Patents by Inventor Sameet Agarwal
Sameet Agarwal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180349419Abstract: Data sharding partitions data associated with an application into multiple shards in which each shard stores a subset of the data. A shard is further divided into multiple microshards in which each microshard contains a subset of the shard data. A set of microshards are assigned to a specified shard. The assignment of microshards can change, e.g., when new shards are added and microshards are migrated from one shard to another shard. A microshard map, which indicates a mapping between the microshards and shards, is updated automatically when the assignments change. After identifying the shard to which a specified microshard is assigned using the microshard map, a data access request from a client device is automatically forwarded to the appropriate shard. Because data can be accessed efficiently regardless of whether the number of shards changes, the data sharding facilitates provisioning of the shards on a need basis.Type: ApplicationFiled: June 2, 2017Publication date: December 6, 2018Inventors: Muthukaruppan Annamalai, Sumeet Ungratwar, Daniel Arraes Pereira, Benjamin Francois Marie Renard, Sameet Agarwal
-
Patent number: 7493352Abstract: A technique for representing the structure of hierarchically-organized data in a non-hierarchical data structure, such as a relation. The hierarchically-organized data is represented as a tree, and each node in the tree is assigned a position identifier that represents both the depth level of the node within the hierarchy, and its ancestor/descendant relationship to other nodes. The data represented by each node, as well as its position identifier, is stored in a row of a relational database, thereby capturing the hierarchical structure of the data in such relational database. A technique is provided for the compressed storage of position identifiers in a format that allows an efficient bytewise comparison of position identifiers to determine relative order and ancestry.Type: GrantFiled: August 24, 2004Date of Patent: February 17, 2009Assignee: Microsoft CorporationInventors: Patrick Eugene O'Neil, Elizabeth Jean O'Neil, Shankar Pal, Gideon Schaller, Istvan Cseri, Jose A. Blakeley, Nigel Clifton Westbury, Sameet Agarwal, F. Soner Terek
-
Patent number: 7428546Abstract: Various embodiments of the present invention are directed to a data store comprising Items, Elements, and Relationships. An Item is a unit of data storable in a data store and further comprises said Element and said Relationship. An Element is an instance of a type comprising one or more fields. A Relationship is a link between at least two Items. The data store further comprising a Core Schema to define a set of Core Items by which a hardware/software interface system understands and directly processes said set of Core Items in a predetermined and predictable way. The Core Items are derived (directly or indirectly) from a common single Base Item which, in turn, is a foundational Item in a Base Schema.Type: GrantFiled: August 21, 2003Date of Patent: September 23, 2008Assignee: Microsoft CorporationInventors: Anil K. Nori, Sameet Agarwal, J. Patrick Thompson, Pedro Celis, David G. Campbell, F. Soner Terek
-
Patent number: 7421445Abstract: A technique for representing the structure of hierarchically-organized data in a non-hierarchical data structure, such as a relation. The hierarchically-organized data is represented as a tree, and each node in the tree is assigned a position identifier that represents both the depth level of the node within the hierarchy, and its ancestor/descendant relationship to other nodes. The data represented by each node, as well as its position identifier, is stored in a row of a relational database, thereby capturing the hierarchical structure of the data in such relational database. A technique is provided for the compressed storage of position identifiers in a format that allows an efficient bytewise comparison of position identifiers to determine relative order and ancestry.Type: GrantFiled: August 24, 2004Date of Patent: September 2, 2008Assignee: Microsoft CorporationInventors: Patrick Eugene O'Neil, Elizabeth Jean O'Neil, Shankar Pal, Gideon Schaller, Istvan Cseri, Jose A. Blakeley, Nigel Clifton Westbury, Sameet Agarwal, F. Soner Terek
-
Publication number: 20080022358Abstract: The present invention relates to a system and methodology to facilitate security for data items residing within (or associated with) a hierarchical database or storage structure. A database security system is provided having a hierarchical data structure associated with one or more data items. The system includes a security component that applies a security policy to the data items from a global location or region associated with a database. Various components and processes are employed to enable explicit and/or inherited security properties to be received by and propagated to the data items depending on the type of data structure encountered or processed.Type: ApplicationFiled: July 30, 2007Publication date: January 24, 2008Applicant: MICROSOFT CORPORATIONInventors: Sameet Agarwal, Balan Raman, Sanjay Anand, Paul Leach, Richard Ward
