Patents by Inventor Pavel Dournov
Pavel Dournov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20080262824Abstract: Operational resource modeling is usable to analyze application and computer system performance over a wide range of hypothetical scenarios. Operational resource modeling involves creating and training one or more resource models, and/or simulating hypothetical scenarios using resource models.Type: ApplicationFiled: April 23, 2007Publication date: October 23, 2008Applicant: Microsoft CorporationInventors: John M. Oslake, Pavel A. Dournov, Jonathan C. Hardwick, Kevin J. Savage
-
Publication number: 20080262823Abstract: Operational resource modeling is usable to analyze application and computer system performance over a wide range of hypothetical scenarios. Operational resource modeling involves creating and training one or more resource models, and/or simulating hypothetical scenarios using resource models.Type: ApplicationFiled: April 23, 2007Publication date: October 23, 2008Applicant: Microsoft CorporationInventors: John M Oslake, Pavel A Dournov, Jonathan C Hardwick, Kevin J Savage
-
Patent number: 7412603Abstract: Systems and methods are disclosed for storing sensitive data in a database, such as an application database or a dedicated application security database or store. In accordance with one aspect of the invention, user passwords are not directly stored in a database; but instead, when a password is entered, a one-way hash of the password phrase is produced for storage and/or comparison purposes. In accordance with another aspect, individual authorized application users are each aligned with their own version of an application-wide security key such that it becomes unnecessary to directly store the key in its original form. The security key is used to process sensitive data. In accordance with another aspect, a user's version of the application-wide security reflects an encryption-based relationship to the user's password. Various embodiments also support flexible access to particular collections of sensitive data based on user account and/or user role information.Type: GrantFiled: December 5, 2003Date of Patent: August 12, 2008Assignee: Microsoft CorporationInventors: Anthony Yeates, Pavel Dournov, Kirk Blackwood
-
Patent number: 7383161Abstract: In an implementation, a system includes a simulation engine that is executable to simulate actions performed by a plurality of devices in a distributed system. The system also includes a plurality of pluggable device models that are accessible by the simulation engine via an interface. Each of the device models represents one of the devices and is configured to map a cost of performing at least one of the actions to an action latency by the corresponding device.Type: GrantFiled: April 13, 2005Date of Patent: June 3, 2008Assignee: Microsoft CorporationInventors: Pavel A Dournov, John M Oslake, Efstathios Papaefstathiou, Glenn R. Peterson
-
Publication number: 20070271560Abstract: To determine whether to deploy a candidate VM to a candidate host, taking into consideration resources available from the candidate host and resources required by the candidate VM, a sub-rating is calculated for each of several resources available from the candidate host, where the sub-rating for the resource corresponds to an amount of the resource that is free after the candidate VM is deployed to the candidate host. Thereafter, a rating is calculated from the calculated sub-ratings to characterize how well the candidate host can accommodate the candidate VM. The rating for the candidate host are presented to a selector that determines whether to deploy the candidate VM to the candidate host based on the rating thereof.Type: ApplicationFiled: May 18, 2006Publication date: November 22, 2007Applicant: Microsoft CorporationInventors: Brian M. Wahlert, Rene Antonio Vega, Robert Gibson, Robert M. Fries, William L. Scheidel, Pavel A. Dournov, John Morgan Oslake
-
Publication number: 20070239766Abstract: Simulating an application. A method that may be practiced in a computing environment configured for simulating an application modeled by an application model deployed in a performance scenario of a computing system by deploying service models of the application model to device models modeling devices. The method includes referencing a performance scenario to obtain a transaction being modeled as originating from a first device model. The transaction invokes of a first service model. The first service model specifies hardware actions for simulation. The first service model is referenced to determine the hardware actions for simulation and the next referenced service. The next referenced service specifies hardware actions to be added to the transaction and may specify invocation of other service models. A chain of hardware actions is generated by following the invocation path of the service models. The hardware actions are applied to device models to simulate the transaction.Type: ApplicationFiled: March 31, 2006Publication date: October 11, 2007Applicant: Microsoft CorporationInventors: Efstathios Papaefstathiou, John Oslake, Jonathan Hardwick, Pavel Dournov
-
