Patents by Inventor Mitica Manu
Mitica Manu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10917394Abstract: Operating upon encrypted data with a particular data scope. A base encryption key is established and associated with the particular data scope, and then stored in a base encryption key store. That base encryption key store might be managed by an application or service that stores base encryption keys for multiple data scopes. A proxy encryption key acts as a kind of proxy for the base encryption key. The proxy encryption key may be used for frequent operations on encrypted data within the particular data scope. Thus, the principles described herein act as a frequency amplifier that allows key-based operations upon the particular data scope to be performed at much higher frequencies than otherwise would be possible by operating directly using the base encryption key.Type: GrantFiled: October 31, 2019Date of Patent: February 9, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Mitica Manu, Baskar Sridharan, Raghunath Ramakrishnan, Sriram K. Rajamani, Victor V. Boyko, Pushkar Vijay Chitnis, Shastry M. C. Shankara, Ramarathnam Venkatesan
-
Patent number: 10904231Abstract: Data may be encrypted using a derived block encryption key for each of at least one append blocks of data. A data operation associated with manipulating particular data associated with a user may be received. The particular data may comprise at least one append block of data. In response to the received data operation, for each append block of data of the at least one append block of data, parameters associated with deriving a block encryption key for a given append block of data of the at least one append block of data may be accessed. The parameters may comprise at least a data encryption key associated with the user and a nonce. A block encryption key may be derived for the given append block of data utilizing the parameters. The given append block of data may be encrypted utilizing the block encryption key.Type: GrantFiled: June 8, 2017Date of Patent: January 26, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Baskar Sridharan, Victor V. Boyko, Sriram K. Rajamani, Mitica Manu
-
Publication number: 20200067896Abstract: Operating upon encrypted data with a particular data scope. A base encryption key is established and associated with the particular data scope, and then stored in a base encryption key store. That base encryption key store might be managed by an application or service that stores base encryption keys for multiple data scopes. A proxy encryption key acts as a kind of proxy for the base encryption key. The proxy encryption key may be used for frequent operations on encrypted data within the particular data scope.Type: ApplicationFiled: October 31, 2019Publication date: February 27, 2020Inventors: Mitica Manu, Baskar Sridharan, Raghunath Ramakrishnan, Sriram K. Rajamani, Victor V. Boyko, Pushkar Vijay Chitnis, Shastry M.C. Shankara, Ramarathnam Venkatesan
-
Patent number: 10484352Abstract: Operating upon encrypted data with a particular data scope. A base encryption key is established and associated with the particular data scope, and then stored in a base encryption key store. That base encryption key store might be managed by an application or service that stores base encryption keys for multiple data scopes. A proxy encryption key acts as a kind of proxy for the base encryption key. The proxy encryption key may be used for frequent operations on encrypted data within the particular data scope. Thus, the principles described herein act as a frequency amplifier that allows key-based operations upon the particular data scope to be performed at much higher frequencies than otherwise would be possible by operating directly using the base encryption key.Type: GrantFiled: June 7, 2017Date of Patent: November 19, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Mitica Manu, Baskar Sridharan, Raghunath Ramakrishnan, Sriram K. Rajamani, Victor V. Boyko, Pushkar Vijay Chitnis, Shastry M. C. Shankara, Ramarathnam Venkatesan
-
Publication number: 20180287789Abstract: Data may be encrypted using a derived block encryption key for each of at least one append blocks of data. A data operation associated with manipulating particular data associated with a user may be received. The particular data may comprise at least one append block of data. In response to the received data operation, for each append block of data of the at least one append block of data, parameters associated with deriving a block encryption key for a given append block of data of the at least one append block of data may be accessed. The parameters may comprise at least a data encryption key associated with the user and a nonce. A block encryption key may be derived for the given append block of data utilizing the parameters. The given append block of data may be encrypted utilizing the block encryption key.Type: ApplicationFiled: June 8, 2017Publication date: October 4, 2018Inventors: Baskar SRIDHARAN, Victor V. BOYKO, Sriram K. RAJAMANI, Mitica MANU
-
Publication number: 20180288020Abstract: Operating upon encrypted data with a particular data scope. A base encryption key is established and associated with the particular data scope, and then stored in a base encryption key store. That base encryption key store might be managed by an application or service that stores base encryption keys for multiple data scopes. A proxy encryption key acts as a kind of proxy for the base encryption key. The proxy encryption key may be used for frequent operations on encrypted data within the particular data scope. Thus, the principles described herein act as a frequency amplifier that allows key-based operations upon the particular data scope to be performed at much higher frequencies than otherwise would be possible by operating directly using the base encryption key.Type: ApplicationFiled: June 7, 2017Publication date: October 4, 2018Inventors: Mitica MANU, Baskar SRIDHARAN, Raghunath RAMAKRISHNAN, Sriram K. RAJAMANI, Victor V. BOYKO, Pushkar Vijay CHITNIS, Shastry M.C. SHANKARA, Ramarathnam VENKATESAN
-
