Patents by Inventor Rajmohan Rajagopalan
Rajmohan Rajagopalan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11140045Abstract: Technologies are described herein for changelog transformation and correlation in a multi-tenant cloud service. Components within the multi-tenant cloud service generate changelogs that describe changes made to hardware or software components within the multi-tenant cloud service. The changelogs are received and transformed from different schemas into a common schema. A central change management service (“CCMS”) exposes a network service application programming interface (“API”), or other type of interface, through which other network services can obtain the changelogs that have been transformed into the common schema. For example, services can obtain changelogs in order to correlate changes to anomalies or other events taking place in the multi-tenant cloud service, to identify upstream or downstream components that might be impacted by a change, to provide a user interface for viewing the changelogs, the correlation, or the potential impact of a change, and/or to perform other types of functions.Type: GrantFiled: July 31, 2015Date of Patent: October 5, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Eddie W. M. Fong, Nagaraju Palla, Ricardo Soares Stern, Rajmohan Rajagopalan, Bhavin J. Shah, Narendra Babu Alagiriswamy, Karan Singh Rekhi, Parikshit Patidar
-
Patent number: 10748070Abstract: Technologies are described herein for identification and presentation of changelogs relevant to a tenant of a multi-tenant cloud service. Change feature extraction is performed on changelogs associated with a tenant of the multi-tenant cloud service to identify features associated with the changelogs. Machine learning based classification can then be performed on the changelogs to classify the changelogs. Misclassification correction might also be performed on the classified changelogs. Machine learning can also be utilized to identify a subset of the changelogs as being relevant to the tenant. A user interface (UI) can then be generated and provided to the tenant that includes the subset of the changelogs. The tenant's interaction with the changelogs presented in the UI can be monitored and data describing the interaction can be used to modify machine learning models utilized for machine learning change classification and for determining the relevance of a changelog to the tenant.Type: GrantFiled: July 31, 2015Date of Patent: August 18, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Rajmohan Rajagopalan, Ricardo Soares Stern, Mufaddal M. Pratapgarhwala, Karan Singh Rekhi, Bhavin J. Shah, Eddie W. M. Fong, Nagaraju Palla, Parikshit Patidar
-
Patent number: 10410304Abstract: Provisioning of digital asset management is provided. A service such as a management service retrieves digital assets from external resources in response to a search of the external resources. The digital assets are classified to asset categories, which are used to match the digital assets to suggested actions to dispose of the digital assets in case of an incapacitation of the asset owner. The digital assets, the asset categories, suggested trigger events, or the suggested actions are transmitted to an asset manager to prompt the asset manager customize the digital assets, the asset categories, suggested trigger events, or the suggested actions. A workflow is created from the digital assets, the asset categories, the suggested trigger events, and the suggested actions to dispose of the digital assets in case of the incapacitation of the asset owner.Type: GrantFiled: May 26, 2015Date of Patent: September 10, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Rajmohan Rajagopalan, Michael Stokes
-
Patent number: 10382528Abstract: Digital asset management with disposition actions based on trigger events are provided. A management service transmits actions to an asset manager to prompt the asset manager to customize the actions. The actions include operations to dispose of digital assets of an asset owner based on a detection of a trigger event. The management service detects a customization and/or a selection of a subset of the actions by the asset manager and monitors the digital assets to detect the trigger event. Once the management service detects the trigger event, the management service executes the subset of the actions to dispose of the digital assets.Type: GrantFiled: May 27, 2015Date of Patent: August 13, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Rajmohan Rajagopalan, Michael Stokes
-
Patent number: 10007714Abstract: Ongoing management for pre-planned handling of digital presence is provided. A service such as a management service monitors continuously monitors digital assets of an asset owner hosted at external resources. A change to the digital assets retrieved from the external resources is analyzed in response to a detection of the change. The change is processed to reclassify the digital assets into asset categories. The digital assets and the asset categories are matched to suggested actions and suggested trigger events. The suggested actions include operations to dispose of the digital assets in case of an incapacitation of the asset owner. A notification is transmitted to an asset manager to prompt the asset manager to review the updates to the digital assets, the asset categories, the suggested actions, and the suggested trigger events.Type: GrantFiled: May 27, 2015Date of Patent: June 26, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Rajmohan Rajagopalan, Michael Stokes
-