Publication number: 20070239420Abstract: Simulating network connections. A method includes generating a transaction by simulating a method model of a service model. The transaction includes representations of network interactions. A sequence of actions is created. The actions define network hardware activities including network actions performed by one or more source computer models, one or more network models, and one or more destination computer models. The sequence of actions is applied to network hardware device models to simulate network connectivity.Type: ApplicationFiled: April 10, 2006Publication date: October 11, 2007Applicant: Microsoft CorporationInventors: Efstathios Papaefstathiou, John Oslake, Pavel Dournov
-
Publication number: 20070233448Abstract: Validating simulation models. A computing environment includes a performance scenario of a system. The performance scenario includes device models defining device behavior and/or capacity. The performance scenario further includes interconnections between one or more device models. A static model analysis of the system is performed. The static model analysis analyzes at least one of configuration of device models defined by the performance scenario or interconnection of device models defined by the performance scenario. A static capacity analysis to analyze device model limitations as they relate to statically defined performance scenario characteristics is performed. An application constraints validation can be performed. This includes comparing the performance scenario to software deployment best practices and rules related to models similar to the performance scenario. A simulation runtime validation may also be performed to evaluate dynamic device usage and latencies to simulate the system.Type: ApplicationFiled: March 31, 2006Publication date: October 4, 2007Applicant: Microsoft CorporationInventors: Efstathios Papaefstathiou, John Oslake, Jonathan Hardwick, Pavel Dournov, Rohit Naik
-
Publication number: 20070233449Abstract: Modeling storage devices. One or more data structures define one or more storage devices including empirical characterizations or other characteristics of storage device operations for the specific storage devices. The empirical characterization are obtained as a result of laboratory testing of one or more sample components of the specific storage devices, or storage device similar to the specific storage devices. Complex storage device models that include disk arrays and storage networks can be represented as combinations of element models I/O operations are simulated by applying data structures that represent storage device operations to the one or more data structures. A latency is calculated based on the application of models of I/O operations as storage device operations. The latency may include portions calculated from empirical testing data as well as portions calculated from analytical modeling information.Type: ApplicationFiled: March 31, 2006Publication date: October 4, 2007Applicant: Microsoft CorporationInventors: Glenn Peterson, John Oslake, Pavel Dournov
-
Publication number: 20070233450Abstract: Simulating device interactions. A method may be practiced in a computing system for simulating interconnected devices. The method of simulating device interactions may be done in performing an overall transaction to obtain an output of system performance characteristics including measurement of latencies and/or device loads for actions performed by devices in performing the overall transaction. The method includes dividing a transaction into individual actions. The actions are applied to appropriate device models to produce latencies and/or device utilizations for the action as applied to the appropriate device model. This may be done by including an indication of an action type and optionally an action subservice. Memory resources may be conserved by ending the simulation when latencies and/or device utilizations have settled. Device utilization and latency may be aggregated and averaged over time.Type: ApplicationFiled: March 31, 2006Publication date: October 4, 2007Applicant: Microsoft CorporationInventors: Efstathios Papaefstathiou, Glenn Peterson, John Oslake, Pavel Dournov
-
Publication number: 20060248510Abstract: In an implementation, a system includes a simulation engine that is executable to simulate actions performed by a plurality of devices in a distributed system. The system also includes a plurality of pluggable device models that are accessible by the simulation engine via an interface. Each of the device models represents one of the devices and is configured to map a cost of performing at least one of the actions to an action latency by the corresponding device.Type: ApplicationFiled: April 13, 2005Publication date: November 2, 2006Applicant: Microsoft CorporationInventors: Pavel Dournov, John Oslake, Efstathios Papaefstathiou, Glenn Peterson
-
Publication number: 20060235859Abstract: A prescribed system architecture is recommended to an entity that desires to implement a system supporting distributed applications. A performance scenario is created based on anticipated usage, devices employed by servers running the distributed applications, and topology of locations using the servers. An optimized scenario may be provided by determining device optimization, different use load, and if possible consolidation of distributed applications on servers.Type: ApplicationFiled: April 15, 2005Publication date: October 19, 2006Applicant: Microsoft CorporationInventors: Jonathan Hardwick, Efstathios Papaefstathiou, David Guimbellot, John Oslake, Pavel Dournov
-
