Patents by Inventor Sergey Bykov
Sergey Bykov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11184418Abstract: Technologies are described herein for event delivery and stream processing utilizing virtual processing agents. Upon receiving an event publication in a queue, a runtime system identifies one or more virtual processing agents that might be interested in, but have not explicitly subscribed to, the published event. Event information of the published event is then delivered to the identified virtual processing agents. Prior to the actual delivery, the runtime system further determines if the virtual processing agents have been activated and activates those processing agents that have not been activated. Based on the received event information, some of the virtual processing agents might decide to explicitly submit subscriptions to receive more events from the queue. The explicit subscriptions will trigger the runtime system to deliver the subscribed events to the processing agents, which might include past events that have been published in the queue before the explicit subscription is received.Type: GrantFiled: December 23, 2019Date of Patent: November 23, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Henry Hooper Somuah, Sergey Bykov, Tamir Melamed, Robert Louis Rodi, Felix Cheung, Michael William Malyuk, Andrew Alexander Hesky, Gabriel Kliot, Jorgen Thelin, Alan Stuart Geller
-
Patent number: 10725819Abstract: A system and method is disclosed for scheduling and allocating data storage. An example method comprises generating a scheduling problem based at least on states of each of the plurality of storage nodes, a received plurality of storage tasks and received constraints, wherein the scheduling problem is a constraint satisfaction problem, selecting one or more approaches to solving the scheduling problem based on metadata associated with the storage tasks and constraints, solving the scheduling problem to generate a scheduling solution based on the one or more approaches, determining whether the given constraints are satisfied by the scheduling solution, executing, by the processor, the scheduling solution by assigning storage of data to each of the plurality of storage nodes when the constraints are satisfied by the scheduling solution and determining another scheduling solution based on the one or more approaches when the constraints are not satisfied by the scheduling solution.Type: GrantFiled: May 18, 2018Date of Patent: July 28, 2020Assignee: Acronis International GmbHInventors: Sergey Bykov, Eugene Aseev, Sanjeev Solanki, Serguei Beloussov, Stanislav Protasov
-
Publication number: 20200137132Abstract: Technologies are described herein for event delivery and stream processing utilizing virtual processing agents. Upon receiving an event publication in a queue, a runtime system identifies one or more virtual processing agents that might be interested in, but have not explicitly subscribed to, the published event. Event information of the published event is then delivered to the identified virtual processing agents. Prior to the actual delivery, the runtime system further determines if the virtual processing agents have been activated and activates those processing agents that have not been activated. Based on the received event information, some of the virtual processing agents might decide to explicitly submit subscriptions to receive more events from the queue. The explicit subscriptions will trigger the runtime system to deliver the subscribed events to the processing agents, which might include past events that have been published in the queue before the explicit subscription is received.Type: ApplicationFiled: December 23, 2019Publication date: April 30, 2020Inventors: Henry Hooper Somuah, Sergey Bykov, Tamir Melamed, Robert Louis Rodi, Felix Cheung, Michael William Malyuk, Andrew Alexander Hesky, Gabriel Kliot, Jorgen Thelin, Alan Stuart Geller
-
Patent number: 10554709Abstract: Technologies are described herein for event delivery and stream processing utilizing virtual processing agents. Upon receiving an event publication in a queue, a runtime system identifies one or more virtual processing agents that might be interested in, but have not explicitly subscribed to, the published event. Event information of the published event is then delivered to the identified virtual processing agents. Prior to the actual delivery, the runtime system further determines if the virtual processing agents have been activated and activates those processing agents that have not been activated. Based on the received event information, some of the virtual processing agents might decide to explicitly submit subscriptions to receive more events from the queue. The explicit subscriptions will trigger the runtime system to deliver the subscribed events to the processing agents, which might include past events that have been published in the queue before the explicit subscription is received.Type: GrantFiled: July 8, 2014Date of Patent: February 4, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Henry Hooper Somuah, Sergey Bykov, Tamir Melamed, Robert Louis Rodi, Felix Cheung, Michael William Malyuk, Andrew Alexander Hesky, Gabriel Kliot, Jorgen Thelin, Alan Stuart Geller
-
