Patents by Inventor Roman Batoukov
Roman Batoukov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220407779Abstract: Examples described herein generally relate to receiving a query context for service events occurring on one or more networks, determining, based on the query context, a set of service events occurring on the one or more networks, querying multiple layers of a multiple-layer relational graph to determine one or more other service events having a defined relationship with the set of service events at one or more of the multiple layers, where the multiple layers include a configuration layer, an observation layer, and learned layer, defining relationships between services or service events, and indicating, via a user interface and in response to the query context, the one or more other service events.Type: ApplicationFiled: May 11, 2022Publication date: December 22, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Sai Sankalp ARRABOLU, Anastasiia PRONSKA, Thomas William POTTHAST, III, Roman BATOUKOV, John Anthony MORMAN, Suren AGHAJANYAN
-
Publication number: 20220269908Abstract: Systems and methods for data anomaly detection include recommending one or more algorithms from a set of algorithms to process received time series data, wherein the one or more algorithms are recommended based at least in part on a type of workload for processing the received time series data. Assisted parameter tuning is provided for a detected anomaly alert and calibration, and the received time series data is processed based on a user selected algorithm that is parameter tuned, thereby resulting in more efficient and reliable anomaly detection.Type: ApplicationFiled: May 13, 2022Publication date: August 25, 2022Inventors: Roman BATOUKOV, Richard WYDROWSKI, Sai Sankalp ARRABOLU, Zeqiang WANG, Lech GUDALEWICZ, Keiji KANAZAWA, Benjamin J. LOFTON, Thomas W. POTTHAST, Suren AGHAJANYAN, Khoa TRAN, Jian ZHANG
-
Patent number: 11362902Abstract: Examples described herein generally relate to receiving a query context for service events occurring on one or more networks, determining, based on the query context, a set of service events occurring on the one or more networks, querying multiple layers of a multiple-layer relational graph to determine one or more other service events having a defined relationship with the set of service events at one or more of the multiple layers, where the multiple layers include a configuration layer, an observation layer, and learned layer, defining relationships between services or service events, and indicating, via a user interface and in response to the query context, the one or more other service events.Type: GrantFiled: September 11, 2019Date of Patent: June 14, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Sai Sankalp Arrabolu, Anastasiia Pronska, Thomas William Potthast, III, Roman Batoukov, John Anthony Morman, Suren Aghajanyan
-
Patent number: 11341374Abstract: Systems and methods for data anomaly detection include recommending one or more algorithms from a set of algorithms to process received time series data, wherein the one or more algorithms are recommended based at least in part on a type of workload for processing the received time series data. Assisted parameter tuning is provided for a detected anomaly alert and calibration, and the received time series data is processed based on a user selected algorithm that is parameter tuned.Type: GrantFiled: January 14, 2019Date of Patent: May 24, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Roman Batoukov, Richard Wydrowski, Sai Sankalp Arrabolu, Zeqiang Wang, Lech Gudalewicz, Keiji Kanazawa, Benjamin J. Lofton, Thomas W. Potthast, Suren Aghajanyan, Khoa Tran, Jian Zhang
-
Patent number: 11196613Abstract: Examples described herein generally relate to identifying a set of service events corresponding to an incident report, querying a multiple-layer relational graph to determine one or more other service events related to the set of service events, detecting a pattern in the set of service events and a subset of the one or more other service events, and indicating, via a user interface and based on the incident report, the subset of the one or more other service events as related to the incident report.Type: GrantFiled: September 11, 2019Date of Patent: December 7, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Sai Sankalp Arrabolu, Alia Maisel Buckner, Thomas William Potthast, III, Russell Joseph Trupiano, Anastasiia Pronska, Roman Batoukov, John Anthony Morman, Keiji Kanazawa, Navendu Jain, Irina Frumkin
-