-
Publication number: 20070255699Abstract: A file namespace hierarchy bypass and method to access files are provided. The bypass can be employed, for example, as a computer-readable medium with instructions for generating a unique identifier associated with a file and instructions for accessing the file based on the unique identifier and a specified search space. A computer-readable medium having instructions for obtaining the unique identifier and specified search space associated with the file and instructions for generating a path designation by combining the unique identifier and the specified search space used to access the file may also be employed. The method for bypassing the namespace hierarchy of the file, for example, may include passing the unique identifier and specified search space to a program and accessing the file based on a path designation generated by the program by combining the unique identifier and specified search space.Type: ApplicationFiled: April 28, 2006Publication date: November 1, 2007Applicant: Microsoft CorporationInventors: Mahesh Sreenivas, Stefan Steiner, Arkadi Brjazovski, Sameet Agarwal
-
Publication number: 20070214190Abstract: A file stream exchange system and method are provided. The system can be employed, for example, with a storage system that supports transactions as a primary mechanism and employs a rich type system. The system provides a mechanism for the storage system to provide reliable updates to file streams while preserving the common criteria for security. The system employs a unique way of remapping the file-streams associated with the file-backed items that eliminates the need for copying over basic attributes, security information and timestamps etc. Significantly, the system does not rename the files involved in the operation nor does the system rely on attribute tunneling to copy over any subset of attributes for the completion of the task. The system includes a replace stream component which is a kernel mode mechanism that allows transactional exchange of stream data of two file-backed items without violating the common criteria for security.Type: ApplicationFiled: February 17, 2006Publication date: September 13, 2007Applicant: Microsoft CorporationInventors: Mahesh Sreenivas, Arkadi Brjazovski, Stefan Steiner, Rohan Kumar, Sameet Agarwal
-
Publication number: 20060195476Abstract: Data management between a common data store and multiple applications of multiple disparate application frameworks. A data storage component is provided that facilitates the storage of data, which data includes structured, semi-structured, and unstructured data. A common data platform interfaces to the data storage component to provide data services accessible by a plurality of disparate application frameworks, which data services allow a corresponding application of the different frameworks to access the data.Type: ApplicationFiled: June 30, 2005Publication date: August 31, 2006Applicant: Microsoft CorporationInventors: Anil Nori, Sameet Agarwal, Jose Blakeley, Pedro Celis, Praveen Seshadri, Soner Terek, Arthur Whitten, Dale Woodford
-
Publication number: 20060190500Abstract: A system and method for synchronizing a database comprising raw data and metadata derived from the raw data, but when the metadata has not yet been updated. The raw data and the metadata are first synchronized, with the raw data having been assigned a version number. After synchronization, any stale metadata will be updated and assigned the same version number as the raw data.Type: ApplicationFiled: February 22, 2005Publication date: August 24, 2006Applicant: Microsoft CorporationInventors: Majesh Rao, Sameet Agarwal, Irena Hudis, Vivek Jhaveri, Lev Novik
-
Publication number: 20060136418Abstract: Various embodiments of the present invention are directed to systems and methods for synchronizing mixed elements (MEs) comprising structure data and unstructured filestreams between peer computer systems in a hardware/software interface system environment that does not permit snapshotting of large unstructured ME filestreams during synchronization. For several such embodiments, the method comprises synchronizing the ME in two steps, one for snapshotting the structured data component of the ME (as well as the cv of the filestream but not the filestream itself) and one for locking and transmitting the filestream to the receiving sync peer if and only if, after being locked, it is determined that the filestream is unchanged from the time of the ME data component snapshot.Type: ApplicationFiled: December 20, 2004Publication date: June 22, 2006Applicant: Microsoft CorporationInventors: Irena Hudis, Lev Novik, Rajesh Rao, Sameet Agarwal, Vivek Jhaveri
-
