Patents by Inventor Shirish Koti

Shirish Koti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8224898
    Abstract: Technologies are described herein for relevance-based expiration of data. An initial expiration time for the data is computed based upon an expiration duration associated with the data. The expiration time for the data is periodically re-computed in order to extend the expiration time. A relevance value for the meeting data is computed and the expiration time is set as a function of the computed relevance value. The relevance value may be computed as a product of a user-settable relevance value for the meeting data and a dynamic relevance point for the meeting data. When the computed expiration time for meeting data has been reached, the meeting data is expired, such as through the deletion of the meeting data.
    Type: Grant
    Filed: December 14, 2007
    Date of Patent: July 17, 2012
    Assignee: Microsoft Corporation
    Inventors: Ashutosh Tripathi, Jonathan Shriver-Blake, Amit Kripalani, Dharmanand Singh, Rohit Gupta, Shirish Koti
  • Patent number: 7966643
    Abstract: A method and system for controlling access to files in a remote file system is provided. In one embodiment, a firewall system at a client computer system intercepts requests originating from the client computer system and sent to the remote file system for accessing remote files, that is, files stored on a server computer system. Upon intercepting a remote file access request (e.g., to open a remote file), the firewall system determines whether the file access request should be allowed based on access control criteria.
    Type: Grant
    Filed: January 19, 2005
    Date of Patent: June 21, 2011
    Assignee: Microsoft Corporation
    Inventors: Narasimha Rao Nagampalli, Sachin C. Sheth, Shirish Koti, Yun Lin
  • Patent number: 7831826
    Abstract: A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rules that each provide a condition and action to be performed when the condition is satisfied. A rule also has a rule type that is used by the distribution system to identify the security components that are responsible for enforcing the rules. To distribute the security policies that have been received at a host computer system, the firewall agent identifies to which enforcement engine a rule applies based in part on rule type. The firewall agent then distributes the rule to the identified enforcement engine, which then enforces the rule.
    Type: Grant
    Filed: March 11, 2009
    Date of Patent: November 9, 2010
    Assignee: Microsoft Corporation
    Inventors: Shirish Koti, Narasimha Rao S. S. Nagampalli, Maxim Alexandrovich Ivanov, Sachin C. Sheth, Emanuel Paleologu, Yun Lin, Eric Erwin Youngblut
  • Publication number: 20090157810
    Abstract: Technologies are described herein for relevance-based expiration of data. An initial expiration time for the data is computed based upon an expiration duration associated with the data. The expiration time for the data is periodically re-computed in order to extend the expiration time. A relevance value for the meeting data is computed and the expiration time is set as a function of the computed relevance value. The relevance value may be computed as a product of a user-settable relevance value for the meeting data and a dynamic relevance point for the meeting data. When the computed expiration time for meeting data has been reached, the meeting data is expired, such as through the deletion of the meeting data.
    Type: Application
    Filed: December 14, 2007
    Publication date: June 18, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Ashutosh Tripathi, Jonathan Shriver-Blake, Amit Kripalani, Dharmanand Singh, Rohit Gupta, Shirish Koti
  • Patent number: 7536542
    Abstract: A method and system for intercepting communications between a transport client and a transport provider is provided. An interceptor system registers to intercept calls made by the transport client to functions of the transport provider. The interceptor system also replaces callbacks of the transport client so that calls from the transport provider intended for the transport client can be intercepted. When the interceptor system intercepts the call, it provides an indication of the call to a processing component. The processing component may analyze the call and determine whether the call should be allowed or denied. The interceptor system then proceeds to process the call in accordance with the indication of the processing component.
    Type: Grant
    Filed: January 19, 2005
    Date of Patent: May 19, 2009
    Assignee: Microsoft Corporation
    Inventors: Sachin C. Sheth, Shirish Koti, Vadim Eydelman, Nelamangala Krishnaswamy Srinivas
  • Patent number: 7509493
    Abstract: A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rules that each provide a condition and action to be performed when the condition is satisfied. A rule also has a rule type that is used by the distribution system to identify the security components that are responsible for enforcing the rules. To distribute the security policies that have been received at a host computer system, the firewall agent identifies to which enforcement engine a rule applies based in part on rule type. The firewall agent then distributes the rule to the identified enforcement engine, which then enforces the rule.
    Type: Grant
    Filed: November 19, 2004
    Date of Patent: March 24, 2009
    Assignee: Microsoft Corporation
    Inventors: Shirish Koti, Narasimha Rao S. S. Nagampalli, Maxim Alexandrovich Ivanov, Sachin C. Sheth, Emanuel Paleologu, Yun Lin, Eric Erwin Youngblut
  • Publication number: 20060161981
    Abstract: A method and system for intercepting communications between a transport client and a transport provider is provided. An interceptor system registers to intercept calls made by the transport client to functions of the transport provider. The interceptor system also replaces callbacks of the transport client so that calls from the transport provider intended for the transport client can be intercepted. When the interceptor system intercepts the call, it provides an indication of the call to a processing component. The processing component may analyze the call and determine whether the call should be allowed or denied. The interceptor system then proceeds to process the call in accordance with the indication of the processing component.
