Patents by Inventor Mark Steven Manasse
Mark Steven Manasse has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11947691Abstract: Embodiments of the present disclosure provide systems and methods for managing access rights for a copy of an original digital document. The method performed by a server system includes receiving a request for generating a copy of an original document. The method includes performing an authorization of the request for generating the copy of the original document based on the access rights associated with the original document. Further, the method includes generating a copy document of the original document upon successful authorization. The method includes determining the access rights defined for the copy document in the original document. The method further includes transmitting the access rights to the copy document. The method includes sending the copy document with the access rights. The access rights set on the copy document facilitate the user to perform document-related operations on the copy document.Type: GrantFiled: June 4, 2021Date of Patent: April 2, 2024Assignee: I2CHAIN, INC.Inventors: Mark Steven Manasse, Sanjay Jain, Ajay Jotwani, Dave Swan
-
Patent number: 11374912Abstract: Methods and systems for performing exchange of data with third-party applications are described. The method includes receiving a request for performing document related operation on document using a third-party application. The method includes converting third-party application into containerized application using containerization mechanism. The method includes allocating virtual secured space to containerized application. The method includes encrypting document using public key of containerized application. The method includes providing encrypted document to containerized application that implements limitations on encrypted document. The method includes facilitating performance of document related operation on encrypted document to create updated document. The encrypted document is decrypted using private key of containerized application before performing document related operation on encrypted document.Type: GrantFiled: December 7, 2020Date of Patent: June 28, 2022Assignee: I2CHAIN, INC.Inventors: Mark Steven Manasse, Sanjay Jain, Ravi Jotwani, Ajay Jotwani
-
Patent number: 11343094Abstract: Methods and systems for encrypting shared information through its life cycle are described. The method includes receiving and storing a document. The method further includes encrypting document using a primary key. Further, the method includes receiving sharing request from current user of document for sharing document with a next user. The method includes, for each time the document is to be shared with next user in a series, generating a key for next user specified in sharing request. The method further includes encrypting document for next user using key generated for corresponding next user. Furthermore, the method includes binding access rights to document for authorizing request to access document by next user. The method includes sharing encrypted document with next user. Thereafter, the method includes receiving a request to access the document from the next user and providing the access to encrypted document meant for next user to next user.Type: GrantFiled: July 17, 2020Date of Patent: May 24, 2022Assignee: I2Chain, Inc.Inventors: Mark Steven Manasse, Sanjay Jain, Ajay Jotwani
-
Publication number: 20220116404Abstract: Methods and systems for adaptive multi-factored geo-location based access rights management and enforcement for accessing location restricted data services are described. The method performed by server system includes receiving request to access a data service from a user device associated with a user. The method includes accessing geo-location information associated with the user upon receipt of request. The geo-location information includes geo-location data associated with the user device. The method includes generating geo-location signature associated with the user device, based on the geo-location information. The geo-location signature includes a plurality of location context identifiers. The method includes validating the user device when the geo-location signature and a geo-fence of the data service meet a matching threshold condition and transmitting a response message to the user device based on the validating step.Type: ApplicationFiled: March 22, 2021Publication date: April 14, 2022Inventors: Mark Steven MANASSE, Sanjay JAIN, Ajay JOTWANI, Ananya JAIN, Patricia BOLTON, Ravi JOTWANI
-
Publication number: 20210383008Abstract: Methods and systems for altering access rights set on a digital document, based on the triggering temporal events are described. The method performed by server system includes accessing access rights information associated with a digital document stored by the publisher in a database. The access rights information includes one or more access rights set on the digital document and access rights alteration rules. The method includes restricting access to the digital document for one or more recipients in response to receiving access requests from one or more recipients based, at least in part, on one or more access rights. The method includes monitoring occurrences of a plurality of the triggering temporal events based, at least in part, on a machine learning (ML) model. The method further includes altering one or more access rights set on the digital document based, at least in part, on the access rights alteration rules.Type: ApplicationFiled: June 4, 2021Publication date: December 9, 2021Inventors: Mark Steven MANASSE, Sanjay JAIN, Ajay JOTWANI
-
Publication number: 20210383004Abstract: Embodiments of the present disclosure provide systems and methods for managing access rights for a copy of an original digital document. The method performed by a server system includes receiving a request for generating a copy of an original document. The method includes performing an authorization of the request for generating the copy of the original document based on the access rights associated with the original document. Further, the method includes generating a copy document of the original document upon successful authorization. The method includes determining the access rights defined for the copy document in the original document. The method further includes transmitting the access rights to the copy document. The method includes sending the copy document with the access rights. The access rights set on the copy document facilitate the user to perform document-related operations on the copy document.Type: ApplicationFiled: June 4, 2021Publication date: December 9, 2021Inventors: Mark Steven MANASSE, Sanjay JAIN, Ajay JOTWANI, Dave SWAN
