Patents by Inventor Vadim Makhervaks
Vadim Makhervaks has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12260004Abstract: Methods, systems, apparatuses, and computer program products are provided herein for rendering secured content. For instance, a computing device may be utilized to view content that is to be displayed via a display device coupled thereto. However, rather than rendering the content, the computing device generates and/or provides a graphical representation of the content to a rendering device coupled between the computing device and the display device. The rendering device analyzes the graphical representation to determine characteristics of the graphical representation, characteristics of a display region of an application window in which the content is to be rendered, and a network address at which the actual content is located. The rendering device retrieves the content using the network address and renders the retrieved content over the display region of the application window in accordance with the characteristics determined for the graphical representation and the display region of the application window.Type: GrantFiled: February 15, 2022Date of Patent: March 25, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Orr Srour, Vadim Makhervaks
-
Publication number: 20250036651Abstract: The disclosed technology includes fault-tolerant data replication system implemented by a cluster of compute devices. The system includes a witness comprising persistent data storage and multiple nodes configured to selectively execute leader node operations when serving as a leader of the cluster. The leader node operations include detecting an availability status change for a follower node of the cluster and, in response, updating a subterm and a replication set. The subterm identifies a total number of availability status changes detected within the cluster over a given time interval, and the replication set identifies set of entities designated to provide acknowledgments counted when determining whether to commit a message following message replication. The leader node operations further include writing the replication set, the subterm, and other metadata to the witness in response to receiving a first client message from a client application following the availability status change.Type: ApplicationFiled: September 29, 2023Publication date: January 30, 2025Inventors: Ji DAI, Xin ZHANG, Vadim MAKHERVAKS
-
Publication number: 20240394388Abstract: A memory where video content is stored for access by processing components in a display pipeline is divided into different categories or groupings, each different category or grouping corresponding to a different security level. Access, by the processing components in the display pipeline, to the video content stored in the different categories or groupings is restricted in different ways so that access to video content stored in the highest security categories or groupings is more restricted and more secure than access to the video content stored in a less secure categories or groupings. Video content is received and a security level corresponding to video content is identified. The video content is written into a memory category or grouping, of the plurality of different categories or groupings corresponding to a plurality of different security levels, based upon the security level corresponding to the video content.Type: ApplicationFiled: May 25, 2023Publication date: November 28, 2024Inventors: Ori LASLO, Orr SROUR, Matthew MORRIS, Steve M. PRONOVOST, Glenn F. EVANS, Vadim MAKHERVAKS
-
Patent number: 12111774Abstract: A computing system uses AES-XTS encryption to encrypt data of a first part of first data stream using a tweak key, a data key, an initial tweak value, in a first encryption session, store the encrypted first part, then encrypts a second part of the first data stream in a second encryption session commenced after the termination of the first encryption session; and store the encrypted second part in the encrypted data store. The second part of the first data stream is encrypted using a modified tweak value computed based on the initial tweak value, the tweak key, and a block index of a last cipher block of the first part of the first data stream.Type: GrantFiled: May 25, 2022Date of Patent: October 8, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Yevgeny Yankilevich, Vadim Makhervaks, Robert Groza, Jr., Yi Yuan, Oren Ish-Am
-
Patent number: 12073079Abstract: Zone hints for use with a zoned namespace (ZNS) storage device. Zone hints include one or more of a first hint indicating that a zone is part of a group of a plurality of zones, a second hint indicating that the zone is to be fast-filled, or a third hint indicating that the zone is associated with a background operation. The first hint is structured to instruct the ZNS storage device to allocate to the zone a first storage resources that are physically adjacent to second storage resources reserved for others of the plurality of zones. The second hint is structured to instruct the ZNS storage device to bypass a staging area when writing to the zone. The third hint is structured to instruct the ZNS storage device to deprioritizing at least one operation writing to the zone, or to bypass the staging area when writing to the zone.Type: GrantFiled: September 28, 2021Date of Patent: August 27, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Scott Chao-Chueh Lee, Vadim Makhervaks, Madhav Himanshubhai Pandya, Ioan Oltean, Laura Marie Caulfield, Lee Edward Prewitt
