Patents by Inventor Rajmohan Rajagopalan

Rajmohan Rajagopalan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11140045
    Abstract: Technologies are described herein for changelog transformation and correlation in a multi-tenant cloud service. Components within the multi-tenant cloud service generate changelogs that describe changes made to hardware or software components within the multi-tenant cloud service. The changelogs are received and transformed from different schemas into a common schema. A central change management service (“CCMS”) exposes a network service application programming interface (“API”), or other type of interface, through which other network services can obtain the changelogs that have been transformed into the common schema. For example, services can obtain changelogs in order to correlate changes to anomalies or other events taking place in the multi-tenant cloud service, to identify upstream or downstream components that might be impacted by a change, to provide a user interface for viewing the changelogs, the correlation, or the potential impact of a change, and/or to perform other types of functions.
    Type: Grant
    Filed: July 31, 2015
    Date of Patent: October 5, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Eddie W. M. Fong, Nagaraju Palla, Ricardo Soares Stern, Rajmohan Rajagopalan, Bhavin J. Shah, Narendra Babu Alagiriswamy, Karan Singh Rekhi, Parikshit Patidar
  • Patent number: 10748070
    Abstract: Technologies are described herein for identification and presentation of changelogs relevant to a tenant of a multi-tenant cloud service. Change feature extraction is performed on changelogs associated with a tenant of the multi-tenant cloud service to identify features associated with the changelogs. Machine learning based classification can then be performed on the changelogs to classify the changelogs. Misclassification correction might also be performed on the classified changelogs. Machine learning can also be utilized to identify a subset of the changelogs as being relevant to the tenant. A user interface (UI) can then be generated and provided to the tenant that includes the subset of the changelogs. The tenant's interaction with the changelogs presented in the UI can be monitored and data describing the interaction can be used to modify machine learning models utilized for machine learning change classification and for determining the relevance of a changelog to the tenant.
    Type: Grant
    Filed: July 31, 2015
    Date of Patent: August 18, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Rajmohan Rajagopalan, Ricardo Soares Stern, Mufaddal M. Pratapgarhwala, Karan Singh Rekhi, Bhavin J. Shah, Eddie W. M. Fong, Nagaraju Palla, Parikshit Patidar
  • Patent number: 10410304
    Abstract: Provisioning of digital asset management is provided. A service such as a management service retrieves digital assets from external resources in response to a search of the external resources. The digital assets are classified to asset categories, which are used to match the digital assets to suggested actions to dispose of the digital assets in case of an incapacitation of the asset owner. The digital assets, the asset categories, suggested trigger events, or the suggested actions are transmitted to an asset manager to prompt the asset manager customize the digital assets, the asset categories, suggested trigger events, or the suggested actions. A workflow is created from the digital assets, the asset categories, the suggested trigger events, and the suggested actions to dispose of the digital assets in case of the incapacitation of the asset owner.
    Type: Grant
    Filed: May 26, 2015
    Date of Patent: September 10, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Rajmohan Rajagopalan, Michael Stokes
  • Patent number: 10382528
    Abstract: Digital asset management with disposition actions based on trigger events are provided. A management service transmits actions to an asset manager to prompt the asset manager to customize the actions. The actions include operations to dispose of digital assets of an asset owner based on a detection of a trigger event. The management service detects a customization and/or a selection of a subset of the actions by the asset manager and monitors the digital assets to detect the trigger event. Once the management service detects the trigger event, the management service executes the subset of the actions to dispose of the digital assets.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: August 13, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Rajmohan Rajagopalan, Michael Stokes
  • Patent number: 10007714
    Abstract: Ongoing management for pre-planned handling of digital presence is provided. A service such as a management service monitors continuously monitors digital assets of an asset owner hosted at external resources. A change to the digital assets retrieved from the external resources is analyzed in response to a detection of the change. The change is processed to reclassify the digital assets into asset categories. The digital assets and the asset categories are matched to suggested actions and suggested trigger events. The suggested actions include operations to dispose of the digital assets in case of an incapacitation of the asset owner. A notification is transmitted to an asset manager to prompt the asset manager to review the updates to the digital assets, the asset categories, the suggested actions, and the suggested trigger events.
    Type: Grant
    Filed: May 27, 2015
    Date of Patent: June 26, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Rajmohan Rajagopalan, Michael Stokes
  • Publication number: 20170034010
    Abstract: Technologies are described herein for changelog transformation and correlation in a multi-tenant cloud service. Components within the multi-tenant cloud service generate changelogs that describe changes made to hardware or software components within the multi-tenant cloud service. The changelogs are received and transformed from different schemas into a common schema. A central change management service (“CCMS”) exposes a network service application programming interface (“API”), or other type of interface, through which other network services can obtain the changelogs that have been transformed into the common schema. For example, services can obtain changelogs in order to correlate changes to anomalies or other events taking place in the multi-tenant cloud service, to identify upstream or downstream components that might be impacted by a change, to provide a user interface for viewing the changelogs, the correlation, or the potential impact of a change, and/or to perform other types of functions.
