Patents by Inventor Sergey Bykov

Sergey Bykov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11184418
    Abstract: Technologies are described herein for event delivery and stream processing utilizing virtual processing agents. Upon receiving an event publication in a queue, a runtime system identifies one or more virtual processing agents that might be interested in, but have not explicitly subscribed to, the published event. Event information of the published event is then delivered to the identified virtual processing agents. Prior to the actual delivery, the runtime system further determines if the virtual processing agents have been activated and activates those processing agents that have not been activated. Based on the received event information, some of the virtual processing agents might decide to explicitly submit subscriptions to receive more events from the queue. The explicit subscriptions will trigger the runtime system to deliver the subscribed events to the processing agents, which might include past events that have been published in the queue before the explicit subscription is received.
    Type: Grant
    Filed: December 23, 2019
    Date of Patent: November 23, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Henry Hooper Somuah, Sergey Bykov, Tamir Melamed, Robert Louis Rodi, Felix Cheung, Michael William Malyuk, Andrew Alexander Hesky, Gabriel Kliot, Jorgen Thelin, Alan Stuart Geller
  • Patent number: 10725819
    Abstract: A system and method is disclosed for scheduling and allocating data storage. An example method comprises generating a scheduling problem based at least on states of each of the plurality of storage nodes, a received plurality of storage tasks and received constraints, wherein the scheduling problem is a constraint satisfaction problem, selecting one or more approaches to solving the scheduling problem based on metadata associated with the storage tasks and constraints, solving the scheduling problem to generate a scheduling solution based on the one or more approaches, determining whether the given constraints are satisfied by the scheduling solution, executing, by the processor, the scheduling solution by assigning storage of data to each of the plurality of storage nodes when the constraints are satisfied by the scheduling solution and determining another scheduling solution based on the one or more approaches when the constraints are not satisfied by the scheduling solution.
    Type: Grant
    Filed: May 18, 2018
    Date of Patent: July 28, 2020
    Assignee: Acronis International GmbH
    Inventors: Sergey Bykov, Eugene Aseev, Sanjeev Solanki, Serguei Beloussov, Stanislav Protasov
  • Publication number: 20200137132
    Abstract: Technologies are described herein for event delivery and stream processing utilizing virtual processing agents. Upon receiving an event publication in a queue, a runtime system identifies one or more virtual processing agents that might be interested in, but have not explicitly subscribed to, the published event. Event information of the published event is then delivered to the identified virtual processing agents. Prior to the actual delivery, the runtime system further determines if the virtual processing agents have been activated and activates those processing agents that have not been activated. Based on the received event information, some of the virtual processing agents might decide to explicitly submit subscriptions to receive more events from the queue. The explicit subscriptions will trigger the runtime system to deliver the subscribed events to the processing agents, which might include past events that have been published in the queue before the explicit subscription is received.
    Type: Application
    Filed: December 23, 2019
    Publication date: April 30, 2020
    Inventors: Henry Hooper Somuah, Sergey Bykov, Tamir Melamed, Robert Louis Rodi, Felix Cheung, Michael William Malyuk, Andrew Alexander Hesky, Gabriel Kliot, Jorgen Thelin, Alan Stuart Geller
  • Patent number: 10554709
    Abstract: Technologies are described herein for event delivery and stream processing utilizing virtual processing agents. Upon receiving an event publication in a queue, a runtime system identifies one or more virtual processing agents that might be interested in, but have not explicitly subscribed to, the published event. Event information of the published event is then delivered to the identified virtual processing agents. Prior to the actual delivery, the runtime system further determines if the virtual processing agents have been activated and activates those processing agents that have not been activated. Based on the received event information, some of the virtual processing agents might decide to explicitly submit subscriptions to receive more events from the queue. The explicit subscriptions will trigger the runtime system to deliver the subscribed events to the processing agents, which might include past events that have been published in the queue before the explicit subscription is received.