Publication number: 20130218918Abstract: Methods, systems, and computer program products are provided for using a claims model to control the execution of an execution unit. The execution unit is executed. An identity principal is identified under which the execution unit is executed. At least one claim is identified that is required for the execution unit. Each identified claim has a claim name and a claim value. One or more claims associated with the identified identity principal is/are requested from a claims provider. The claim(s) is/are received from the claims provider. The received claim(s) is/are compared with the identified claim(s). An action for the identified claim(s) is determined based on a result of the comparison.Type: ApplicationFiled: February 16, 2012Publication date: August 22, 2013Applicant: MICROSOFT CORPORATIONInventors: Gopinathan Kannan, Mitica Manu
-
Patent number: 8504349Abstract: A computing system may predict a word based on received user input that selects a part of the word (e.g., the first characters, the first root, etc.). Specifically, a program, when run on the computing system, may perform a method including creating a candidate list of words based on received user input. These words may be then organized into a hierarchy, or tree structure, in which each word is associated with a parent and each parent is a partial match for its associated words. The top-tier partial matches may be presented, and user input corresponding to a selected partial match may be received. A set of candidates related to the selected partial match may then be presented for user selection.Type: GrantFiled: June 18, 2007Date of Patent: August 6, 2013Assignee: Microsoft CorporationInventors: Mitica Manu, Jan-Kristian Markiewicz, Bradley A. Music, Brian D. Haslam
-
Patent number: 8424072Abstract: Described herein are techniques for operating a security server to determine behavioral profiles for entities in a network and to detect attacks or unauthorized traffic in a network based on those behavioral profiles. In one technique, a behavioral profile may be generated based on requests for security operations to be performed that are received at a security server from an entity in a network. The behavioral profile may be generated using learning techniques, including artificial intelligence techniques such as neural networks. When the security server receives from an entity one or more requests for security operations to be performed, the security server may compare properties of the requests to the behavioral profile for the entity and properties of requests commonly sent by the entity. The security server may determine a similarity score indicating how similar the request are to the behavioral profile and to requests commonly received from the entity.Type: GrantFiled: March 9, 2010Date of Patent: April 16, 2013Assignee: Microsoft CorporationInventors: Jack Pullikottil, Mitica Manu
-
Publication number: 20110225644Abstract: Described herein are techniques for operating a security server to determine behavioral profiles for entities in a network and to detect attacks or unauthorized traffic in a network based on those behavioral profiles. In one technique, a behavioral profile may be generated based on requests for security operations to be performed that are received at a security server from an entity in a network. The behavioral profile may be generated using learning techniques, including artificial intelligence techniques such as neural networks. When the security server receives from an entity one or more requests for security operations to be performed, the security server may compare properties of the requests to the behavioral profile for the entity and properties of requests commonly sent by the entity. The security server may determine a similarity score indicating how similar the request are to the behavioral profile and to requests commonly received from the entity.Type: ApplicationFiled: March 9, 2010Publication date: September 15, 2011Applicant: Microsoft CorporationInventors: Jack Pullikottil, Mitica Manu
-
Publication number: 20110225133Abstract: Described herein are various principles that may be used together or separately to implement a search engine to retrieve and use metadata information in performing a search. In one embodiment described herein, a search engine accepts input from a user that describes a search the user desires to be performed. The search engine may then examine the input to determine whether the input relates to an artifact and to what artifact the input relates. The search engine may then retrieve metadata information from a source related to the determined artifact and use the metadata information in performing the search requested by the user.Type: ApplicationFiled: March 9, 2010Publication date: September 15, 2011Applicant: Microsoft CorporationInventors: Mitica Manu, Jack Pullikottil
-
Patent number: 7580570Abstract: Signals to be processed are categorized based on signal characteristics such as physical aspects, context, conditions under which the signals were generated and source, and/or based on other variables. Categorized sets of signals are processed, and an accuracy for each set calculated. Weights are then applied to accuracy values for the sets, and the weighted values summed. In some cases, certain sums are then weighted and further summed.Type: GrantFiled: December 9, 2003Date of Patent: August 25, 2009Assignee: Microsoft CorporationInventors: Mitica Manu, Radmila Sarac
-
Publication number: 20090006261Abstract: A licensing device is used for storing one or more licenses for licensable content such as music, video, e-books, software applications, online memberships, and the like. The licensing device communicates with a user's computing devices enabling licensable content to be downloaded and/or activated on a particular computing device. The communication can take many forms such as wireless, wired, or optical. Downloading and/or activation of the content upon confirmation of a valid license may be automatic or partially based on user input.Type: ApplicationFiled: June 28, 2007Publication date: January 1, 2009Applicant: Microsoft CorporationInventors: Michael S. Bernstein, Peter W. Cihak, Shawn R. LeProwse, Mitica Manu, Tracy D. Schultz, Curt A. Steeb, Jeremy C. White, Robert T. Whitney
-