-
Publication number: 20210218719Abstract: Methods and systems for performing exchange of data with third-party applications are described. The method includes receiving a request for performing document related operation on document using a third-party application. The method includes converting third-party application into containerized application using containerization mechanism. The method includes allocating virtual secured space to containerized application. The method includes encrypting document using public key of containerized application. The method includes providing encrypted document to containerized application that implements limitations on encrypted document. The method includes facilitating performance of document related operation on encrypted document to create updated document. The encrypted document is decrypted using private key of containerized application before performing document related operation on encrypted document.Type: ApplicationFiled: December 7, 2020Publication date: July 15, 2021Inventors: Mark Steven MANASSE, Sanjay JAIN, Ravi JOTWANI, Ajay JOTWANI
-
Publication number: 20210218570Abstract: Methods and systems for encrypting shared information through its life cycle are described. The method includes receiving and storing a document. The method further includes encrypting document using a primary key. Further, the method includes receiving sharing request from current user of document for sharing document with a next user. The method includes, for each time the document is to be shared with next user in a series, generating a key for next user specified in sharing request. The method further includes encrypting document for next user using key generated for corresponding next user. Furthermore, the method includes binding access rights to document for authorizing request to access document by next user. The method includes sharing encrypted document with next user. Thereafter, the method includes receiving a request to access the document from the next user and providing the access to encrypted document meant for next user to next user.Type: ApplicationFiled: July 17, 2020Publication date: July 15, 2021Inventors: Mark Steven MANASSE, Sanjay JAIN, Ajay JOTWANI
-
Patent number: 9875810Abstract: A memory region can durably self-identify as being faulty when read. Information that would have been assigned to the faulty memory region can be assigned to another of that sized region in memory using a replacement encoding technique. For phase change memory, at least two fault states can be provided for durably self-identifying a faulty memory region; one state at a highest resistance range and the other state at a lowest resistance range. Replacement cells can be used to shift or assign data when a self-identifying memory fault is present. A memory controller and memory module, alone or in combination may manage replacement cell use and facilitate driving a newly discovered faulty cell to a fault state if the faulty cell is not already at the fault state.Type: GrantFiled: July 24, 2013Date of Patent: January 23, 2018Assignee: Microsoft Technology Licensing, LLCInventors: John D. Davis, Karin Strauss, Mark Steven Manasse, Parikshit S. Gopalan, Sergey Yekhanin
-
Patent number: 9442799Abstract: A memory controller can include an error correction module for extended lifetime memory that tracks at least one sized block of non-fault consecutive bits within the disabled page as spare blocks and reuses the spare blocks from the disabled pages as an error correction resource for active blocks. The active blocks can store data, data and metadata, or metadata only (e.g., error correction metadata). A method for extended lifetime memory can include, for an active block of metadata containing at least one fault, using at least one spare block to correct the data of the active block. For an active block of data containing at least one fault, the data can be initially corrected via XOR correction with a first spare block and then ultimately corrected via XOR correction with a second spare block.Type: GrantFiled: June 26, 2014Date of Patent: September 13, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Mark Steven Manasse, Sergey Yekhanin, Parikshit S. Gopalan, Karin Strauss, John D. Davis
-
Publication number: 20150378821Abstract: A memory controller can include an error correction module for extended lifetime memory that tracks at least one sized block of non-fault consecutive bits within the disabled page as spare blocks and reuses the spare blocks from the disabled pages as an error correction resource for active blocks. The active blocks can store data, data and metadata, or metadata only (e.g., error correction metadata). A method for extended lifetime memory can include, for an active block of metadata containing at least one fault, using at least one spare block to correct the data of the active block. For an active block of data containing at least one fault, the data can be initially corrected via XOR correction with a first spare block and then ultimately corrected via XOR correction with a second spare block.Type: ApplicationFiled: June 26, 2014Publication date: December 31, 2015Inventors: Mark Steven Manasse, Sergey Yekhanin, Parikshit S. Gopalan, Karin Strauss, John D. Davis
-
Publication number: 20150033064Abstract: A memory region can durably self-identify as being faulty when read. Information that would have been assigned to the faulty memory region can be assigned to another of that sized region in memory using a replacement encoding technique. For phase change memory, at least two fault states can be provided for durably self-identifying a faulty memory region; one state at a highest resistance range and the other state at a lowest resistance range. Replacement cells can be used to shift or assign data when a self-identifying memory fault is present. A memory controller and memory module, alone or in combination may manage replacement cell use and facilitate driving a newly discovered faulty cell to a fault state if the faulty cell is not already at the fault state.Type: ApplicationFiled: July 24, 2013Publication date: January 29, 2015Applicant: Microsoft CorporationInventors: John D. Davis, Karin Strauss, Mark Steven Manasse, Parikshit S. Gopalan, Sergey Yekhanin
-