Publication number: 20170034010Abstract: Technologies are described herein for changelog transformation and correlation in a multi-tenant cloud service. Components within the multi-tenant cloud service generate changelogs that describe changes made to hardware or software components within the multi-tenant cloud service. The changelogs are received and transformed from different schemas into a common schema. A central change management service (“CCMS”) exposes a network service application programming interface (“API”), or other type of interface, through which other network services can obtain the changelogs that have been transformed into the common schema. For example, services can obtain changelogs in order to correlate changes to anomalies or other events taking place in the multi-tenant cloud service, to identify upstream or downstream components that might be impacted by a change, to provide a user interface for viewing the changelogs, the correlation, or the potential impact of a change, and/or to perform other types of functions.Type: ApplicationFiled: July 31, 2015Publication date: February 2, 2017Inventors: Eddie W.M. Fong, Nagaraju Palla, Ricardo Soares Stern, Rajmohan Rajagopalan, Bhavin J. Shah, Narendra Babu Alagiriswamy, Karan Singh Rekhi, Parikshit Patidar
-
Publication number: 20170032268Abstract: Technologies are described herein for identification and presentation of changelogs relevant to a tenant of a multi-tenant cloud service. Change feature extraction is performed on changelogs associated with a tenant of the multi-tenant cloud service to identify features associated with the changelogs. Machine learning based classification can then be performed on the changelogs to classify the changelogs. Misclassification correction might also be performed on the classified changelogs. Machine learning can also be utilized to identify a subset of the changelogs as being relevant to the tenant. A user interface (UI) can then be generated and provided to the tenant that includes the subset of the changelogs. The tenant's interaction with the changelogs presented in the UI can be monitored and data describing the interaction can be used to modify machine learning models utilized for machine learning change classification and for determining the relevance of a changelog to the tenant.Type: ApplicationFiled: July 31, 2015Publication date: February 2, 2017Inventors: Rajmohan Rajagopalan, Ricardo Soares Stern, Mufaddal M. Pratapgarhwala, Karan Singh Rekhi, Bhavin J. Shah, Eddie W.M. Fong, Nagaraju Palla, Parikshit Patidar
-
Publication number: 20160364576Abstract: Large scale system operation may be provided. Upon receiving an action request from a user, a determination may be made as to whether the user requires elevated permissions to perform the action request. In response to determining that the user requires elevated permissions to perform the action request, the action request may be forwarded to a lockbox for evaluation and a permission response may be received from the lockbox.Type: ApplicationFiled: August 25, 2016Publication date: December 15, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Alexander MacLeod, Andrey Lukyanov, Colin Nash, Jaskaran Singh, Rajmohan Rajagopalan, Vivek Sharma
-
Patent number: 9460303Abstract: Large scale system operation may be provided. Upon receiving an action request from a user, a determination may be made as to whether the user requires elevated permissions to perform the action request. In response to determining that the user requires elevated permissions to perform the action request, the action request may be forwarded to a lockbox for evaluation and a permission response may be received from the lockbox.Type: GrantFiled: March 6, 2012Date of Patent: October 4, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Alexander MacLeod, Andrey Lukyanov, Colin Nash, Jaskaran Singh, Rajmohan Rajagopalan, Vivek Sharma
-
Publication number: 20160261635Abstract: Trigger events and confirmation in digital asset management are provided. A service such as a management service monitors digital assets of an asset owner and content associated with the asset owner hosted at external resources. A trigger event is detected within the content or the digital assets. The trigger event identifies information about an incapacitation of the asset owner. A notification is transmitted to an asset manager to prompt the asset manager to validate an incapacitation of the asset owner associated with the trigger event. In response to a confirmation of the incapacitation, actions are executed to dispose of the digital assets.Type: ApplicationFiled: May 27, 2015Publication date: September 8, 2016Inventors: Rajmohan Rajagopalan, Michael Stokes
-
Publication number: 20160261708Abstract: Ongoing management of a shaped online reputation is provided. A service such as a reputation management service monitors digital assets of a reputation owner hosted by external resources based on a reputation profile. The reputation profile is configured by a reputation manager. A change to the digital assets is detected. In response, the change and the reputation profile are processed to match suggested actions with operations to shape the online profile. A description of the suggested actions, the reputation profile, and the change are transmitted to the reputation manager to prompt the reputation manager to customize or confirm the reputation profile and the suggested actions. The suggested actions are executed to shape the online reputation in response to a confirmation to the transmission by the reputation manager.Type: ApplicationFiled: May 28, 2015Publication date: September 8, 2016Inventors: Rajmohan Rajagopalan, Michael Stokes, Carolyn Sparling
-
Publication number: 20160261707Abstract: Sign-up and provisioning in online reputation management with reputation shaping are provided. A service such as a reputation management service authenticates a reputation manager to allow the reputation manager to configure a reputation profile to shape the online reputation associated with a reputation owner. Digital assets associated with the reputation and hosted by external resources are discovered. The digital assets and the reputation profile are analyzed to match suggested actions with operations to shape the online reputation. The digital assets, the reputation profile, and the suggested actions are transmitted to the reputation manager to prompt the reputation manager to customize the reputation profile and the suggested actions to shape the online reputation.Type: ApplicationFiled: May 28, 2015Publication date: September 8, 2016Inventors: Rajmohan Rajagopalan, Michael Stokes, Carolyn Sparling