    Type: Application
    Filed: January 19, 2005
    Publication date: July 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Sachin Sheth, Shirish Koti, Vadim Eydelman, Nelamangala Srinivas
  • Publication number: 20060161966
    Abstract: A method and system for controlling access to files in a remote file system is provided. In one embodiment, a firewall system at a client computer system intercepts requests originating from the client computer system and sent to the remote file system for accessing remote files, that is, files stored on a server computer system. Upon intercepting a remote file access request (e.g., to open a remote file), the firewall system determines whether the file access request should be allowed based on access control criteria.
    Type: Application
    Filed: January 19, 2005
    Publication date: July 20, 2006
    Applicant: Microsoft Corporation
    Inventors: Narasimha Rao Nagampalli, Sachin Sheth, Shirish Koti, Yun Lin
  • Publication number: 20060129808
    Abstract: A method and system for distributing and enforcing security policies is provided. A firewall agent executing at a host computer system that is to be protected receives security policies for the enforcement engines responsible for enforcing the security policies on the host computer system. A security policy has rules that each provide a condition and action to be performed when the condition is satisfied. A rule also has a rule type that is used by the distribution system to identify the security components that are responsible for enforcing the rules. To distribute the security policies that have been received at a host computer system, the firewall agent identifies to which enforcement engine a rule applies based in part on rule type. The firewall agent then distributes the rule to the identified enforcement engine, which then enforces the rule.
    Type: Application
    Filed: November 19, 2004
    Publication date: June 15, 2006
    Applicant: Microsoft Corporation
    Inventors: Shirish Koti, Narasimha Nagampalli, Maxim Ivanov, Sachin Sheth, Emanuel Paleologu, Yun Lin, Eric Youngblut
  • Patent number: 7035258
    Abstract: A method and system for multicast network transmissions dynamically sets response time parameters for handling negative acknowledgments (NAKs). When the sender receives a NAK for a lost packet, it returns an NAK confirmation (NCF), waits for a back-off time before sending requested repair data, and then waits for a “linger time” during which the sender does not respond to other NAKs for the same lost packet. The back-off time and the linger time are dynamically set according to the position of the requested sequence number in the sender's transmit window such that the back-off time is shorter when the requested data is closer to being flushed out of the transmit window. After receiving the NCF, the receiver waits for a timeout period and resends the NAK if no repair data is received. The timeout period for data receipt is dynamically set according to a statistical average time for receiving repair data from the sender and the estimated sender's transmit window size.
    Type: Grant
    Filed: December 27, 2001
    Date of Patent: April 25, 2006
    Assignee: Microsoft Corporation
    Inventors: Mohammad Shabbir Alam, Pradeep Bahl, Shirish Koti
  • Publication number: 20060005227
    Abstract: Languages for expressing security policies are provided. The languages comprise rules that specify conditions and actions. The rules may be enforced by a security engine when a security enforcement event occurs. The languages support data separation, dynamic evaluation, and ordered rule scope. By separating data from logic, security engines may only need to be updated with a portion of rules that change. With dynamic evaluation, expressions of rules may be evaluated dynamically, such as by querying a database, when a security engine enforces a rule. With ordered rule scope, when a security enforcement event implicates a number of rules simultaneously, the rules may be enforced in a deterministic and logically organized manner.
    Type: Application
    Filed: July 1, 2004
    Publication date: January 5, 2006
    Applicant: Microsoft Corporation
    Inventors: Anders Samuelsson, Thomas Fakes, Arindam Chatterjee, Art Shelest, Mark Vayman, Rajesh Dadhia, Saveen Reddy, Shirish Koti, Steven Townsend
  • Publication number: 20050147045
    Abstract: A method and system for multicast network transmissions dynamically sets response time parameters for handling negative acknowledgments (NAKs). When the sender receives a NAK for a lost packet, it returns an NAK confirmation (NCF), waits for a back-off time before sending requested repair data, and then waits for a “linger time” during which the sender does not respond to other NAKs for the same lost packet. The back-off time and the linger time are dynamically set according to the position of the requested sequence number in the sender's transmit window such that the back-off time is shorter when the requested data is closer to being flushed out of the transmit window. After receiving the NCF, the receiver waits for a timeout period and resends the NAK if no repair data is received. The timeout period for data receipt is dynamically set according to a statistical average time for receiving repair data from the sender and the estimated sender's transmit window size.
    Type: Application
    Filed: March 4, 2005
    Publication date: July 7, 2005
    Applicant: Microsoft Corporation
    Inventors: Mohammad Alam, Pradeep Bahl, Shirish Koti