Publication number: 20140244604Abstract: The subject disclosure is directed towards predicting compressibility of a data block, and using the predicted compressibility in determining whether a data block if compressed will be sufficiently compressible to justify compression. In one aspect, data of the data block is processed to obtain an entropy estimate of the data block, e.g., based upon distinct value estimation. The compressibility prediction may be used in conjunction with a chunking mechanism of a data deduplication system.Type: ApplicationFiled: February 28, 2013Publication date: August 28, 2014Applicant: MICROSOFT CORPORATIONInventors: Paul Adrian Oltean, Cosmin A. Rusu, Arnd Christian König, Mark Steven Manasse, Jin Li, Sudipta Sengupta, Sanjeev Mehrotra
-
Patent number: 7962510Abstract: Evaluating content includes receiving content, analyzing the content for web spam using a content-based identification technique, and classifying the content according to the analysis. An index of analyzed contents may be created. A system for evaluating content includes a storage device configured to store data and a processor configured to analyze content for web spam using content-based identification techniques.Type: GrantFiled: February 11, 2005Date of Patent: June 14, 2011Assignee: Microsoft CorporationInventors: Marc Alexander Najork, Dennis Craig Fetterly, Mark Steven Manasse, Alexandros Ntoulas
-
Patent number: 7730058Abstract: A probabilistic detector is utilized to query a database. Utilization of a probabilistic detector provides assurance with 100 per cent probability that a search expression in the query is not in the database index. The probabilistic detector is implemented in the form of a Bloom filter. The probabilistic detector is created by hashing expressions in the database index and mapping the resulting hash values into the probabilistic detector. Upon receiving a query, expressions of the query are hashed. The probabilistic detector is queried using these hash values. If the results of querying the probabilistic detector indicate that searched for information may be in the database, the database is not queried. If the results of querying the probabilistic detector indicate that the information may be in the database, the database is queried for the information using the original query. This technique is advantageous in mitigating detrimental effects of denial of service attacks.Type: GrantFiled: October 5, 2005Date of Patent: June 1, 2010Assignee: Microsoft CorporationInventors: Gaurav Sareen, Mark Steven Manasse, Martin Abadi, Michael A. Isard
-
Patent number: 7716250Abstract: High throughput in data computations and processing is maintained while minimizing latency. A binary tree architecture is provided in which two trees are used simultaneously, and initiation of the trees is staggered to allow for optimal use of bandwidth. These techniques are desirable for erasure codes and other computations where the addition operator is commutative. Additionally, a ternary tree architecture may be used, in which three trees co-exist on the same set of nodes to maintain high throughput while further improving latency.Type: GrantFiled: May 27, 2005Date of Patent: May 11, 2010Assignee: Microsoft CorporationInventors: Mark Steven Manasse, Alice Silverberg, Chandramohan A Thekkath
-
Patent number: 7716144Abstract: Techniques are provided that identify near-duplicate items in large collections of items. A list of (value, frequency) pairs is received, and a sample (value, instance) is returned. The value is chosen from the values of the first list, and the instance is a value less than frequency, in such a way that the probability of selecting the same sample from two lists is equal to the similarity of the two lists.Type: GrantFiled: March 22, 2007Date of Patent: May 11, 2010Assignee: Microsoft CorporationInventors: Frank D. McSherry, Kunal Talwar, Mark Steven Manasse
-
Publication number: 20100070511Abstract: Documents that are near-duplicates may be determined using techniques involving consistent uniform hashing. A biased bit may be placed in the leading position of a sequence of bits that may be generated and subsequently used in comparison techniques to determine near-duplicate documents. Unbiased bits may be used in subsequent positions of the sequence of bits, after the biased bit, for use in comparison techniques. Samples may be used collectively, as opposed to individually, in the generation of biased bits. Sequences of bits may thus be produced not on a single sample basis, but for multiple samples, thereby amortizing the cost of generating randomness for the samples. Less than one bit of randomness per sample may be used.Type: ApplicationFiled: September 17, 2008Publication date: March 18, 2010Applicant: MICROSOFT CORPORATIONInventors: Mark Steven Manasse, Frank D. McSherry, Kunal Talwar
-
Patent number: 7664927Abstract: Hash tables comprising load factors of up to and above 97% are disclosed. The hash tables may be associated with three or more hash functions, each hash function being applied to a key to identify a location in a hash table. The load factor of a hash table may be increased, obviating any need to increase the size of the hash table to accommodate more insertions. Such increase in load factor may be accomplished by a combination of increasing the number of cells per bucket in a hash table and increasing the number of hash functions associated with the hash table.Type: GrantFiled: March 29, 2006Date of Patent: February 16, 2010Assignee: Microsoft CorporationInventors: Ulfar Erlingsson, Mark Steven Manasse, Frank D. McSherry, Abraham D. Flaxman
-
Patent number: 7640354Abstract: The present invention extends to methods, systems, and computer program products for scalable differential compression for network data. Network data exchanged between Wide Area Network (“WAN”) acceleration devices is cached at physical recordable-type computer-readable media having (potentially significantly) larger storage capacities than available system memory. The cached network data is indexed through features taken from a subset of the cached data (e.g., per segment) to reduce overhead associated with searching for cached network data to use for subsequent compression. When a feature match is detected between received and cached network data, the cached network data can be loaded from the physical recordable-type computer-readable media into system memory to facilitate data compression between Wide Area Network (“WAN”) acceleration devices more efficiently.Type: GrantFiled: December 1, 2006Date of Patent: December 29, 2009Assignee: Microsoft CorporationInventors: Nikolaj Skallerud Bjorner, Mark Steven Manasse, Guilherme Issao Camarinha Fujiwara