmin A. Rusu, Arnd Christian König, Mark Steven Manasse, Jin Li, Sudipta Sengupta, Sanjeev Mehrotra
  • Patent number: 7962510
    Abstract: Evaluating content includes receiving content, analyzing the content for web spam using a content-based identification technique, and classifying the content according to the analysis. An index of analyzed contents may be created. A system for evaluating content includes a storage device configured to store data and a processor configured to analyze content for web spam using content-based identification techniques.
    Type: Grant
    Filed: February 11, 2005
    Date of Patent: June 14, 2011
    Assignee: Microsoft Corporation
    Inventors: Marc Alexander Najork, Dennis Craig Fetterly, Mark Steven Manasse, Alexandros Ntoulas
  • Patent number: 7730058
    Abstract: A probabilistic detector is utilized to query a database. Utilization of a probabilistic detector provides assurance with 100 per cent probability that a search expression in the query is not in the database index. The probabilistic detector is implemented in the form of a Bloom filter. The probabilistic detector is created by hashing expressions in the database index and mapping the resulting hash values into the probabilistic detector. Upon receiving a query, expressions of the query are hashed. The probabilistic detector is queried using these hash values. If the results of querying the probabilistic detector indicate that searched for information may be in the database, the database is not queried. If the results of querying the probabilistic detector indicate that the information may be in the database, the database is queried for the information using the original query. This technique is advantageous in mitigating detrimental effects of denial of service attacks.
    Type: Grant
    Filed: October 5, 2005
    Date of Patent: June 1, 2010
    Assignee: Microsoft Corporation
    Inventors: Gaurav Sareen, Mark Steven Manasse, Martin Abadi, Michael A. Isard
  • Patent number: 7716250
    Abstract: High throughput in data computations and processing is maintained while minimizing latency. A binary tree architecture is provided in which two trees are used simultaneously, and initiation of the trees is staggered to allow for optimal use of bandwidth. These techniques are desirable for erasure codes and other computations where the addition operator is commutative. Additionally, a ternary tree architecture may be used, in which three trees co-exist on the same set of nodes to maintain high throughput while further improving latency.
    Type: Grant
    Filed: May 27, 2005
    Date of Patent: May 11, 2010
    Assignee: Microsoft Corporation
    Inventors: Mark Steven Manasse, Alice Silverberg, Chandramohan A Thekkath
  • Patent number: 7716144
    Abstract: Techniques are provided that identify near-duplicate items in large collections of items. A list of (value, frequency) pairs is received, and a sample (value, instance) is returned. The value is chosen from the values of the first list, and the instance is a value less than frequency, in such a way that the probability of selecting the same sample from two lists is equal to the similarity of the two lists.
    Type: Grant
    Filed: March 22, 2007
    Date of Patent: May 11, 2010
    Assignee: Microsoft Corporation
    Inventors: Frank D. McSherry, Kunal Talwar, Mark Steven Manasse
  • Publication number: 20100070511
    Abstract: Documents that are near-duplicates may be determined using techniques involving consistent uniform hashing. A biased bit may be placed in the leading position of a sequence of bits that may be generated and subsequently used in comparison techniques to determine near-duplicate documents. Unbiased bits may be used in subsequent positions of the sequence of bits, after the biased bit, for use in comparison techniques. Samples may be used collectively, as opposed to individually, in the generation of biased bits. Sequences of bits may thus be produced not on a single sample basis, but for multiple samples, thereby amortizing the cost of generating randomness for the samples. Less than one bit of randomness per sample may be used.
    Type: Application
    Filed: September 17, 2008
    Publication date: March 18, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Mark Steven Manasse, Frank D. McSherry, Kunal Talwar
  • Patent number: 7664927
    Abstract: Hash tables comprising load factors of up to and above 97% are disclosed. The hash tables may be associated with three or more hash functions, each hash function being applied to a key to identify a location in a hash table. The load factor of a hash table may be increased, obviating any need to increase the size of the hash table to accommodate more insertions. Such increase in load factor may be accomplished by a combination of increasing the number of cells per bucket in a hash table and increasing the number of hash functions associated with the hash table.
    Type: Grant
    Filed: March 29, 2006
    Date of Patent: February 16, 2010
    Assignee: Microsoft Corporation
    Inventors: Ulfar Erlingsson, Mark Steven Manasse, Frank D. McSherry, Abraham D. Flaxman
  • Patent number: 7640354
    Abstract: The present invention extends to methods, systems, and computer program products for scalable differential compression for network data. Network data exchanged between Wide Area Network (“WAN”) acceleration devices is cached at physical recordable-type computer-readable media having (potentially significantly) larger storage capacities than available system memory. The cached network data is indexed through features taken from a subset of the cached data (e.g., per segment) to reduce overhead associated with searching for cached network data to use for subsequent compression. When a feature match is detected between received and cached network data, the cached network data can be loaded from the physical recordable-type computer-readable media into system memory to facilitate data compression between Wide Area Network (“WAN”) acceleration devices more efficiently.
    Type: Grant
    Filed: December 1, 2006
    Date of Patent: December 29, 2009
    Assignee: Microsoft Corporation
    Inventors: Nikolaj Skallerud Bjorner, Mark Steven Manasse, Guilherme Issao Camarinha Fujiwara