Publication number: 20190354399Abstract: A system and method is disclosed for scheduling and allocating data storage. An example method comprises generating a scheduling problem based at least on states of each of the plurality of storage nodes, a received plurality of storage tasks and received constraints, wherein the scheduling problem is a constraint satisfaction problem, selecting one or more approaches to solving the scheduling problem based on metadata associated with the storage tasks and constraints, solving the scheduling problem to generate a scheduling solution based on the one or more approaches, determining whether the given constraints are satisfied by the scheduling solution, executing, by the processor, the scheduling solution by assigning storage of data to each of the plurality of storage nodes when the constraints are satisfied by the scheduling solution and determining another scheduling solution based on the one or more approaches when the constraints are not satisfied by the scheduling solution.Type: ApplicationFiled: May 18, 2018Publication date: November 21, 2019Inventors: Sergey BYKOV, Eugene ASEEV, Sanjeev SOLANKI, Serguei BELOUSSOV, Stanislav PROTASOV
-
Publication number: 20160014175Abstract: Technologies are described herein for event delivery and stream processing utilizing virtual processing agents. Upon receiving an event publication in a queue, a runtime system identifies one or more virtual processing agents that might be interested in, but have not explicitly subscribed to, the published event. Event information of the published event is then delivered to the identified virtual processing agents. Prior to the actual delivery, the runtime system further determines if the virtual processing agents have been activated and activates those processing agents that have not been activated. Based on the received event information, some of the virtual processing agents might decide to explicitly submit subscriptions to receive more events from the queue. The explicit subscriptions will trigger the runtime system to deliver the subscribed events to the processing agents, which might include past events that have been published in the queue before the explicit subscription is received.Type: ApplicationFiled: July 8, 2014Publication date: January 14, 2016Inventors: Henry Hooper Somuah, Sergey Bykov, Tamir Melamed, Robert Louis Rodi, Felix Cheung, Michael William Malyuk, Andrew Alexander Hesky, Gabriel Kliot, Jorgen Thelin, Alan Stuart Geller
-
Patent number: 8308063Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: GrantFiled: July 8, 2011Date of Patent: November 13, 2012Assignee: Microsoft CorporationInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Publication number: 20110264587Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: ApplicationFiled: July 8, 2011Publication date: October 27, 2011Applicant: MICROSOFT CORPORATIONInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Patent number: 7975916Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: GrantFiled: November 17, 2008Date of Patent: July 12, 2011Assignee: Microsoft CorporationInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Publication number: 20090083189Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: ApplicationFiled: November 17, 2008Publication date: March 26, 2009Applicant: MICROSOFT CORPORATIONInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Patent number: 7451926Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: GrantFiled: November 3, 2006Date of Patent: November 18, 2008Assignee: Microsoft CorporationInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Publication number: 20080126929Abstract: The claimed subject matter relates to an architecture or arrangement that can facilitate a UI session between a smart device and a UI station in an application-agnostic manner. The UI station can expose a set of available peripherals to the smart device in order to provide the smart device with a richer user interface (UI) as well as additional features and/or options. Applications running on the smart device can utilize all or a subset of the available peripherals of the UI station for displaying (e.g., output peripherals) and navigating (e.g., input peripherals) the smart device's UI. As a result, smart devices that are smaller, less expensive, more durable, more convenient to carry, etc. can provide a user with a very feature-rich and/or intuitive UI.Type: ApplicationFiled: November 29, 2006Publication date: May 29, 2008Applicant: MICROSOFT CORPORATIONInventor: Sergey Bykov
-
Publication number: 20080109372Abstract: The claimed subject matter relates to an architecture or arrangement that can limit access to sensitive information by means of encryption. In particular, data obtained from a payment instrument at, e.g., a Point-Of-Sale (POS) location can be encrypted at an early stage such that a POS (or another) application does not have access to the data in an unencrypted form and/or does not have access to a means for decrypting the data. For example, a Public Key Infrastructure (PKI) arrangement can be employed such that a back-end payment processor can define encryption algorithms, associate itself with a public key, and maintain a private key for decryption. The public key can be delivered to the POS location and employed for data encryption, and, moreover, the PKI can be regulated by the more trusted parties.Type: ApplicationFiled: November 3, 2006Publication date: May 8, 2008Applicant: MICROSOFT CORPORATIONInventors: Sergey Bykov, Charles J. Williams, Craig Jensen
-
