Patents by Inventor Pavel Dournov

Pavel Dournov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20080262824
    Abstract: Operational resource modeling is usable to analyze application and computer system performance over a wide range of hypothetical scenarios. Operational resource modeling involves creating and training one or more resource models, and/or simulating hypothetical scenarios using resource models.
    Type: Application
    Filed: April 23, 2007
    Publication date: October 23, 2008
    Applicant: Microsoft Corporation
    Inventors: John M. Oslake, Pavel A. Dournov, Jonathan C. Hardwick, Kevin J. Savage
  • Publication number: 20080262823
    Abstract: Operational resource modeling is usable to analyze application and computer system performance over a wide range of hypothetical scenarios. Operational resource modeling involves creating and training one or more resource models, and/or simulating hypothetical scenarios using resource models.
    Type: Application
    Filed: April 23, 2007
    Publication date: October 23, 2008
    Applicant: Microsoft Corporation
    Inventors: John M Oslake, Pavel A Dournov, Jonathan C Hardwick, Kevin J Savage
  • Patent number: 7412603
    Abstract: Systems and methods are disclosed for storing sensitive data in a database, such as an application database or a dedicated application security database or store. In accordance with one aspect of the invention, user passwords are not directly stored in a database; but instead, when a password is entered, a one-way hash of the password phrase is produced for storage and/or comparison purposes. In accordance with another aspect, individual authorized application users are each aligned with their own version of an application-wide security key such that it becomes unnecessary to directly store the key in its original form. The security key is used to process sensitive data. In accordance with another aspect, a user's version of the application-wide security reflects an encryption-based relationship to the user's password. Various embodiments also support flexible access to particular collections of sensitive data based on user account and/or user role information.
    Type: Grant
    Filed: December 5, 2003
    Date of Patent: August 12, 2008
    Assignee: Microsoft Corporation
    Inventors: Anthony Yeates, Pavel Dournov, Kirk Blackwood
  • Patent number: 7383161
    Abstract: In an implementation, a system includes a simulation engine that is executable to simulate actions performed by a plurality of devices in a distributed system. The system also includes a plurality of pluggable device models that are accessible by the simulation engine via an interface. Each of the device models represents one of the devices and is configured to map a cost of performing at least one of the actions to an action latency by the corresponding device.
    Type: Grant
    Filed: April 13, 2005
    Date of Patent: June 3, 2008
    Assignee: Microsoft Corporation
    Inventors: Pavel A Dournov, John M Oslake, Efstathios Papaefstathiou, Glenn R. Peterson
  • Publication number: 20070271560
    Abstract: To determine whether to deploy a candidate VM to a candidate host, taking into consideration resources available from the candidate host and resources required by the candidate VM, a sub-rating is calculated for each of several resources available from the candidate host, where the sub-rating for the resource corresponds to an amount of the resource that is free after the candidate VM is deployed to the candidate host. Thereafter, a rating is calculated from the calculated sub-ratings to characterize how well the candidate host can accommodate the candidate VM. The rating for the candidate host are presented to a selector that determines whether to deploy the candidate VM to the candidate host based on the rating thereof.
    Type: Application
    Filed: May 18, 2006
    Publication date: November 22, 2007
    Applicant: Microsoft Corporation
    Inventors: Brian M. Wahlert, Rene Antonio Vega, Robert Gibson, Robert M. Fries, William L. Scheidel, Pavel A. Dournov, John Morgan Oslake
  • Publication number: 20070239766
    Abstract: Simulating an application. A method that may be practiced in a computing environment configured for simulating an application modeled by an application model deployed in a performance scenario of a computing system by deploying service models of the application model to device models modeling devices. The method includes referencing a performance scenario to obtain a transaction being modeled as originating from a first device model. The transaction invokes of a first service model. The first service model specifies hardware actions for simulation. The first service model is referenced to determine the hardware actions for simulation and the next referenced service. The next referenced service specifies hardware actions to be added to the transaction and may specify invocation of other service models. A chain of hardware actions is generated by following the invocation path of the service models. The hardware actions are applied to device models to simulate the transaction.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 11, 2007
    Applicant: Microsoft Corporation
    Inventors: Efstathios Papaefstathiou, John Oslake, Jonathan Hardwick, Pavel Dournov
  • Publication number: 20070239420
    Abstract: Simulating network connections. A method includes generating a transaction by simulating a method model of a service model. The transaction includes representations of network interactions. A sequence of actions is created. The actions define network hardware activities including network actions performed by one or more source computer models, one or more network models, and one or more destination computer models. The sequence of actions is applied to network hardware device models to simulate network connectivity.
