Patents by Inventor Mark Steven Manasse

Mark Steven Manasse has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7581156
    Abstract: Systems and methods for constructing Reed-Solomon encoding matrices are provided that are simpler and more regular than existing techniques, and which allow for the coding to be applied to more data disks than previous techniques. More particularly, systems and methods for simplifying the construction of Reed-Solomon based erasure codes, or coding matrices, over GF(2^n) in connection with circumstances wherein the number of errors to be corrected is less than or equal to three are provided.
    Type: Grant
    Filed: December 16, 2002
    Date of Patent: August 25, 2009
    Assignee: MIcrosoft Corporation
    Inventor: Mark Steven Manasse
  • Patent number: 7542431
    Abstract: Nodal pattern configuration is described, including generating successive values at a source node, processing the successive values using a plurality of intermediate nodes, sending the processed values from a node in the plurality of intermediate nodes to a destination node, and configuring the plurality of intermediate nodes such that each node of the plurality of intermediate nodes, concurrently performs at least two actions. Also, nodal pattern configuration includes generating a series of data blocks at a source node, processing data blocks from the series of data blocks using a plurality of intermediate nodes in data communication with the source node, each node of the plurality of intermediate nodes being configured to concurrently perform at least two operations, and sending processed data blocks from the plurality of intermediate nodes to a destination node, the destination node being in data communication with the plurality of intermediate nodes.
    Type: Grant
    Filed: March 31, 2005
    Date of Patent: June 2, 2009
    Assignee: Microsoft Corporation
    Inventors: Mark Steven Manasse, Alice Silverberg, Chandramohan A. Thekkath
  • Publication number: 20090132571
    Abstract: Documents that are near-duplicates may be determined using techniques such as min-hashing. Randomness that is used in these techniques may be based on sequences of bits. The sequences of bits may be generated from a string of bits, with the sequences determined by parsing the string at each occurrence of a particular value, such as the value “1”.
    Type: Application
    Filed: November 16, 2007
    Publication date: May 21, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Mark Steven Manasse, Frank D. McSherry, Kunal Talwar
  • Patent number: 7430091
    Abstract: An implementation of a disk drive with improved efficiency where a read head supported by a first positioning component is provided and a write head supported by a second positioning component is also provided. By positioning the write head behind the read head at a predetermined angle, the disk drive can execute a “read-before-write” or “read-modify-by-XOR-write” operation by before the platter has rotated a full revolution.
    Type: Grant
    Filed: October 21, 2005
    Date of Patent: September 30, 2008
    Assignee: Microsoft Corporation
    Inventor: Mark Steven Manasse
  • Publication number: 20080235201
    Abstract: Techniques are provided that identify near-duplicate items in large collections of items. A list of (value, frequency) pairs is received, and a sample (value, instance) is returned. The value is chosen from the values of the first list, and the instance is a value less than frequency, in such a way that the probability of selecting the same sample from two lists is equal to the similarity of the two lists.
    Type: Application
    Filed: March 22, 2007
    Publication date: September 25, 2008
    Applicant: Microsoft Corporation
    Inventors: Frank D. McSherry, Kunal Talwar, Mark Steven Manasse
  • Patent number: 7421733
    Abstract: When a user successfully logs into an account, the user is provided with a first-class login token, which entitles the user to one or more unsuccessful login attempts without experiencing delays the user would otherwise experience. If attempts with a second-class login token or an expired first-class login token is impermissible, a subsequent login attempt is subject to delays the user would otherwise not experience. The delays minimize the effectiveness of dictionary attacks. Additionally, if the user attempts to login without a login token or an invalid login token, the login attempt is impermissible and the user is provided with a second-class login token for use in a delayed, subsequent login attempt.
    Type: Grant
    Filed: February 6, 2002
    Date of Patent: September 2, 2008
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Steven Charles Glassman, Mark Steven Manasse
  • Publication number: 20080133536
    Abstract: The present invention extends to methods, systems, and computer program products for scalable differential compression for network data. Network data exchanged between Wide Area Network (“WAN”) acceleration devices is cached at physical recordable-type computer-readable media having (potentially significantly) larger storage capacities than available system memory. The cached network data is indexed through features taken from a subset of the cached data (e.g., per segment) to reduce overhead associated with searching for cached network data to use for subsequent compression. When a feature match is detected between received and cached network data, the cached network data can be loaded from the physical recordable-type computer-readable media into system memory to facilitate data compression between Wide Area Network (“WAN”) acceleration devices more efficiently.
