Patents by Inventor Ronen Borshack

Ronen Borshack has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10073922
    Abstract: In accordance with one or more aspects of the advertisement-controlled Web page customization discussed herein, functionality allowing an advertisement to set various presentation properties of a Web page is exposed. The advertisement invokes the functionality to set a particular presentation property of the Web page to a corresponding property value in order to customize the presentation of the Web page as desired by the advertisement.
    Type: Grant
    Filed: November 20, 2007
    Date of Patent: September 11, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Ronen Borshack
  • Patent number: 9262423
    Abstract: Storing and retrieving files based on hashes for the files. One method for storing files includes: identifying a file; identifying a hash calculated based on the file; renaming the file based on the hash based on the file; and storing the file in a particular location based on the hash calculated based on the file. Another method for retrieving files includes: identifying a hash for a given file; using the hash, traversing a hierarchical file structure to find a location where the given file should be stored; determining that the file is at the location; and as a result, retrieving the file.
    Type: Grant
    Filed: September 27, 2012
    Date of Patent: February 16, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Ronen Borshack, Anil Francis Thomas, Erez Einav, Philip Ernst Taron
  • Patent number: 8954926
    Abstract: Code coverage detection for interpreted scriptable programming languages avoids source code modification. Each program element of the script is performed by (a) using a debugger to proactively computationally indicate in a coverage data structure that the element was reached, and integrally (b) running non-logger executable code which corresponds to the element. Coverage of lines, statements, and other program elements during script execution can be measured even though the source code has not been instrumented with injected log statements. Proactively generated breakpoints pass control from each coverage-tracked program element into a code coverage debugger which updates the coverage data structure. Comments are skipped. Code coverage detection may be invoked from a command line, an Integrated Development Environment, or another context. The coverage data structure is correlated with the source code to produce a coverage map that is displayed to users showing which source code was performed.
    Type: Grant
    Filed: March 5, 2012
    Date of Patent: February 10, 2015
    Assignee: Microsoft Corporation
    Inventors: Menachem Braun, Ronen Borshack
  • Patent number: 8756594
    Abstract: An enterprise computing system may utilize a management infrastructure that interacts with protected services in the system. The management infrastructure accepts requests through an anti-tamper procedure that specifies a tamper event, a crucial service to be protected, and a remedial action that may be applied when the tamper event occurs on the protected service. The anti-tamper procedure may be created by a system administrator and distributed to one or more client devices in the system. The management infrastructure monitors a protected service in accordance with the operations and actions specified in the anti-tamper procedure thereby ensuring that the integrity of the system is preserved.
    Type: Grant
    Filed: October 28, 2011
    Date of Patent: June 17, 2014
    Assignee: Microsoft Corporation
    Inventors: Alex Umansky, Eli Zeitlin, Ronen Borshack
  • Publication number: 20140089273
    Abstract: Storing and retrieving files based on hashes for the files. One method for storing files includes: identifying a file; identifying a hash calculated based on the file; renaming the file based on the hash based on the file; and storing the file in a particular location based on the hash calculated based on the file. Another method for retrieving files includes: identifying a hash for a given file; using the hash, traversing a hierarchical file structure to find a location where the given file should be stored; determining that the file is at the location; and as a result, retrieving the file.
    Type: Application
    Filed: September 27, 2012
    Publication date: March 27, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Ronen Borshack, Anil Francis Thomas, Erez Einav, Philip Ernst Taron
  • Publication number: 20140059108
    Abstract: Implementing a unified communication system allowing different clients to communicate using different communication modalities to access the same functionality of a remote application. A method includes identifying functionality of an application of a service. The method further includes determining a plurality of communication modalities that can be used to access the functionality of the application of the service by identifying communication modalities identified by a developer as being communication modalities that can be used to access the functionality of the application of the service. The method further includes, based on identifying a plurality of communication modalities that can be used to access the functionality of the application of the service, determining that the functionality of the application is supported by a unified communication function. The method further includes at runtime mapping operation of the plurality of communication modalities to the unified communication function.
    Type: Application
    Filed: August 27, 2012
    Publication date: February 27, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Ronen Borshack, Leonid Verny, Yael Flashner
  • Publication number: 20130232473
    Abstract: Code coverage detection for interpreted scriptable programming languages avoids source code modification. Each program element of the script is performed by (a) using a debugger to proactively computationally indicate in a coverage data structure that the element was reached, and integrally (b) running non-logger executable code which corresponds to the element. Coverage of lines, statements, and other program elements during script execution can be measured even though the source code has not been instrumented with injected log statements. Proactively generated breakpoints pass control from each coverage-tracked program element into a code coverage debugger which updates the coverage data structure. Comments are skipped. Code coverage detection may be invoked from a command line, an Integrated Development Environment, or another context. The coverage data structure is correlated with the source code to produce a coverage map that is displayed to users showing which source code was performed.
    Type: Application
    Filed: March 5, 2012
    Publication date: September 5, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Menachem Braun, Ronen Borshack
  • Publication number: 20130111462
    Abstract: An enterprise computing system may utilize a management infrastructure that interacts with protected services in the system. The management infrastructure accepts requests through an anti-tamper procedure that specifies a tamper event, a crucial service to be protected, and a remedial action that may be applied when the tamper event occurs on the protected service. The anti-tamper procedure may be created by a system administrator and distributed to one or more client devices in the system. The management infrastructure monitors a protected service in accordance with the operations and actions specified in the anti-tamper procedure thereby ensuring that the integrity of the system is preserved.
    Type: Application
    Filed: October 28, 2011
    Publication date: May 2, 2013
    Applicant: Microsoft Corporation
    Inventors: ALEX UMANSKY, Eli Zeitlin, Ronen Borshack
  • Publication number: 20090132359
    Abstract: In accordance with one or more aspects of the advertisement-controlled Web page customization discussed herein, functionality allowing an advertisement to set various presentation properties of a Web page is exposed. The advertisement invokes the functionality to set a particular presentation property of the Web page to a corresponding property value in order to customize the presentation of the Web page as desired by the advertisement.
    Type: Application
    Filed: November 20, 2007
    Publication date: May 21, 2009
    Applicant: MICROSOFT CORPORATION
    Inventor: Ronen Borshack