Publication number: 20210029003Abstract: Examples described herein generally relate to managing a knowledge graph by providing, to an agent and based on a request from the agent, an output of a number of signals having an indicated correlation in a knowledge graph, receiving, from the agent, additional correlation information for at least a portion of the number of signals and/or additional signals, and storing, in the knowledge graph, the additional correlation information.Type: ApplicationFiled: November 7, 2019Publication date: January 28, 2021Inventors: John Anthony MORMAN, Suren AGHAJANYAN, Irina FRUMKIN, Thomas William POTTHAST, III, Sai Sankalp ARRABOLU, Roman BATOUKOV
-
Publication number: 20200374199Abstract: Examples described herein generally relate to receiving a query context for service events occurring on one or more networks, determining, based on the query context, a set of service events occurring on the one or more networks, querying multiple layers of a multiple-layer relational graph to determine one or more other service events having a defined relationship with the set of service events at one or more of the multiple layers, where the multiple layers include a configuration layer, an observation layer, and learned layer, defining relationships between services or service events, and indicating, via a user interface and in response to the query context, the one or more other service events.Type: ApplicationFiled: September 11, 2019Publication date: November 26, 2020Inventors: Sai Sankalp ARRABOLU, Anastasiia PRONSKA, Thomas William POTTHAST, III, Roman BATOUKOV, John Anthony MORMAN, Suren AGHAJANYAN
-
Publication number: 20200374179Abstract: Examples described herein generally relate to identifying a set of service events corresponding to an incident report, querying a multiple-layer relational graph to determine one or more other service events related to the set of service events, detecting a pattern in the set of service events and a subset of the one or more other service events, and indicating, via a user interface and based on the incident report, the subset of the one or more other service events as related to the incident report.Type: ApplicationFiled: September 11, 2019Publication date: November 26, 2020Inventors: Sai Sankalp ARRABOLU, Alia Maisel BUCKNER, Thomas William POTTHAST, III, Russell Joseph TRUPIANO, Anastasiia PRONSKA, Roman BATOUKOV, John Anthony MORMAN, Keiji KANAZAWA, Navendu JAIN, Irina FRUMKIN
-
Publication number: 20190370610Abstract: Systems and methods for data anomaly detection include recommending one or more algorithms from a set of algorithms to process received time series data, wherein the one or more algorithms are recommended based at least in part on a type of workload for processing the received time series data. Assisted parameter tuning is provided for a detected anomaly alert and calibration, and the received time series data is processed based on a user selected algorithm that is parameter tuned, thereby resulting in more efficient and reliable anomaly detection.Type: ApplicationFiled: January 14, 2019Publication date: December 5, 2019Inventors: Roman BATOUKOV, Richard WYDROWSKI, Sai Sankalp ARRABOLU, Zeqiang WANG, Lech GUDALEWICZ, Keiji KANAZAWA, Benjamin J. LOFTON, Thomas W. POTTHAST, Suren AGHAJANYAN, Khoa TRAN, Jian ZHANG
-
Patent number: 9967258Abstract: A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g.Type: GrantFiled: August 30, 2016Date of Patent: May 8, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Abolade Gbadegesin, Dharma K. Shukla, Thomas A. Galvin, David R. Reed, Nikolay Smolyanskiy, Eric Fleischman, Roman Batoukov
-
Patent number: 9930039Abstract: A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g.Type: GrantFiled: April 11, 2016Date of Patent: March 27, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Abolade Gbadegesin, Dharma K. Shukla, Thomas A. Galvin, David R. Reed, Nikolay Smolyanskiy, Eric Fleischman, Roman Batoukov
-
Publication number: 20160373451Abstract: A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g.Type: ApplicationFiled: August 30, 2016Publication date: December 22, 2016Inventors: Abolade Gbadegesin, Dharma K. Shukla, Thomas A. Galvin, David R. Reed, Nikolay Smolyanskiy, Eric Fleischman, Roman Batoukov
-
Patent number: 9461985Abstract: A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g.Type: GrantFiled: March 25, 2013Date of Patent: October 4, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Abolade Gbadegesin, Dharma K. Shukla, Thomas A. Galvin, David R. Reed, Nikolay Smolyanskiy, Eric Fleischman, Roman Batoukov
-
Publication number: 20160226875Abstract: A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g.Type: ApplicationFiled: April 11, 2016Publication date: August 4, 2016Inventors: Abolade Gbadegesin, Dharma K. Shukla, Thomas A. Galvin, David R. Reed, Nikolay Smolyanskiy, Eric Fleischman, Roman Batoukov
-