    Type: Grant
    Filed: July 8, 2014
    Date of Patent: February 4, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Henry Hooper Somuah, Sergey Bykov, Tamir Melamed, Robert Louis Rodi, Felix Cheung, Michael William Malyuk, Andrew Alexander Hesky, Gabriel Kliot, Jorgen Thelin, Alan Stuart Geller
  • Publication number: 20190354399
    Abstract: A system and method is disclosed for scheduling and allocating data storage. An example method comprises generating a scheduling problem based at least on states of each of the plurality of storage nodes, a received plurality of storage tasks and received constraints, wherein the scheduling problem is a constraint satisfaction problem, selecting one or more approaches to solving the scheduling problem based on metadata associated with the storage tasks and constraints, solving the scheduling problem to generate a scheduling solution based on the one or more approaches, determining whether the given constraints are satisfied by the scheduling solution, executing, by the processor, the scheduling solution by assigning storage of data to each of the plurality of storage nodes when the constraints are satisfied by the scheduling solution and determining another scheduling solution based on the one or more approaches when the constraints are not satisfied by the scheduling solution.
    Type: Application
    Filed: May 18, 2018
    Publication date: November 21, 2019
    Inventors: Sergey BYKOV, Eugene ASEEV, Sanjeev SOLANKI, Serguei BELOUSSOV, Stanislav PROTASOV
  • Publication number: 20160014175
    Abstract: Technologies are described herein for event delivery and stream processing utilizing virtual processing agents. Upon receiving an event publication in a queue, a runtime system identifies one or more virtual processing agents that might be interested in, but have not explicitly subscribed to, the published event. Event information of the published event is then delivered to the identified virtual processing agents. Prior to the actual delivery, the runtime system further determines if the virtual processing agents have been activated and activates those processing agents that have not been activated. Based on the received event information, some of the virtual processing agents might decide to explicitly submit subscriptions to receive more events from the queue. The explicit subscriptions will trigger the runtime system to deliver the subscribed events to the processing agents, which might include past events that have been published in the queue before the explicit subscription is received.
    Type: Application
    Filed: July 8, 2014
    Publication date: January 14, 2016
    Inventors: Henry Hooper Somuah, Sergey Bykov, Tamir Melamed, Robert Louis Rodi, Felix Cheung, Michael William Malyuk, Andrew Alexander Hesky, Gabriel Kliot, Jorgen Thelin, Alan Stuart Geller
  • Patent number: 8308063
    Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.
    Type: Grant
    Filed: July 8, 2011
    Date of Patent: November 13, 2012
    Assignee: Microsoft Corporation
    Inventors: Sergey Bykov, Charles J. Williams, Craig Jensen
  • Publication number: 20110264587
    Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.
    Type: Application
    Filed: July 8, 2011
    Publication date: October 27, 2011
    Applicant: MICROSOFT CORPORATION
    Inventors: Sergey Bykov, Charles J. Williams, Craig Jensen
  • Patent number: 7975916
    Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.
    Type: Grant
    Filed: November 17, 2008
    Date of Patent: July 12, 2011
    Assignee: Microsoft Corporation
    Inventors: Sergey Bykov, Charles J. Williams, Craig Jensen
  • Publication number: 20090083189
    Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.
    Type: Application
    Filed: November 17, 2008
    Publication date: March 26, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Sergey Bykov, Charles J. Williams, Craig Jensen
  • Patent number: 7451926
    Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.
    Type: Grant
    Filed: November 3, 2006
    Date of Patent: November 18, 2008
    Assignee: Microsoft Corporation
    Inventors: Sergey Bykov, Charles J. Williams, Craig Jensen
  • Publication number: 20080126929
    Abstract: The claimed subject matter relates to an architecture or arrangement that can facilitate a UI session between a smart device and a UI station in an application-agnostic manner. The UI station can expose a set of available peripherals to the smart device in order to provide the smart device with a richer user interface (UI) as well as additional features and/or options. Applications running on the smart device can utilize all or a subset of the available peripherals of the UI station for displaying (e.g., output peripherals) and navigating (e.g., input peripherals) the smart device's UI. As a result, smart devices that are smaller, less expensive, more durable, more convenient to carry, etc. can provide a user with a very feature-rich and/or intuitive UI.
    Type: Application
    Filed: November 29, 2006
    Publication date: May 29, 2008
    Applicant: MICROSOFT CORPORATION
    Inventor: Sergey Bykov
  • Publication number: 20080109372
    Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.
    Type: Application
    Filed: November 3, 2006
    Publication date: May 8, 2008
    Applicant: MICROSOFT CORPORATION
    Inventors: Sergey Bykov, Charles J. Williams, Craig Jensen
  • Publication number: 20070256070
    Abstract: The deployment of multiple embedded operating system components provides a designer with flexibility when customizing an embedded operating system for a target computing device. The embedded operating system components provide extra features to expand the functionality of the target computing device. The ease with which the designer may select various embedded operating system components to deploy from an originating computing device to the target computing device simplifies the design process. Configuration data of a core embedded operating system and configuration data of the deployed embedded operating system components are merged and any conflicts between configuration data are automatically resolved without rebooting the target computing device.