    Type: Application
    Filed: July 31, 2015
    Publication date: February 2, 2017
    Inventors: Eddie W.M. Fong, Nagaraju Palla, Ricardo Soares Stern, Rajmohan Rajagopalan, Bhavin J. Shah, Narendra Babu Alagiriswamy, Karan Singh Rekhi, Parikshit Patidar
  • Publication number: 20170032268
    Abstract: Technologies are described herein for identification and presentation of changelogs relevant to a tenant of a multi-tenant cloud service. Change feature extraction is performed on changelogs associated with a tenant of the multi-tenant cloud service to identify features associated with the changelogs. Machine learning based classification can then be performed on the changelogs to classify the changelogs. Misclassification correction might also be performed on the classified changelogs. Machine learning can also be utilized to identify a subset of the changelogs as being relevant to the tenant. A user interface (UI) can then be generated and provided to the tenant that includes the subset of the changelogs. The tenant's interaction with the changelogs presented in the UI can be monitored and data describing the interaction can be used to modify machine learning models utilized for machine learning change classification and for determining the relevance of a changelog to the tenant.
    Type: Application
    Filed: July 31, 2015
    Publication date: February 2, 2017
    Inventors: Rajmohan Rajagopalan, Ricardo Soares Stern, Mufaddal M. Pratapgarhwala, Karan Singh Rekhi, Bhavin J. Shah, Eddie W.M. Fong, Nagaraju Palla, Parikshit Patidar
  • Publication number: 20160364576
    Abstract: Large scale system operation may be provided. Upon receiving an action request from a user, a determination may be made as to whether the user requires elevated permissions to perform the action request. In response to determining that the user requires elevated permissions to perform the action request, the action request may be forwarded to a lockbox for evaluation and a permission response may be received from the lockbox.
    Type: Application
    Filed: August 25, 2016
    Publication date: December 15, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Alexander MacLeod, Andrey Lukyanov, Colin Nash, Jaskaran Singh, Rajmohan Rajagopalan, Vivek Sharma
  • Patent number: 9460303
    Abstract: Large scale system operation may be provided. Upon receiving an action request from a user, a determination may be made as to whether the user requires elevated permissions to perform the action request. In response to determining that the user requires elevated permissions to perform the action request, the action request may be forwarded to a lockbox for evaluation and a permission response may be received from the lockbox.
    Type: Grant
    Filed: March 6, 2012
    Date of Patent: October 4, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Alexander MacLeod, Andrey Lukyanov, Colin Nash, Jaskaran Singh, Rajmohan Rajagopalan, Vivek Sharma
  • Publication number: 20160261635
    Abstract: Trigger events and confirmation in digital asset management are provided. A service such as a management service monitors digital assets of an asset owner and content associated with the asset owner hosted at external resources. A trigger event is detected within the content or the digital assets. The trigger event identifies information about an incapacitation of the asset owner. A notification is transmitted to an asset manager to prompt the asset manager to validate an incapacitation of the asset owner associated with the trigger event. In response to a confirmation of the incapacitation, actions are executed to dispose of the digital assets.
    Type: Application
    Filed: May 27, 2015
    Publication date: September 8, 2016
    Inventors: Rajmohan Rajagopalan, Michael Stokes
  • Publication number: 20160261708
    Abstract: Ongoing management of a shaped online reputation is provided. A service such as a reputation management service monitors digital assets of a reputation owner hosted by external resources based on a reputation profile. The reputation profile is configured by a reputation manager. A change to the digital assets is detected. In response, the change and the reputation profile are processed to match suggested actions with operations to shape the online profile. A description of the suggested actions, the reputation profile, and the change are transmitted to the reputation manager to prompt the reputation manager to customize or confirm the reputation profile and the suggested actions. The suggested actions are executed to shape the online reputation in response to a confirmation to the transmission by the reputation manager.
    Type: Application
    Filed: May 28, 2015
    Publication date: September 8, 2016
    Inventors: Rajmohan Rajagopalan, Michael Stokes, Carolyn Sparling
  • Publication number: 20160261707
    Abstract: Sign-up and provisioning in online reputation management with reputation shaping are provided. A service such as a reputation management service authenticates a reputation manager to allow the reputation manager to configure a reputation profile to shape the online reputation associated with a reputation owner. Digital assets associated with the reputation and hosted by external resources are discovered. The digital assets and the reputation profile are analyzed to match suggested actions with operations to shape the online reputation. The digital assets, the reputation profile, and the suggested actions are transmitted to the reputation manager to prompt the reputation manager to customize the reputation profile and the suggested actions to shape the online reputation.