Publication number: 20050283603Abstract: Systems and methodologies for integration of an anti virus AV Plug In(s) as part of an Item Store. The semantics for operation of the AV Plug In(s) are provided by the relational Item Store, via employing a metadata component and a scanning component associated with the Item Store. The metadata component can supply a signature value being associated with the Item Store that can represent the time of scanning of data, and outcome for every scanned item. The scanning component can provide for a queuing of items in the data store in a synchronous and/or asynchronous mode for both scanning and cleaning by the AV Plug In supplied by vendors.Type: ApplicationFiled: October 6, 2004Publication date: December 22, 2005Applicant: Microsoft CorporationInventors: Balan Raman, Sameet Agarwal, Nigel Ellis, Sanjay Anand, Rohan Kumar, Johannes Klein, Mihai Costea
-
Patent number: 6889226Abstract: A technique for representing the structure of hierarchically-organized data in a non-hierarchical data structure, such as a relation. The hierarchically-organized data is represented as a tree, and each node in the tree is assigned a position identifier that represents both the depth level of the node within the hierarchy, and its ancestor/descendant relationship to other nodes. The data represented by each node, as well as its position identifier, is stored in a row of a relational database, thereby capturing the hierarchical structure of the data in such relational database. A technique is provided for the compressed storage of position identifiers in a format that allows an efficient bytewise comparison of position identifiers to determine relative order and ancestry.Type: GrantFiled: November 30, 2001Date of Patent: May 3, 2005Assignee: Microsoft CorporationInventors: Patrick Eugene O'Neil, Elizabeth Jean O'Neil, Shankar Pal, Gideon Schaller, Istvan Cseri, Jose A. Blakeley, Nigel Clifton Westbury, Sameet Agarwal, F. Soner Terek
-
Publication number: 20050091518Abstract: The present invention relates to a system and methodology to facilitate security for data items residing within (or associated with) a hierarchical database or storage structure. A database security system is provided having a hierarchical data structure associated with one or more data items. The system includes a security component that applies a security policy to the data items from a global location or region associated with a database. Various components and processes are employed to enable explicit and/or inherited security properties to be received by and propagated to the data items depending on the type of data structure encountered or processed.Type: ApplicationFiled: October 23, 2003Publication date: April 28, 2005Inventors: Sameet Agarwal, Balan Raman, Sanjay Anand, Paul Leach, Richard Ward
-
Publication number: 20050091285Abstract: The present invention relates to a system and methodology to facilitate interoperability and compatibility between disparate data systems. In one aspect, a file transformation system is provided having at least one file associated with one or more unstructured properties. A file property handler manipulates the unstructured properties in accordance with one or more structured properties associated with a structured object store environment. If an unstructured file is to be operated in the context of a structured object store environment, a promotion operation is performed to update unstructured properties in the file with structured properties suitable for operation in the structured object store environment. If a promoted item were to be manipulated in the structured object store environment, a demotion operation or reverse transformation is performed to update properties in the file.Type: ApplicationFiled: October 23, 2003Publication date: April 28, 2005Inventors: Prasanna Krishnan, Sambavi Muthukrishnan, Sameet Agarwal, Balan Raman, Michael Deem
-
Publication number: 20050076331Abstract: Techniques and tools for implementing a source code annotation language are described. In one aspect, keywords are added to a function interface to define a contract for the function independent of function call context. In another aspect, annotations are inserted at global variables, formal parameters, return values, or user-defined types. The annotations include, for example, properties and qualifiers. A property can indicate, for example, a characteristic of a buffer. In another aspect, an annotation indicates that a value has usability properties sufficient to allow a function to rely on the value, where the usability properties depend on value type.Type: ApplicationFiled: October 2, 2003Publication date: April 7, 2005Inventors: Manuvir Das, Manuel Fahndrich, Ramanathan Venkatapathy, Daniel Weise, William Hudson, Sameet Agarwal, William Shihara, Hannes Ruescher, Spencer Low, F. Terek
-