    Type: Application
    Filed: April 10, 2006
    Publication date: October 11, 2007
    Applicant: Microsoft Corporation
    Inventors: Efstathios Papaefstathiou, John Oslake, Pavel Dournov
  • Publication number: 20070233448
    Abstract: Validating simulation models. A computing environment includes a performance scenario of a system. The performance scenario includes device models defining device behavior and/or capacity. The performance scenario further includes interconnections between one or more device models. A static model analysis of the system is performed. The static model analysis analyzes at least one of configuration of device models defined by the performance scenario or interconnection of device models defined by the performance scenario. A static capacity analysis to analyze device model limitations as they relate to statically defined performance scenario characteristics is performed. An application constraints validation can be performed. This includes comparing the performance scenario to software deployment best practices and rules related to models similar to the performance scenario. A simulation runtime validation may also be performed to evaluate dynamic device usage and latencies to simulate the system.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Efstathios Papaefstathiou, John Oslake, Jonathan Hardwick, Pavel Dournov, Rohit Naik
  • Publication number: 20070233449
    Abstract: Modeling storage devices. One or more data structures define one or more storage devices including empirical characterizations or other characteristics of storage device operations for the specific storage devices. The empirical characterization are obtained as a result of laboratory testing of one or more sample components of the specific storage devices, or storage device similar to the specific storage devices. Complex storage device models that include disk arrays and storage networks can be represented as combinations of element models I/O operations are simulated by applying data structures that represent storage device operations to the one or more data structures. A latency is calculated based on the application of models of I/O operations as storage device operations. The latency may include portions calculated from empirical testing data as well as portions calculated from analytical modeling information.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Glenn Peterson, John Oslake, Pavel Dournov
  • Publication number: 20070233450
    Abstract: Simulating device interactions. A method may be practiced in a computing system for simulating interconnected devices. The method of simulating device interactions may be done in performing an overall transaction to obtain an output of system performance characteristics including measurement of latencies and/or device loads for actions performed by devices in performing the overall transaction. The method includes dividing a transaction into individual actions. The actions are applied to appropriate device models to produce latencies and/or device utilizations for the action as applied to the appropriate device model. This may be done by including an indication of an action type and optionally an action subservice. Memory resources may be conserved by ending the simulation when latencies and/or device utilizations have settled. Device utilization and latency may be aggregated and averaged over time.
    Type: Application
    Filed: March 31, 2006
    Publication date: October 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Efstathios Papaefstathiou, Glenn Peterson, John Oslake, Pavel Dournov
  • Publication number: 20060248510
    Abstract: In an implementation, a system includes a simulation engine that is executable to simulate actions performed by a plurality of devices in a distributed system. The system also includes a plurality of pluggable device models that are accessible by the simulation engine via an interface. Each of the device models represents one of the devices and is configured to map a cost of performing at least one of the actions to an action latency by the corresponding device.
    Type: Application
    Filed: April 13, 2005
    Publication date: November 2, 2006
    Applicant: Microsoft Corporation
    Inventors: Pavel Dournov, John Oslake, Efstathios Papaefstathiou, Glenn Peterson
  • Publication number: 20060235859
    Abstract: A prescribed system architecture is recommended to an entity that desires to implement a system supporting distributed applications. A performance scenario is created based on anticipated usage, devices employed by servers running the distributed applications, and topology of locations using the servers. An optimized scenario may be provided by determining device optimization, different use load, and if possible consolidation of distributed applications on servers.
    Type: Application
    Filed: April 15, 2005
    Publication date: October 19, 2006
    Applicant: Microsoft Corporation
    Inventors: Jonathan Hardwick, Efstathios Papaefstathiou, David Guimbellot, John Oslake, Pavel Dournov
  • Publication number: 20060235675
    Abstract: Preconditioning for stochastic simulation of computer system performance is described. In an embodiment, methods taught herein include preconditioning a performance scenario that is simulated as part of a software deployment. The performance scenario specifies devices included as part of a hardware configuration supporting the software. The performance scenario can be modified based, at least in part, on the result of the preconditioning. Other methods taught herein include two complementary techniques for preconditioning performance scenarios, referred to as pseudo-simulation and workload aggregation.