Publication number: 20080310723Abstract: A computing system may predict a word based on received user input that selects a part of the word (e.g., the first characters, the first root, etc.). Specifically, a program, when run on the computing system, may perform a method including creating a candidate list of words based on received user input. These words may be then organized into a hierarchy, or tree structure, in which each word is associated with a parent and each parent is a partial match for its associated words. The top-tier partial matches may be presented, and user input corresponding to a selected partial match may be received. A set of candidates related to the selected partial match may then be presented for user selection.Type: ApplicationFiled: June 18, 2007Publication date: December 18, 2008Applicant: Microsoft CorporationInventors: Mitica Manu, Jan-Kristian Markiewicz, Bradley A. Music, Brian D. Haslam
-
Publication number: 20080294652Abstract: A processing device may display a representation of a system resource. The system resource may include a menu, a folder, a filename, a shortcut, a textbox, or other resource. The user may make a gesture to indicate a desire to create a personalized identifier for the system resource. The processing device may display a personalized identifier writing area for inputting personalized identifier information. Personalized identifier information may be input via text, speech, digital ink, or other methods. The processing device may permit the user to configure types of information to be stored with personalized identifiers and how the personalized identifier information may be indexed for searching. In one embodiment, the input personalized identifier information may be translated to a second language and indexed for searching. Further, the processing device may permit the user to configure whether or how to display a personalized identifier for a system resource.Type: ApplicationFiled: May 21, 2007Publication date: November 27, 2008Applicant: Microsoft CorporationInventors: Mitica Manu, Patrick Michael Haluptzok, Leroy B. Keely, Shawn R. LeProwse
-
Patent number: 7428516Abstract: New neural networks for handwriting recognition may be build from existing neural networks. An existing neural network pre-trained for a starting language is chosen based on a desired target language. The neural network is modified so that it may be used to recognize characters of the target language, and the modified neural network is used in a handwriting recognizer for the target language. Modification includes copying one or more of the primary outputs of the existing neural network. An appropriate starting language may be chosen based on the desired target language. In addition, a “super network” may be provided that is a relatively large neural network configured to recognize characters from a number of different languages. One may customize a handwriting recognizer using such a super network by programming a mask to block outputs from the super network that are not necessary for the language desired to be recognized.Type: GrantFiled: June 23, 2005Date of Patent: September 23, 2008Assignee: Microsoft CorporationInventors: James A. Pittman, Mitica Manu
-
Publication number: 20070009151Abstract: New neural networks for handwriting recognition may be build from existing neural networks. An existing neural network pre-trained for a starting language is chosen based on a desired target language. The neural network is modified so that it may be used to recognize characters of the target language, and the modified neural network is used in a handwriting recognizer for the target language. Modification includes copying one or more of the primary outputs of the existing neural network. An appropriate starting language may be chosen based on the desired target language. In addition, a “super network” may be provided that is a relatively large neural network configured to recognize characters from a number of different languages. One may customize a handwriting recognizer using such a super network by programming a mask to block outputs from the super network that are not necessary for the language desired to be recognized.Type: ApplicationFiled: June 23, 2005Publication date: January 11, 2007Applicant: Microsoft CorporationInventors: James Pittman, Mitica Manu
-
Patent number: 7110914Abstract: Systems and methods are provided for selecting parameter values and combinations of parameter values to use in connection with testing. A graphical user interface allows a user to graphically illustrate the importance of parameter values by drawing a probability curve for each parameter. The resulting curves are then converted to mathematical functions that are then combined into a combination function. The combination function is then evaluated for different parameter value combinations. The parameter value combinations that cause the combination function to exceed a predetermined probability value are selected for testing.Type: GrantFiled: November 3, 2003Date of Patent: September 19, 2006Assignee: Microsoft CorporationInventors: Cristina Manu, Mitica Manu
-
Patent number: 7058953Abstract: A system manager tests, administers and monitors, and/or diagnoses problems with a distributed system having a plurality of computing machines. Each machine includes an event monitoring agent and the system manager comprises a data collection module (DCM), a data management module (DMM), a data storing module (DSM), and a user interface module (UIM). The DCM receives a request from the DMM describing performance data to be collected from each agent, and based on the request the DCM then collects such performance data from each agent and sends same to the DMM. The DMM stores the performance data at the DSM along with metadata corresponding to the request for current and future usage, including monitoring, analyzing and evaluation. The UIM receives requests from a user and forwards same to the DMM, and formats data from the DSM and represents the formatted data to the user.Type: GrantFiled: July 23, 2002Date of Patent: June 6, 2006Assignee: Microsoft CorporationInventors: Michael Joseph Willard, Mitica Manu
-
Publication number: 20050125225Abstract: Signals to be processed are categorized based on signal characteristics such as physical aspects, context, conditions under which the signals were generated and source, and/or based on other variables. Categorized sets of signals are processed, and an accuracy for each set calculated. Weights are then applied to accuracy values for the sets, and the weighted values summed. In some cases, certain sums are then weighted and further summed.Type: ApplicationFiled: December 9, 2003Publication date: June 9, 2005Applicant: Microsoft CorporationInventors: Mitica Manu, Radmila Sarac