    Type: Application
    Filed: May 28, 2015
    Publication date: September 8, 2016
    Inventors: Rajmohan Rajagopalan, Michael Stokes, Carolyn Sparling
  • Publication number: 20160261682
    Abstract: Digital asset management with disposition actions based on trigger events are provided. A management service transmits actions to an asset manager to prompt the asset manager to customize the actions. The actions include operations to dispose of digital assets of an asset owner based on a detection of a trigger event. The management service detects a customization and/or a selection of a subset of the actions by the asset manager and monitors the digital assets to detect the trigger event. Once the management service detects the trigger event, the management service executes the subset of the actions to dispose of the digital assets.
    Type: Application
    Filed: May 27, 2015
    Publication date: September 8, 2016
    Inventors: Rajmohan Rajagopalan, Michael Stokes
  • Publication number: 20160260187
    Abstract: Provisioning of digital asset management is provided. A service such as a management service retrieves digital assets from external resources in response to a search of the external resources. The digital assets are classified to asset categories, which are used to match the digital assets to suggested actions to dispose of the digital assets in case of an incapacitation of the asset owner. The digital assets, the asset categories, suggested trigger events, or the suggested actions are transmitted to an asset manager to prompt the asset manager customize the digital assets, the asset categories, suggested trigger events, or the suggested actions. A workflow is created from the digital assets, the asset categories, the suggested trigger events, and the suggested actions to dispose of the digital assets in case of the incapacitation of the asset owner.
    Type: Application
    Filed: May 26, 2015
    Publication date: September 8, 2016
    Inventors: Rajmohan Rajagopalan, Michael Stokes
  • Publication number: 20160261597
    Abstract: Responsive actions and strategies in online reputation management with reputation shaping are provided. A service, such as a reputation management service, discovers digital assets associated with a reputation owner hosted by external resources. The reputation management service receives a reputation profile configured by a reputation manager. The reputation profile includes suggestions to shape the online reputation of the reputation owner and credentials to accounts of the reputation owner hosted by the external resources. The digital assets and the reputation profile is matched to the suggested actions. The suggested actions is transmitted to the reputation manager to prompt the reputation manager to select and customize the suggested actions. The reputation management service receives a subset of the suggested actions and performs the subset of the suggested actions to shape the online reputation of the reputation owner.
    Type: Application
    Filed: May 28, 2015
    Publication date: September 8, 2016
    Inventors: Rajmohan Rajagopalan, Michael Stokes, Carolyn Sparling
  • Publication number: 20160259835
    Abstract: Ongoing management for pre-planned handling of digital presence is provided. A service such as a management service monitors continuously monitors digital assets of an asset owner hosted at external resources. A change to the digital assets retrieved from the external resources is analyzed in response to a detection of the change. The change is processed to reclassify the digital assets into asset categories. The digital assets and the asset categories are matched to suggested actions and suggested trigger events. The suggested actions include operations to dispose of the digital assets in case of an incapacitation of the asset owner. A notification is transmitted to an asset manager to prompt the asset manager to review the updates to the digital assets, the asset categories, the suggested actions, and the suggested trigger events.
    Type: Application
    Filed: May 27, 2015
    Publication date: September 8, 2016
    Inventors: Rajmohan Rajagopalan, Michael Stokes
  • Publication number: 20160080406
    Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.
    Type: Application
    Filed: November 18, 2015
    Publication date: March 17, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Art Sadovsky, Rustam Lalkaka, Vivek Sharma, Rajmohan Rajagopalan, Alexander Macleod
  • Patent number: 9210183
    Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.
    Type: Grant
    Filed: December 19, 2013
    Date of Patent: December 8, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Art Sadovsky, Rustam Lalkaka, Vivek Sharma, Rajmohan Rajagopalan, Alexander Macleod
  • Patent number: 9105009
    Abstract: Email-based recovery actions may be provided. A request from a user to perform an action may be received. If the user is determined not to have permission to perform the action, a message may be sent to a second user to approve the requested action. If the second user approves the requested action, the requested action may be performed.
    Type: Grant
    Filed: March 21, 2011
    Date of Patent: August 11, 2015
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Alexander Ian MacLeod, Charlie Chung, Rajmohan Rajagopalan
  • Publication number: 20150180894
    Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.
    Type: Application
    Filed: December 19, 2013
    Publication date: June 25, 2015
    Applicant: MICROSOFT CORPORATION
    Inventors: ART SADOVSKY, RUSTAM LALKAKA, VIVEK SHARMA, RAJMOHAN RAJAGOPALAN, ALEXANDER MACLEOD