    Type: Application
    Filed: April 27, 2006
    Publication date: November 1, 2007
    Applicant: Microsoft Corporation
    Inventors: Sergey Bykov, Charles Williams, Craig Jensen, Harlan Husmann, Janine Harrison
  • Publication number: 20070061818
    Abstract: A host operating system (e.g., WinPE®) detects hardware devices connected to a computing device and stores identifiers (if any) of detected hardware devices in a datastore (e.g., the WinPE® registry). Without performing a detection process, a setup program accesses the datastore to obtain identifiers of hardware devices attached to the computing device. The setup program uses a mapping file (which maps hardware devices to drivers of a set of driver files) to determine which drivers of the set of driver files are usable by the detected hardware devices. The setup file then installs the “selected” drivers into the computing device.
    Type: Application
    Filed: September 12, 2005
    Publication date: March 15, 2007
    Applicant: Microsoft Corporation
    Inventors: Charles Williams, Craig Jensen, Harlan Husmann, Janine Harrison, Sergey Bykov
  • Publication number: 20070055574
    Abstract: POS device statistics information is managed such that the information is available commonly without the device being claimed by one application during retrieval of statistics information. A helper class DeviceStatistics object facilitates storing of statistics information in a common statistic repository that may be hardware based or software based, for example an XML file. The helper class also facilitates retrieval and forwarding of the statistics information to a managing POS application employing a service object for the POS device. A Windows Service based statistics service is used to retrieve the statistics information from the common statistic repository and generate performance monitor counters. The performance monitor counters are provided to requesting applications.
    Type: Application
    Filed: August 31, 2005
    Publication date: March 8, 2007
    Applicant: Microsoft Corporation
    Inventors: Craig Jensen, Harlan Husmann, Janine Harrison, Sergey Bykov, Timothy Belvin
  • Publication number: 20070050750
    Abstract: An extensible data-driven setup application is provided for installing operating systems. Instead of performing installation operations itself, the host application determines individual tasks from a configuration file. The host application then instantiates and calls modules that perform the specific installation tasks including user interface screens, setup actions, data imports, and the like as defined in the configuration file. The modules are combined in module assemblies. The configuration file and the module assemblies may be customized for different sets of setup tasks, sequences of tasks, and content.
    Type: Application
    Filed: August 31, 2005
    Publication date: March 1, 2007
    Applicant: Microsoft Corporation
    Inventors: Sergey Bykov, Craig Jensen, Harlan Husmann, Charles Williams
  • Publication number: 20070050751
    Abstract: Automatic interoperation functionality for legacy POS service and control objects is provided. In response to a request for creating an instance for a control object that implements an interface for the POS device, a legacy interoperability subsystem determines a unique identifier associated with the control object. The legacy interoperability subsystem dynamically generates an in-memory proxy class, based on the unique identifier. Thereby, the legacy subsystem enables the POS service application and the POS device to communicate with each other without having to instantiate one or more proxy classes for each instance of the legacy control object.
    Type: Application
    Filed: August 31, 2005
    Publication date: March 1, 2007
    Applicant: Microsoft Corporation
    Inventors: Harlan Husmann, Craig Jensen, Janine Harrison, Sergey Bykov, Timothy Belvin
  • Publication number: 20050257226
    Abstract: The present invention provides Plug and Play (PnP) functionality for devices that are not supported by an operating system. In response to the installation of an unsupported device, the operating system sends the event to a device manager application residing in user mode code. Upon receiving the event, the device manager application automatically installs the supporting configuration entries and software. After the device is installed, the device is accessible from an application without requiring any programming changes. Events are exposed to the application through a through a common control library (CCL). The library is directed at providing a generic interface for accessing the devices. Using the CCL the registered applications may receive events associated with the device.
    Type: Application
    Filed: September 22, 2004
    Publication date: November 17, 2005
    Applicant: Microsoft Corporation
    Inventors: Timothy Belvin, Harlan Husmann, Craig Jensen, Janine Harrison, Sergey Bykov, Sylvester La Blanc