Publication number: 20050049993Abstract: Various embodiments of the present invention are directed to a data store comprising Items, Elements, and Relationships. An Item is a unit of data storable in a data store and further comprises said Element and said Relationship. An Element is an instance of a type comprising one or more fields. A Relationship is a link between at least two Items. The data store further comprising a Core Schema to define a set of Core Items by which a hardware/software interface system understands and directly processes said set of Core Items in a predetermined and predictable way. The Core Items are derived (directly or indirectly) from a common single Base Item which, in turn, is a foundational Item in a Base Schema.Type: ApplicationFiled: August 21, 2003Publication date: March 3, 2005Inventors: Anil Nori, Sameet Agarwal, J. Thompson, Pedro Celis, David Campbell, F. Terek
-
Publication number: 20050039001Abstract: Administering digital security is disclosed. Data and method items are stored on a computer system in a volume. The volume is divided up into non-overlapping security zones. Each item exists in a security zone. Security rules are granted to principals where the security rules apply to items in a particular zone. The security rules specify what principals have what rights; such as read, write delete and execute; to what items. Administrative rights can be delegated by principals by splitting a security zone to form two security zones. Principals who have administrative rights to the security zone assign additional principals to one of the security zones while maintaining all administrative rights to the other zone. Thus principals can retain certain administrative rights to certain items exclusively to themselves while delegating administrative rights to other items to other principals.Type: ApplicationFiled: July 30, 2003Publication date: February 17, 2005Inventors: Irena Hudis, Lev Novik, Sanjay Anand, Sameet Agarwal, Balan Raman
-
Publication number: 20050027743Abstract: A technique for representing the structure of hierarchically-organized data in a non-hierarchical data structure, such as a relation. The hierarchically-organized data is represented as a tree, and each node in the tree is assigned a position identifier that represents both the depth level of the node within the hierarchy, and its ancestor/descendant relationship to other nodes. The data represented by each node, as well as its position identifier, is stored in a row of a relational database, thereby capturing the hierarchical structure of the data in such relational database. A technique is provided for the compressed storage of position identifiers in a format that allows an efficient bytewise comparison of position identifiers to determine relative order and ancestry.Type: ApplicationFiled: August 24, 2004Publication date: February 3, 2005Applicant: Microsoft CorporationInventors: Patrick O'Neil, Elizabeth O'Neil, Shankar Pal, Gideon Schaller, Istvan Cseri, Jose Blakeley, Nigel Westbury, Sameet Agarwal, F. Terek
-
Publication number: 20050027728Abstract: A technique for representing the structure of hierarchically-organized data in a non-hierarchical data structure, such as a relation. The hierarchically-organized data is represented as a tree, and each node in the tree is assigned a position identifier that represents both the depth level of the node within the hierarchy, and its ancestor/descendant relationship to other nodes. The data represented by each node, as well as its position identifier, is stored in a row of a relational database, thereby capturing the hierarchical structure of the data in such relational database. A technique is provided for the compressed storage of position identifiers in a format that allows an efficient bytewise comparison of position identifiers to determine relative order and ancestry.Type: ApplicationFiled: August 24, 2004Publication date: February 3, 2005Applicant: Microsoft CorporationInventors: Patrick O'Neil, Elizabeth O'Neil, Shankar Pal, Gideon Schaller, Istvan Cseri, Jose Blakeley, Nigel Westbury, Sameet Agarwal, F. Terek
-
Publication number: 20050021549Abstract: A technique for representing the structure of hierarchically-organized data in a non-hierarchical data structure, such as a relation. The hierarchically-organized data is represented as a tree, and each node in the tree is assigned a position identifier that represents both the depth level of the node within the hierarchy, and its ancestor/descendant relationship to other nodes. The data represented by each node, as well as its position identifier, is stored in a row of a relational database, thereby capturing the hierarchical structure of the data in such relational database. A technique is provided for the compressed storage of position identifiers in a format that allows an efficient bytewise comparison of position identifiers to determine relative order and ancestry.Type: ApplicationFiled: August 24, 2004Publication date: January 27, 2005Applicant: Microsoft CorporationInventors: Patrick O'Neil, Elizabeth O'Neil, Shankar Pal, Gideon Schaller, Istvan Cseri, Jose Blakeley, Nigel Westbury, Sameet Agarwal, F. Terek