    Type: Application
    Filed: April 15, 2005
    Publication date: October 19, 2006
    Applicant: Microsoft Corporation
    Inventors: John Oslake, Pavel Dournov, Glenn Peterson, Jonathan Hardwick, Efstathios Papaefstathiou, David Guimbellot
  • Publication number: 20050198348
    Abstract: The present invention discloses methods and systems for providing secure user access to services offered by a service provider to a client application over a network. One embodiment includes receiving an application cookie from the client application and populating a service cookie based on information in the application cookie. Information in the service cookie is utilized as a basis for regulating a provision of services to the client application.
    Type: Application
    Filed: December 23, 2003
    Publication date: September 8, 2005
    Applicant: Microsoft Corporation
    Inventors: Anthony Yeates, Pavel Dournov, Sumeet Shrivastava, Vaidyanathan Arunachalam, Donna Whitlock
  • Publication number: 20050137895
    Abstract: Data replication between a headquarters application and one or more client applications is provided. The client applications are generally located remote from the headquarters application and communicate therewith via known methods. A pair of classes is used to generically transfer data selected for replication. New entity types and/or data types can be synchronized without having to rewrite the synchronization application by simply deploying an appropriate data class and manager class for the new entity. Moreover, the prior art worksheet is abstracted, in some aspects, to a simpler form that is more user friendly.
    Type: Application
    Filed: December 19, 2003
    Publication date: June 23, 2005
    Applicant: Microsoft Corporation
    Inventors: Donna Whitlock, Anthony Yeates, Pavel Dournov, Eric Hawthorne, Sylvester La Blanc
  • Publication number: 20050125698
    Abstract: Systems and methods are disclosed for storing sensitive data in a database, such as an application database or a dedicated application security database or store. In accordance with one aspect of the invention, user passwords are not directly stored in a database; but instead, when a password is entered, a one-way hash of the password phrase is produced for storage and/or comparison purposes. In accordance with another aspect, individual authorized application users are each aligned with their own version of an application-wide security key such that it becomes unnecessary to directly store the key in its original form. The security key is used to process sensitive data. In accordance with another aspect, a user's version of the application-wide security reflects an encryption-based relationship to the user's password. Various embodiments also support flexible access to particular collections of sensitive data based on user account and/or user role information.
    Type: Application
    Filed: December 5, 2003
    Publication date: June 9, 2005
    Applicant: Microsoft Corporation
    Inventors: Anthony Yeates, Pavel Dournov, Kirk Blackwood
  • Publication number: 20050120214
    Abstract: An authentication protocol is disclosed for use in enhancing the security of communications between software applications and Internet-based service providers. The protocol incorporates a two level authentication model based on a distribution of authentication responsibilities, wherein the application authenticates users and the service provider authenticates the application. Embodiments of the protocol incorporate public key infrastructure and digital certificate technology. Other embodiments of the present invention pertain to applying a corresponding protocol to peer-to-peer communication scenarios.
    Type: Application
    Filed: December 2, 2003
    Publication date: June 2, 2005
    Applicant: Microsoft Corporation
    Inventors: Anthony Yeates, Pavel Dournov, Donna Whitlock, Timothy Belvin, Brendan O'Meara, Kirk Blackwood, Derrick Bazlen
  • Publication number: 20050015336
    Abstract: A gateway server, point of sale device and protocol are provided for processing financial transactions. A public network interface is configured to couple to a public network and communicate financial authorization requests. The financial authorization requests can include, for example, transaction specific data, a merchant store or location invariant and a supplemental header. A gateway processor processes the financial transaction authorization requests and couples to a financial network interface configured to couple to at least one financial network. The gateway provides a response to the point of sale device based upon data received from the financial network and the authorization request.
    Type: Application
    Filed: July 15, 2003
    Publication date: January 20, 2005
    Applicant: Microsoft Corporation
    Inventors: Anthony Yeates, Pavel Dournov, Balaji Balasubramanian, Vaidyanathan Arunachalam, Donna Whitlock, Timothy Belvin