Patents by Inventor Ratul Mahajan

Ratul Mahajan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150358200
    Abstract: The techniques and/or systems described herein implement a fault handling service that is able to ensure that at least part of a network can avoid congestion (e.g., a link exceeding capacity) as long as a predetermined maximum number of faults is not exceeded. The fault handling service models different combinations of possible faults based on network topology and then computes an amount of traffic to be communicated via individual paths such that congestion is avoided as long as a number of actual faults that occur is less than or equal to the predetermined maximum number of faults.
    Type: Application
    Filed: June 6, 2014
    Publication date: December 10, 2015
    Inventors: Ratul Mahajan, Ming Zhang, Srikanth Kandula, Hongqiang Liu
  • Publication number: 20150358198
    Abstract: The techniques and/or systems described herein are configured to determine a set of update operations to transition a network from an observed network state to a target network state and to generate an update dependency graph used to dynamically schedule the set of update operations based on constraint(s) defined to ensure reliability of the network during the transition. The techniques and/or systems dynamically schedule the set of update operations based on feedback. For example, the feedback may include an indication that a previously scheduled update operation has been delayed, has failed, or has been successfully completed.
    Type: Application
    Filed: June 6, 2014
    Publication date: December 10, 2015
    Inventors: Ratul Mahajan, Ming Zhang, Srikanth Kandula, Hongqiang Liu, Xin Jin
  • Publication number: 20150358209
    Abstract: The techniques and/or systems described herein implement a network management service configured to read and write a state of a network for various applications (e.g., network management applications) so that the applications can operate independently. The network management service is configured to read an observed network state and provide the observed network state to the applications. Subsequently, the network management service receives proposed network states from the applications and uses a state dependency graph to determine whether state conflicts exist between the proposed network states. The network management service also determined whether defined policies are violated by the proposed network states. Finally, the network management service is configured to generate a target network state by merging non-conflicting proposed network states that comply with defined policies and to update (e.g., write) the network state based on the generated target network state.
    Type: Application
    Filed: June 6, 2014
    Publication date: December 10, 2015
    Inventors: Ming Zhang, Ratul Mahajan, Peng Sun, Lihua Yuan
  • Patent number: 9122995
    Abstract: The described implementations relate to data classification. One implementation includes identifying one or more likely classifications for an incoming data item using an algorithm. The implementation can also include providing the one or more identified classifications to a user. A selection of an individual identified classification for the incoming data item can be received from the user. The algorithm can be refined to reflect the selection by the user.
    Type: Grant
    Filed: March 15, 2011
    Date of Patent: September 1, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Bongshin Lee, Ashish Kapoor, Ratul Mahajan, Blaine S. Christian, Saleema Amershi
  • Publication number: 20150227814
    Abstract: A technique for multi-camera object tracking is disclosed that preserves privacy of imagery from each camera or group of cameras. This technique uses secure multi-party computation to compute a distance metric across data from multiple cameras without revealing any information to operators of the cameras except whether or not an object was observed by both cameras. This is achieved by a distance metric learning technique that reduces the computing complexity of secure computation while maintaining object identification accuracy.
    Type: Application
    Filed: April 22, 2015
    Publication date: August 13, 2015
    Inventors: Chun-Te Chu, Jaeyeon Jung, Zicheng Liu, Ratul Mahajan
  • Patent number: 9083560
    Abstract: Described is a visual analytics system for network diagnostics. The visual analytics system obtains network diagnostic-related information from a diagnostic system. The visual analytics system includes an interactive user interface that displays the representations of network components, including network machines and, zero or more links between those components, (e.g., as appropriate based upon selection or dynamic conditions). The user interface includes a main network view that displays representations of network components, a diagnostics view that displays suggested diagnosis results obtained from the diagnostic system, and a performance counter view that displays performance counter data. User interaction with one of the views correspondingly changes the displays in the other views. The system allows effective exploration of multiple levels of detail, e.g.
    Type: Grant
    Filed: April 1, 2010
    Date of Patent: July 14, 2015
    Assignee: MICROSOFT TECHNOLOGIES LICENSING, LLC.
    Inventors: Bongshin Lee, Srikanth Kandula, Ratul Mahajan, Zhicheng Liu
  • Publication number: 20150124968
    Abstract: Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network.
    Type: Application
    Filed: January 12, 2015
    Publication date: May 7, 2015
    Inventors: James Scott, Alice Jane Bernheim Brush, Ratul Mahajan, Stephen Hodges
  • Publication number: 20150120749
    Abstract: Techniques and constructs to facilitate data management can provide improved response time and space efficiency for time-series data such as from connected devices. The constructs may enable receiving a stream of time-series data comprising a plurality of objects and a time identification associated with each of the objects. One or more tags are associated with the objects. The constructs may also chunk the stream into a plurality of contiguous chunks, each including a plurality of objects, create an index associating the time identification and the one or more tags, transmit the chunks to a first, remote storage, and then store the index.