Patent number: 8418222Abstract: A representational state transfer-based model for a computing environment uses models resources with links between them. Security principals are resources which can be independently authenticated. Each resource may be associated with an authorization policy that determines level of access, protocol supported. Successfully presenting security credentials at a security principal allows use of an instance of the security principal (i.e. application) as well as generation of an authentication token that can be presented across the computing environment to resources subscribing to the same authorization policy. As security principals with different security policies are authenticated, the appropriate tokens may be combined to allow broader access without undue re-authentication for resources subscribing to the same security policy.Type: GrantFiled: September 30, 2008Date of Patent: April 9, 2013Assignee: Microsoft CorporationInventors: Abolade Gbadegesin, Roman Batoukov, David R. Reed
-
Patent number: 8412930Abstract: A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g.Type: GrantFiled: October 9, 2008Date of Patent: April 2, 2013Assignee: Microsoft CorporationInventors: Abolade Gbadegesin, Dharma K. Shukla, Thomas A. Galvin, David R. Reed, Nikolay Smolyanskiy, Eric Fleischman, Roman Batoukov
-
Publication number: 20100093310Abstract: A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g.Type: ApplicationFiled: October 9, 2008Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Abolade Gbadegesin, Dharma K. Shukla, Thomas A. Galvin, David R. Reed, Nikolay Smolyanskiy, Eric Fleischman, Roman Batoukov
-
Patent number: 7664880Abstract: Delivery of a message over a communications network from a sender based on a single delivery address. The single delivery address is generated as one unit for the message. The single delivery address has a collection of recipient addresses including one or more recipient addresses each identifying at least one recipient of the message. Each of the one or more recipient addresses includes a user level information and a domain level information. The generated single delivery address with the collection of recipient addresses is included in the message. A copy of the message is provided to the identified recipient(s) as a function of the domain level information of the one or more recipient addresses. The message is transmitted over the communications network to the identified recipient(s) recipient based on the collection of recipient addresses.Type: GrantFiled: August 15, 2007Date of Patent: February 16, 2010Assignee: Microsoft CorporationInventors: Nicholas Alexander Allen, Stephen Maine, Sergiy Kuryata, Mark Prentice, Roman Batoukov
-
Patent number: 7613828Abstract: Sending and receiving application or service data through an email transport for mobile computing devices occasionally disconnected from network connectivity. At a sending service or application, application or service data is intercepted from the application or service. The application or service data is packaged in an email message. The email message includes the application or service data within the email envelope and an identification of an application or service client to which the application or service data should be applied at a client computer system. The email message is sent through an email transport to a mobile client computer system which includes the application or service to which the application or service data should be applied. At the client the email message is intercepted. The data is extracted from the email envelope. The application or service client is identified. The data is routed to the appropriate application or service.Type: GrantFiled: January 12, 2007Date of Patent: November 3, 2009Assignee: Microsoft CorporationInventors: William M. Zintel, Roman Batoukov, Sergiy Kuryata
-
Publication number: 20090228967Abstract: A representational state transfer-based model for a computing environment uses models resources with links between them. Security principals are resources which can be independently authenticated. Each resource may be associated with an authorization policy that determines level of access, protocol supported. Successfully presenting security credentials at a security principal allows use of an instance of the security principal (i.e. application) as well as generation of an authentication token that can be presented across the computing environment to resources subscribing to the same authorization policy. As security principals with different security policies are authenticated, the appropriate tokens may be combined to allow broader access without undue re-authentication for resources subscribing to the same security policy.Type: ApplicationFiled: September 30, 2008Publication date: September 10, 2009Applicant: MICROSOFT CORPORATIONInventors: Abolade Gbadegesin, Roman Batoukov, David R. Reed