Publication number: 20060235675Abstract: Preconditioning for stochastic simulation of computer system performance is described. In an embodiment, methods taught herein include preconditioning a performance scenario that is simulated as part of a software deployment. The performance scenario specifies devices included as part of a hardware configuration supporting the software. The performance scenario can be modified based, at least in part, on the result of the preconditioning. Other methods taught herein include two complementary techniques for preconditioning performance scenarios, referred to as pseudo-simulation and workload aggregation.Type: ApplicationFiled: April 15, 2005Publication date: October 19, 2006Applicant: Microsoft CorporationInventors: John Oslake, Pavel Dournov, Glenn Peterson, Jonathan Hardwick, Efstathios Papaefstathiou, David Guimbellot
-
Publication number: 20050198348Abstract: The present invention discloses methods and systems for providing secure user access to services offered by a service provider to a client application over a network. One embodiment includes receiving an application cookie from the client application and populating a service cookie based on information in the application cookie. Information in the service cookie is utilized as a basis for regulating a provision of services to the client application.Type: ApplicationFiled: December 23, 2003Publication date: September 8, 2005Applicant: Microsoft CorporationInventors: Anthony Yeates, Pavel Dournov, Sumeet Shrivastava, Vaidyanathan Arunachalam, Donna Whitlock
-
Publication number: 20050137895Abstract: Data replication between a headquarters application and one or more client applications is provided. The client applications are generally located remote from the headquarters application and communicate therewith via known methods. A pair of classes is used to generically transfer data selected for replication. New entity types and/or data types can be synchronized without having to rewrite the synchronization application by simply deploying an appropriate data class and manager class for the new entity. Moreover, the prior art worksheet is abstracted, in some aspects, to a simpler form that is more user friendly.Type: ApplicationFiled: December 19, 2003Publication date: June 23, 2005Applicant: Microsoft CorporationInventors: Donna Whitlock, Anthony Yeates, Pavel Dournov, Eric Hawthorne, Sylvester La Blanc
-
Publication number: 20050125698Abstract: Systems and methods are disclosed for storing sensitive data in a database, such as an application database or a dedicated application security database or store. In accordance with one aspect of the invention, user passwords are not directly stored in a database; but instead, when a password is entered, a one-way hash of the password phrase is produced for storage and/or comparison purposes. In accordance with another aspect, individual authorized application users are each aligned with their own version of an application-wide security key such that it becomes unnecessary to directly store the key in its original form. The security key is used to process sensitive data. In accordance with another aspect, a user's version of the application-wide security reflects an encryption-based relationship to the user's password. Various embodiments also support flexible access to particular collections of sensitive data based on user account and/or user role information.Type: ApplicationFiled: December 5, 2003Publication date: June 9, 2005Applicant: Microsoft CorporationInventors: Anthony Yeates, Pavel Dournov, Kirk Blackwood
-
Publication number: 20050120214Abstract: An authentication protocol is disclosed for use in enhancing the security of communications between software applications and Internet-based service providers. The protocol incorporates a two level authentication model based on a distribution of authentication responsibilities, wherein the application authenticates users and the service provider authenticates the application. Embodiments of the protocol incorporate public key infrastructure and digital certificate technology. Other embodiments of the present invention pertain to applying a corresponding protocol to peer-to-peer communication scenarios.Type: ApplicationFiled: December 2, 2003Publication date: June 2, 2005Applicant: Microsoft CorporationInventors: Anthony Yeates, Pavel Dournov, Donna Whitlock, Timothy Belvin, Brendan O'Meara, Kirk Blackwood, Derrick Bazlen
-
Publication number: 20050015336Abstract: A gateway server, point of sale device and protocol are provided for processing financial transactions. A public network interface is configured to couple to a public network and communicate financial authorization requests. The financial authorization requests can include, for example, transaction specific data, a merchant store or location invariant and a supplemental header. A gateway processor processes the financial transaction authorization requests and couples to a financial network interface configured to couple to at least one financial network. The gateway provides a response to the point of sale device based upon data received from the financial network and the authorization request.Type: ApplicationFiled: July 15, 2003Publication date: January 20, 2005Applicant: Microsoft CorporationInventors: Anthony Yeates, Pavel Dournov, Balaji Balasubramanian, Vaidyanathan Arunachalam, Donna Whitlock, Timothy Belvin