Patents by Inventor Nirav Yogesh Shah
Nirav Yogesh Shah has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10542022Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: GrantFiled: June 6, 2017Date of Patent: January 21, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Publication number: 20180027007Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: ApplicationFiled: June 6, 2017Publication date: January 25, 2018Inventors: Nirav Yogesh SHAH, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Patent number: 9705905Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: GrantFiled: May 8, 2014Date of Patent: July 11, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Publication number: 20160027007Abstract: Technologies are described herein for loosely coupling a hosted application system with other computing systems that provide related functionality. A hosted application system is provided in one embodiment that is loosely coupled to a marketing system, a sign-up system, a billing system, and a support system. The loose coupling of the systems allows the hosted application system to be easily configured to restrict the software to which a particular customer can subscribe based upon the capacity of the hosted application system, the qualifications of a customer, or other factors. The computing systems may be configured to communicate via idempotent network APIs, thereby permitting multiple retries to ensure successful completion of requests.Type: ApplicationFiled: October 8, 2015Publication date: January 28, 2016Inventors: Nirav Yogesh Shah, Michael James Ott, Manisha Balasaheb Powar
-
Patent number: 9053162Abstract: Technologies are described herein for implementing a hosted multi-tenant application system. The server computers utilized to provide the hosted application are organized into logical groupings of server computers called scale groups. One or more tenants are assigned to each scale group. When a new tenant is provisioned, the tenant is assigned to a scale group and a database server in the assigned scale group creates a database for the tenant. An association between the tenant and the scale group is also created in a shared configuration database. When a request is received from a tenant to access the hosted application, the shared configuration database is consulted to locate the scale group hosting the tenant. Once the appropriate scale group has been located, the request is redirected to the appropriate scale group for processing.Type: GrantFiled: June 27, 2008Date of Patent: June 9, 2015Assignee: Microsoft Technology Licensing, LLCInventors: David Robert Shutt, Michael James Ott, Nirav Yogesh Shah, Jagan Peri, Ramesh T. Bangalore
-
Publication number: 20140245437Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: ApplicationFiled: May 8, 2014Publication date: August 28, 2014Applicant: MICROSOFT CORPORATIONInventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Patent number: 8745361Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: GrantFiled: December 2, 2008Date of Patent: June 3, 2014Assignee: Microsoft CorporationInventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Publication number: 20100138639Abstract: A sandbox architecture that isolates and identifies misbehaving plug-ins (intentional or unintentional) to prevent system interruptions and failure. Based on plug-in errors, the architecture automatically disables and blocks registration of the bad plug-in via a penalty point system. Publishers of bad plug-ins are controlled by disabling the bad plug-ins and registering the publisher in an unsafe list. Isolation can be provided in multiple levels, such as machine isolation, process isolation, secure accounts with limited access rights, and application domain isolation within processes using local security mechanisms. A combination of the multiple levels of isolation achieves a high level of security. Isolation provides separation from other plug-in executions and restriction to system resources such as file system and network IP.Type: ApplicationFiled: December 2, 2008Publication date: June 3, 2010Applicant: Microsoft CorporationInventors: Nirav Yogesh Shah, Allen F. Hafezipour, Steve Jamieson, Shashi Ranjan
-
Publication number: 20090327139Abstract: Technologies are described herein for loosely coupling a hosted application system with other computing systems that provide related functionality. A hosted application system is provided in one embodiment that is loosely coupled to a marketing system, a sign-up system, a billing system, and a support system. The loose coupling of the systems allows the hosted application system to be easily configured to restrict the software to which a particular customer can subscribe based upon the capacity of the hosted application system, the qualifications of a customer, or other factors. The computing systems may be configured to communicate via idempotent network APIs, thereby permitting multiple retries to ensure successful completion of requests.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: Nirav Yogesh Shah, Michael James Ott, Manisha Balasaheb Powar
-
Publication number: 20090049056Abstract: Technologies are described herein for implementing a hosted multi-tenant application system. The server computers utilized to provide the hosted application are organized into logical groupings of server computers called scale groups. One or more tenants are assigned to each scale group. When a new tenant is provisioned, the tenant is assigned to a scale group and a database server in the assigned scale group creates a database for the tenant. An association between the tenant and the scale group is also created in a shared configuration database. When a request is received from a tenant to access the hosted application, the shared configuration database is consulted to locate the scale group hosting the tenant. Once the appropriate scale group has been located, the request is redirected to the appropriate scale group for processing.Type: ApplicationFiled: June 27, 2008Publication date: February 19, 2009Applicant: MICROSOFT CORPORATIONInventors: David Robert Shutt, Michael James Ott, Nirav Yogesh Shah, Jagan Peri, Ramesh T. Bangalore