    Type: Application
    Filed: July 24, 2014
    Publication date: April 30, 2015
    Inventors: Amar Phanishayee, Ratul Mahajan, Rayman Preet Singh, Trinabh Gupta, Jaeyeon Jung
  • Patent number: 8977756
    Abstract: Greater network utilization is implemented through dynamic network reconfiguration and allocation of network services and resources based on the data to be transferred and the consumer transferring it. A hierarchical system is utilized whereby requests from lower layers are aggregated before being provided to upper layers, and allocations received from upper layers are distributed to lower layers. To maximize network utilization, paths through the network are reconfigured by identifying specific types of packets that are to be flagged in a specific manner, and then by further identifying specific routing rules to be applied in the transmission of such packets. Network reconfiguration is performed on an incremental basis to avoid overloading a path, and capacity can be reserved along one or more paths to prevent such overloading. Background data is agnostic as to specific transmission times and is utilized to prevent overloading due to reconfiguration.
    Type: Grant
    Filed: January 10, 2013
    Date of Patent: March 10, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Vijay Gill, Chi-Yao Hong, Srikanth Kandula, Ratul Mahajan, Mohan Nanduri, Roger Peter Wattenhofer, Ming Zhang
  • Patent number: 8948390
    Abstract: Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network.
    Type: Grant
    Filed: September 29, 2012
    Date of Patent: February 3, 2015
    Assignee: Microsoft Corporation
    Inventors: James Scott, Alice Jane Bernheim Brush, Ratul Mahajan, Stephen Hodges
  • Publication number: 20140380282
    Abstract: Aspects of the subject disclosure are directed towards monitoring application performance during actual use, particularly mobile application performance. Described is instrumenting mobile application binaries to automatically identify a critical path in user transactions, including across asynchronous-call boundaries. Trace data is logged by the instrumented application to capture UI manipulations, thread execution, asynchronous calls and callbacks, UI updates and/or thread synchronization. The trace data is analyzed to assist developers in improving application performance.
    Type: Application
    Filed: June 20, 2013
    Publication date: December 25, 2014
    Inventors: Lenin Ravindranath Sivalingam, Jitendra D. Padhye, Sharad Agarwal, Ratul Mahajan, Ian Obermiller, Shahin Shayandeh
  • Patent number: 8903381
    Abstract: A mobile device roaming architecture for use with a mobile device, such as a cellular phone, roaming a WiFi network. In instances where the mobile device attempts to roam to a different wireless access point managed by a controller using a different authentication key, the roam process can be excessively long such that the voice signal is disrupted or fails entirely. A detection component detects the roaming attempt, and a connection component switches the call back to the original access point controller before the call has a chance to drop. In this way, a connection is maintained to the network. A mitigation component performs an operation to maintain a connection to the call as the mobile device moves out of range of the original access point.
    Type: Grant
    Filed: January 9, 2014
    Date of Patent: December 2, 2014
    Assignee: Microsoft Corporation
    Inventors: Sumit Garg, Ratul Mahajan
  • Patent number: 8825996
    Abstract: Described herein are technologies pertaining to preserving privacy of users of mobile computing devices. Two users of two mobile computing devices share a quantization scheme for quantizing location data using a predefined quantization interval. The two users additionally share a private key that is utilized to encrypt locations obtained by the two computing devices that have been quantized using the shared quantization scheme. Encrypted, quantized locations are compared in a cloud computing service in connection with answering location-based queries, where the comparison is undertaken without the cloud computing service decrypting the encrypted, quantized locations.
    Type: Grant
    Filed: June 17, 2011
    Date of Patent: September 2, 2014
    Assignee: Microsoft Corporation
    Inventors: Jitendra D. Padhye, Ratul Mahajan
  • Publication number: 20140195689
    Abstract: Greater network utilization is implemented through dynamic network reconfiguration and allocation of network services and resources based on the data to be transferred and the consumer transferring it. A hierarchical system is utilized whereby requests from lower layers are aggregated before being provided to upper layers, and allocations received from upper layers are distributed to lower layers. To maximize network utilization, paths through the network are reconfigured by identifying specific types of packets that are to be flagged in a specific manner, and then by further identifying specific routing rules to be applied in the transmission of such packets. Network reconfiguration is performed on an incremental basis to avoid overloading a path, and capacity can be reserved along one or more paths to prevent such overloading. Background data is agnostic as to specific transmission times and is utilized to prevent overloading due to reconfiguration.
