Patents by Inventor Nirav Yogesh Shah

Nirav Yogesh Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10542022
    Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.
    Type: Grant
    Filed: June 6, 2017
    Date of Patent: January 21, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
  • Publication number: 20180027007
    Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.
    Type: Application
    Filed: June 6, 2017
    Publication date: January 25, 2018
    Inventors: Nirav Yogesh SHAH, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
  • Patent number: 9705905
    Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.
    Type: Grant
    Filed: May 8, 2014
    Date of Patent: July 11, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
  • Publication number: 20160027007
    Abstract: Technologies are described herein for loosely coupling a hosted application system with other computing systems that provide related functionality. A hosted application system is provided in one embodiment that is loosely coupled to a marketing system, a sign-up system, a billing system, and a support system. The loose coupling of the systems allows the hosted application system to be easily configured to restrict the software to which a particular customer can subscribe based upon the capacity of the hosted application system, the qualifications of a customer, or other factors. The computing systems may be configured to communicate via idempotent network APIs, thereby permitting multiple retries to ensure successful completion of requests.
    Type: Application
    Filed: October 8, 2015
    Publication date: January 28, 2016
    Inventors: Nirav Yogesh Shah, Michael James Ott, Manisha Balasaheb Powar
  • Patent number: 9053162
    Abstract: Technologies are described herein for implementing a hosted multi-tenant application system. The server computers utilized to provide the hosted application are organized into logical groupings of server computers called scale groups. One or more tenants are assigned to each scale group. When a new tenant is provisioned, the tenant is assigned to a scale group and a database server in the assigned scale group creates a database for the tenant. An association between the tenant and the scale group is also created in a shared configuration database. When a request is received from a tenant to access the hosted application, the shared configuration database is consulted to locate the scale group hosting the tenant. Once the appropriate scale group has been located, the request is redirected to the appropriate scale group for processing.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: June 9, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: David Robert Shutt, Michael James Ott, Nirav Yogesh Shah, Jagan Peri, Ramesh T. Bangalore
  • Publication number: 20140245437
    Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.
    Type: Application
    Filed: May 8, 2014
    Publication date: August 28, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
  • Patent number: 8745361
    Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.
    Type: Grant
    Filed: December 2, 2008
    Date of Patent: June 3, 2014
    Assignee: Microsoft Corporation
    Inventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
  • Publication number: 20100138639
    Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.
    Type: Application
    Filed: December 2, 2008
    Publication date: June 3, 2010
    Applicant: Microsoft Corporation
    Inventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
  • Publication number: 20090327139
    Abstract: Technologies are described herein for loosely coupling a hosted application system with other computing systems that provide related functionality. A hosted application system is provided in one embodiment that is loosely coupled to a marketing system, a sign-up system, a billing system, and a support system. The loose coupling of the systems allows the hosted application system to be easily configured to restrict the software to which a particular customer can subscribe based upon the capacity of the hosted application system, the qualifications of a customer, or other factors. The computing systems may be configured to communicate via idempotent network APIs, thereby permitting multiple retries to ensure successful completion of requests.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Nirav Yogesh Shah, Michael James Ott, Manisha Balasaheb Powar
  • Publication number: 20090049056
    Abstract: Technologies are described herein for implementing a hosted multi-tenant application system. The server computers utilized to provide the hosted application are organized into logical groupings of server computers called scale groups. One or more tenants are assigned to each scale group. When a new tenant is provisioned, the tenant is assigned to a scale group and a database server in the assigned scale group creates a database for the tenant. An association between the tenant and the scale group is also created in a shared configuration database. When a request is received from a tenant to access the hosted application, the shared configuration database is consulted to locate the scale group hosting the tenant. Once the appropriate scale group has been located, the request is redirected to the appropriate scale group for processing.
    Type: Application
    Filed: June 27, 2008
    Publication date: February 19, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: David Robert Shutt, Michael James Ott, Nirav Yogesh Shah, Jagan Peri, Ramesh T. Bangalore