Patents by Inventor Sudeep Bharati

Sudeep Bharati has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7421490
    Abstract: The present invention provides a method for collecting information to uniquely identify an application on a client computer upon the occurrence of a reporting event, such as a crash. The method is implemented by providing a client computer having access to a network. In order to uniquely identify the application, the method generates an inventory of selected files stored in at least one directory, normally including the directory containing the application executable file. The method further generates an inventory of system properties for the client computer. The inventories are transmitted via the network to a server computer. Upon receipt by the server computer, the inventory information is compared with corresponding information in a database to determine whether the application can be uniquely identified. If the application can be identified, the user can be notified of a solution or other information in response to the reporting event.
    Type: Grant
    Filed: May 6, 2002
    Date of Patent: September 2, 2008
    Assignee: Microsoft Corporation
    Inventors: Sudeep Bharati, Mark Derbecker, Mark Carroll, Corneliu Lupu
  • Publication number: 20040040021
    Abstract: Disclosed are methods for keeping an application up-to-date that identify the application and the application user's specific needs to apply just the updates the user needs when the user needs them. Based on particulars of the user's computing environment, an update policy is implemented that specifies certain “triggering events” for each application to be kept up-to-date. When a triggering event occurs, the application associated with the triggering event is identified. A list is compiled of the updates already applied to the application. Another list is compiled, possibly at a remote update server, of all the updates available for the application. The lists are compared, and if an available but not yet applied update is found, then that update is sent to the user. To identify an application associated with a triggering event, the update server correlates information collected from the user's computing environment with the server's database of available updates.
    Type: Application
    Filed: June 27, 2002
    Publication date: February 26, 2004
    Applicant: Microsoft Corporation
    Inventors: Sudeep Bharati, John D. Colleran, Jude J. Kavalam, Kyle P. Shannon
  • Publication number: 20030208593
    Abstract: The present invention provides a method for collecting information to uniquely identify an application on a client computer upon the occurrence of a reporting event, such as a crash. The method is implemented by providing a client computer having access to a network. In order to uniquely identify the application, the method generates an inventory of selected files stored in at least one directory, normally including the directory containing the application executable file. The method further generates an inventory of system properties for the client computer. The inventories are transmitted via the network to a server computer. Upon receipt by the server computer, the inventory information is compared with corresponding information in a database to determine whether the application can be uniquely identified. If the application can be identified, the user can be notified of a solution or other information in response to the reporting event.
    Type: Application
    Filed: May 6, 2002
    Publication date: November 6, 2003
    Applicant: Microsoft Corporation
    Inventors: Sudeep Bharati, Mark Derbecker, Mark Carroll, Corneliu Lupu
  • Patent number: 6275938
    Abstract: Untrusted executable code programs (applets or controls) are written in native, directly executable code. The executable code is loaded into a pre-allocated memory range (sandbox) from which references to outside memory are severely restricted by checks (sniff code) added to the executable code. Conventional application-program interface (API) calls in the untrusted code are replaced with translation-code modules (thunks) that allow the executable code to access the host operating system, while preventing breaches of the host system's security. Static links in the code are replaced by calls to thunk modules. When an API call is made during execution, control transfers to the thunk, which determines whether the API call is one which should be allowed to execute on the operating system.
    Type: Grant
    Filed: August 28, 1997
    Date of Patent: August 14, 2001
    Assignee: Microsoft Corporation
    Inventors: Barry Bond, Sudeep Bharati