-
Publication number: 20160261682Abstract: Digital asset management with disposition actions based on trigger events are provided. A management service transmits actions to an asset manager to prompt the asset manager to customize the actions. The actions include operations to dispose of digital assets of an asset owner based on a detection of a trigger event. The management service detects a customization and/or a selection of a subset of the actions by the asset manager and monitors the digital assets to detect the trigger event. Once the management service detects the trigger event, the management service executes the subset of the actions to dispose of the digital assets.Type: ApplicationFiled: May 27, 2015Publication date: September 8, 2016Inventors: Rajmohan Rajagopalan, Michael Stokes
-
Publication number: 20160260187Abstract: Provisioning of digital asset management is provided. A service such as a management service retrieves digital assets from external resources in response to a search of the external resources. The digital assets are classified to asset categories, which are used to match the digital assets to suggested actions to dispose of the digital assets in case of an incapacitation of the asset owner. The digital assets, the asset categories, suggested trigger events, or the suggested actions are transmitted to an asset manager to prompt the asset manager customize the digital assets, the asset categories, suggested trigger events, or the suggested actions. A workflow is created from the digital assets, the asset categories, the suggested trigger events, and the suggested actions to dispose of the digital assets in case of the incapacitation of the asset owner.Type: ApplicationFiled: May 26, 2015Publication date: September 8, 2016Inventors: Rajmohan Rajagopalan, Michael Stokes
-
Publication number: 20160261597Abstract: Responsive actions and strategies in online reputation management with reputation shaping are provided. A service, such as a reputation management service, discovers digital assets associated with a reputation owner hosted by external resources. The reputation management service receives a reputation profile configured by a reputation manager. The reputation profile includes suggestions to shape the online reputation of the reputation owner and credentials to accounts of the reputation owner hosted by the external resources. The digital assets and the reputation profile is matched to the suggested actions. The suggested actions is transmitted to the reputation manager to prompt the reputation manager to select and customize the suggested actions. The reputation management service receives a subset of the suggested actions and performs the subset of the suggested actions to shape the online reputation of the reputation owner.Type: ApplicationFiled: May 28, 2015Publication date: September 8, 2016Inventors: Rajmohan Rajagopalan, Michael Stokes, Carolyn Sparling
-
Publication number: 20160259835Abstract: Ongoing management for pre-planned handling of digital presence is provided. A service such as a management service monitors continuously monitors digital assets of an asset owner hosted at external resources. A change to the digital assets retrieved from the external resources is analyzed in response to a detection of the change. The change is processed to reclassify the digital assets into asset categories. The digital assets and the asset categories are matched to suggested actions and suggested trigger events. The suggested actions include operations to dispose of the digital assets in case of an incapacitation of the asset owner. A notification is transmitted to an asset manager to prompt the asset manager to review the updates to the digital assets, the asset categories, the suggested actions, and the suggested trigger events.Type: ApplicationFiled: May 27, 2015Publication date: September 8, 2016Inventors: Rajmohan Rajagopalan, Michael Stokes
-
Publication number: 20160080406Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.Type: ApplicationFiled: November 18, 2015Publication date: March 17, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Art Sadovsky, Rustam Lalkaka, Vivek Sharma, Rajmohan Rajagopalan, Alexander Macleod
-
Patent number: 9210183Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.Type: GrantFiled: December 19, 2013Date of Patent: December 8, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Art Sadovsky, Rustam Lalkaka, Vivek Sharma, Rajmohan Rajagopalan, Alexander Macleod
-
Patent number: 9105009Abstract: Email-based recovery actions may be provided. A request from a user to perform an action may be received. If the user is determined not to have permission to perform the action, a message may be sent to a second user to approve the requested action. If the second user approves the requested action, the requested action may be performed.Type: GrantFiled: March 21, 2011Date of Patent: August 11, 2015Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Alexander Ian MacLeod, Charlie Chung, Rajmohan Rajagopalan
-
Publication number: 20150180894Abstract: Anomalous activity is detected using event information that is received from accounts from within an online service. Generally, anomalous activity is detected by comparing a baseline profile that includes past event information for accounts of the online service with a recent profile that includes recent event information for the accounts. Anomalous activity is detected when the recent profile shows that one or more events are occurring more frequently as compared to the occurrence of the event the associated baseline profile. The events that are recorded and used in the anomaly detection may include all or a portion of events that are monitored by the online service. One or more reports may also be automatically generated and provided to one or more users to show activity that may be considered anomalous activity.Type: ApplicationFiled: December 19, 2013Publication date: June 25, 2015Applicant: MICROSOFT CORPORATIONInventors: ART SADOVSKY, RUSTAM LALKAKA, VIVEK SHARMA, RAJMOHAN RAJAGOPALAN, ALEXANDER MACLEOD