    Type: Application
    Filed: January 10, 2013
    Publication date: July 10, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Vijay Gill, Chi-Yao Hong, Srikanth Kandula, Ratul Mahajan, Mohan Nanduri, Roger Wattenhoefer, Ming Zhang
  • Publication number: 20140184803
    Abstract: A technique for multi-camera object tracking is disclosed that preserves privacy of imagery from each camera or group of cameras. This technique uses secure multi-party computation to compute a distance metric across data from multiple cameras without revealing any information to operators of the cameras except whether or not an object was observed by both cameras. This is achieved by a distance metric learning technique that reduces the computing complexity of secure computation while maintaining object identification accuracy.
    Type: Application
    Filed: December 31, 2012
    Publication date: July 3, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Chun-Te Chu, Jaeyeon Jung, Zicheng Liu, Ratul Mahajan
  • Patent number: 8719847
    Abstract: A home device management technique is described that allows a user to manage a network of distributed home devices. Special application modules, driver modules, and service exchange ports are employed. Each application modules implements some functionality in the home, preferably using one or more devices in the home distributed system. Each driver module provides the logic for operating one or multiple distributed home devices and is capable of receiving commands from application modules and sending them to devices, detecting events for an associated type of home device, translating the detected event into a format usable by the application modules and notifying the application modules of the events. Events are communicated between the application modules and the driver modules by using one or more service exchange ports. Access control policies are employed to control access to the home devices.
    Type: Grant
    Filed: September 27, 2010
    Date of Patent: May 6, 2014
    Assignee: Microsoft Corp.
    Inventors: Sharad Agarwal, Paramvir Bahl, Alice Jane Bernheim Brush, Colin Kimm Dixon, Bongshin Lee, Ratul Mahajan, Stefan Saroiu
  • Publication number: 20140113623
    Abstract: A mobile device roaming architecture for use with a mobile device, such as a cellular phone, roaming a WiFi network. In instances where the mobile device attempts to roam to a different wireless access point managed by a controller using a different authentication key, the roam process can be excessively long such that the voice signal is disrupted or fails entirely. A detection component detects the roaming attempt, and a connection component switches the call back to the original access point controller before the call has a chance to drop. In this way, a connection is maintained to the network. A mitigation component performs an operation to maintain a connection to the call as the mobile device moves out of range of the original access point.
    Type: Application
    Filed: January 9, 2014
    Publication date: April 24, 2014
    Applicant: Microsoft Corporation
    Inventors: Sumit Garg, Ratul Mahajan
  • Patent number: 8699424
    Abstract: The subject invention relates to a system and/or methodology that provide improved wireless networking performance by dynamically adapting the channel width. A dynamic adaptation component adjust the channel width based on at least one characteristic of a wireless network, the characteristics can include but are not limited to range, power consumption, throughput, signal to noise ratio (SNR), resilience to delay spread, data rate, and capacity. Additionally, an optimization component can determine an optimum channel width.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: April 15, 2014
    Assignee: Microsoft Corporation
    Inventors: Ranveer Chandra, Ratul Mahajan, Thomas Moscibroda, Paramvir Bahl, Ramya Raghavendra
  • Publication number: 20140093079
    Abstract: Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member of a secure home wireless network. In an example, the temporary wireless network is set up using a secret key known to the new joiner device and the second wireless communications device by virtue of physical proximity. In various examples, the secure, temporary wireless network is used to transfer credentials of the secure home network to the new joiner device which then joins the home network. In an example the temporary wireless network is cancelled once the new joiner device becomes a member of the secure home (or other) wireless network.
    Type: Application
    Filed: September 29, 2012
    Publication date: April 3, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: James Scott, Alice Jane Bernheim Brush, Ratul Mahajan, Stephen Hodges
  • Patent number: 8630637
    Abstract: A mobile device roaming architecture for use with a mobile device, such as a cellular phone, roaming a WiFi network. In instances where the mobile device attempts to roam to a different wireless access point managed by a controller using a different authentication key, the roam process can be excessively long such that the voice signal is disrupted or fails entirely. A detection component detects the roaming attempt, and a connection component switches the call back to the original access point controller before the call has a chance to drop. In this way, a connection is maintained to the network. A mitigation component performs an operation to maintain a connection to the call as the mobile device moves out of range of the original access point.
    Type: Grant
    Filed: May 15, 2008
    Date of Patent: January 14, 2014
    Assignee: Microsoft Corporation
    Inventors: Sumit Garg, Ratul Mahajan