    Type: Application
    Filed: December 1, 2006
    Publication date: June 5, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Nikolaj Skallerud Bjorner, Mark Steven Manasse, Guilherme Issao Camarinha Fujiwara
  • Patent number: 7149801
    Abstract: A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. Such abuse may be discouraged by introducing an artificial cost in the form of a moderately expensive computation. Thus, the sender of an e-mail might be required to pay by computing for a few seconds before the e-mail is accepted. Unfortunately, because of sharp disparities across computer systems, this approach may be ineffective against malicious users with high-end systems, prohibitively slow for legitimate users with low-end systems, or both. Starting from this observation, we identify moderately hard, memory bound functions that most recent computer systems will evaluate at about the same speed, and we explain how to use them for protecting against abuses.
    Type: Grant
    Filed: November 8, 2002
    Date of Patent: December 12, 2006
    Assignee: Microsoft Corporation
    Inventors: Michael Burrows, Martin Abadi, Mark Steven Manasse, Edward P. Wobber, Daniel Ron Simon
  • Publication number: 20040117718
    Abstract: Systems and methods for constructing Reed-Solomon encoding matrices are provided that are simpler and more regular than existing techniques, and which allow for the coding to be applied to more data disks than previous techniques. More particularly, systems and methods for simplifying the construction of Reed-Solomon based erasure codes, or coding matrices, over GF(2{circumflex over ( )}n) in connection with circumstances wherein the number of errors to be corrected is less than or equal to three are provided.
    Type: Application
    Filed: December 16, 2002
    Publication date: June 17, 2004
    Applicant: Microsoft Corporation
    Inventor: Mark Steven Manasse
  • Publication number: 20040093371
    Abstract: A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. Such abuse may be discouraged by introducing an artificial cost in the form of a moderately expensive computation. Thus, the sender of an e-mail might be required to pay by computing for a few seconds before the e-mail is accepted. Unfortunately, because of sharp disparities across computer systems, this approach may be ineffective against malicious users with high-end systems, prohibitively slow for legitimate users with low-end systems, or both. Starting from this observation, we identify moderately hard, memory bound functions that most recent computer systems will evaluate at about the same speed, and we explain how to use them for protecting against abuses.
    Type: Application
    Filed: November 8, 2002
    Publication date: May 13, 2004
    Applicant: Microsoft Corporation.
    Inventors: Michael Burrows, Martin Abadi, Mark Steven Manasse, Edward P. Wobber, Daniel Ron Simon
  • Publication number: 20030149900
    Abstract: When a user successfully logs into an account, the user is provided with a first-class login token, which entitles the user to one or more unsuccessful login attempts without experiencing delays the user would otherwise experience. If attempts with a second-class login token or an expired first-class login token is impermissible, a subsequent login attempt is subject to delays the user would otherwise not experience. The delays minimize the effectiveness of dictionary attacks. Additionally, if the user attempts to login without a login token or an invalid login token, the login attempt is impermissible and the user is provided with a second-class login token for use in a delayed, subsequent login attempt.
    Type: Application
    Filed: February 6, 2002
    Publication date: August 7, 2003
    Inventors: Steven Charles Glassman, Mark Steven Manasse
  • Patent number: 6269362
    Abstract: Provided is a computerized method for monitoring the content of documents. A set of documents is stored in memories of server computers. The server computers can be connected to each other by a network such as the Internet. Entries are generated in a search engine for each document of the set. The search engine is also connected to the Internet. The entries are in the form of a full word index of the set of documents. The search engine also maintains a first abstract for each document that is indexed. The abstract is highly dependent on the content of each document. For example, the abstract is in the form of a sketch or a feature vector. Periodically a query is submitted to the search engine. The query locates a result set of documents that satisfy the query. A second abstract is generated for each document member of the result set. The first and second abstracts are compared to identify documents that have changed between the time the set of documents were indexed and the time the result set is generated.
    Type: Grant
    Filed: December 19, 1997
    Date of Patent: July 31, 2001
    Assignee: Alta Vista Company
    Inventors: Andrei Zary Broder, Steven Charles Glassman, Mark Steven Manasse