Publication number: 20070256070Abstract: The deployment of multiple embedded operating system components provides a designer with flexibility when customizing an embedded operating system for a target computing device. The embedded operating system components provide extra features to expand the functionality of the target computing device. The ease with which the designer may select various embedded operating system components to deploy from an originating computing device to the target computing device simplifies the design process. Configuration data of a core embedded operating system and configuration data of the deployed embedded operating system components are merged and any conflicts between configuration data are automatically resolved without rebooting the target computing device.Type: ApplicationFiled: April 27, 2006Publication date: November 1, 2007Applicant: Microsoft CorporationInventors: Sergey Bykov, Charles Williams, Craig Jensen, Harlan Husmann, Janine Harrison
-
Publication number: 20070061818Abstract: A host operating system (e.g., WinPE®) detects hardware devices connected to a computing device and stores identifiers (if any) of detected hardware devices in a datastore (e.g., the WinPE® registry). Without performing a detection process, a setup program accesses the datastore to obtain identifiers of hardware devices attached to the computing device. The setup program uses a mapping file (which maps hardware devices to drivers of a set of driver files) to determine which drivers of the set of driver files are usable by the detected hardware devices. The setup file then installs the “selected” drivers into the computing device.Type: ApplicationFiled: September 12, 2005Publication date: March 15, 2007Applicant: Microsoft CorporationInventors: Charles Williams, Craig Jensen, Harlan Husmann, Janine Harrison, Sergey Bykov
-
Publication number: 20070055574Abstract: POS device statistics information is managed such that the information is available commonly without the device being claimed by one application during retrieval of statistics information. A helper class DeviceStatistics object facilitates storing of statistics information in a common statistic repository that may be hardware based or software based, for example an XML file. The helper class also facilitates retrieval and forwarding of the statistics information to a managing POS application employing a service object for the POS device. A Windows Service based statistics service is used to retrieve the statistics information from the common statistic repository and generate performance monitor counters. The performance monitor counters are provided to requesting applications.Type: ApplicationFiled: August 31, 2005Publication date: March 8, 2007Applicant: Microsoft CorporationInventors: Craig Jensen, Harlan Husmann, Janine Harrison, Sergey Bykov, Timothy Belvin
-
Publication number: 20070050750Abstract: An extensible data-driven setup application is provided for installing operating systems. Instead of performing installation operations itself, the host application determines individual tasks from a configuration file. The host application then instantiates and calls modules that perform the specific installation tasks including user interface screens, setup actions, data imports, and the like as defined in the configuration file. The modules are combined in module assemblies. The configuration file and the module assemblies may be customized for different sets of setup tasks, sequences of tasks, and content.Type: ApplicationFiled: August 31, 2005Publication date: March 1, 2007Applicant: Microsoft CorporationInventors: Sergey Bykov, Craig Jensen, Harlan Husmann, Charles Williams
-
Publication number: 20070050751Abstract: Automatic interoperation functionality for legacy POS service and control objects is provided. In response to a request for creating an instance for a control object that implements an interface for the POS device, a legacy interoperability subsystem determines a unique identifier associated with the control object. The legacy interoperability subsystem dynamically generates an in-memory proxy class, based on the unique identifier. Thereby, the legacy subsystem enables the POS service application and the POS device to communicate with each other without having to instantiate one or more proxy classes for each instance of the legacy control object.Type: ApplicationFiled: August 31, 2005Publication date: March 1, 2007Applicant: Microsoft CorporationInventors: Harlan Husmann, Craig Jensen, Janine Harrison, Sergey Bykov, Timothy Belvin
-
Publication number: 20050257226Abstract: The present invention provides Plug and Play (PnP) functionality for devices that are not supported by an operating system. In response to the installation of an unsupported device, the operating system sends the event to a device manager application residing in user mode code. Upon receiving the event, the device manager application automatically installs the supporting configuration entries and software. After the device is installed, the device is accessible from an application without requiring any programming changes. Events are exposed to the application through a through a common control library (CCL). The library is directed at providing a generic interface for accessing the devices. Using the CCL the registered applications may receive events associated with the device.Type: ApplicationFiled: September 22, 2004Publication date: November 17, 2005Applicant: Microsoft CorporationInventors: Timothy Belvin, Harlan Husmann, Craig Jensen, Janine Harrison, Sergey Bykov, Sylvester La Blanc