-
Publication number: 20240265072Abstract: Methods and systems are described which facilitate protecting a virtual desktop infrastructure (VDI) session. A first communication channel is established between a DRM component and a VDI service. The DRM component decrypts a video stream from the VDI service and overlays the decrypted video stream on a user's display. A second communication channel is established between an inputs protection component and the VDI service. The inputs protection component encrypts input received at a user's input device and sends the encrypted input to the cloud VDI service.Type: ApplicationFiled: April 3, 2023Publication date: August 8, 2024Inventors: Orr SROUR, Ori LASLO, Ashish GUPTA, Vadim MAKHERVAKS, Andrew Lee JENKS, Samuel John WENKER
-
Publication number: 20240265071Abstract: Methods and systems are described which facilitate protecting a virtual desktop infrastructure (VDI) session. A first communication channel is established between a first cryptographic element and a VDI service. The first cryptographic element decrypts a video stream from the VDI service and overlays the decrypted video stream on a user's display. A second communication channel is established between a second cryptographic element and the VDI service. The second cryptographic element encrypts input received at a user's input device and sends the encrypted input to the cloud VDI service.Type: ApplicationFiled: April 3, 2023Publication date: August 8, 2024Inventors: Orr SROUR, Ori LASLO, Ashish GUPTA, Vadim MAKHERVAKS, Andrew Lee JENKS, Samuel John WENKER
-
Publication number: 20240103721Abstract: Embodiments of the present disclosure include systems and methods for providing a scalable controller for managing data storages. A system includes a non-volatile memory controller comprising a set of data queues and a set of administrative queues. The system also includes a set of physical storages communicatively coupled to the non-volatile memory controller. A set of logical storages are created from the set of physical storages. A primary non-volatile memory controller is created from the non-volatile memory controller. The primary non-volatile memory controller comprising an administrative queue in the set of administrative queues, a first subset of the set of data queues, and a first subset of the set of logical storages. An extended non-volatile memory controller is created from the non-volatile memory controller. The extended non-volatile memory controller comprising a second subset of the set of data queues and a second subset of the set of logical storages.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Inventors: Jacob Kappeler OSHINS, Hari Daas ANGEPAT, Yi YUAN, Vadim MAKHERVAKS
-
Publication number: 20240007268Abstract: A computing system uses Advanced Encryption Standard XEX Based Tweaked Codebook Mode with Ciphertext Stealing (AES-XTS) encryption to encrypt a block of data using a tweak key, a data key, a modified tweak value, and the block of data to thereby generate an encrypted block of data. The modified tweak value is computed according to the expression DEC(0, CONST KEY), where DEC is an AES decryption algorithm, and CONST KEY is the tweak key. The encrypted block of data is thereby formatted according to the Advanced Encryption Standard with no extended mode and not according to the XEX Based Tweaked Codebook Mode with Ciphertext Stealing.Type: ApplicationFiled: December 15, 2022Publication date: January 4, 2024Applicant: Microsoft Technology Licensing, LLCInventors: Yevgeny YANKILEVICH, Vadim MAKHERVAKS, Yi YUAN, Robert GROZA, Jr., Oren ISH-AM
-
Publication number: 20230393998Abstract: A server system is provided that includes one or more compute nodes that include at least one processor and a host memory device. The server system further includes a plurality of solid-state drive (SSD) devices, a local non-volatile memory express virtualization (LNV) device, and a non-transparent (NT) switch for a peripheral component interconnect express (PCIe) bus that interconnects the plurality of SSD devices and the LNV device to the at least one processor of each compute node. The LNV device is configured to virtualize hardware resources of the plurality of SSD devices. The plurality of SSD devices are configured to directly access data buffers of the host memory device. The NT switch is configured to hide the plurality of SSD devices such that the plurality of SSD devices are not visible to the at least one processor of each compute node.Type: ApplicationFiled: August 21, 2023Publication date: December 7, 2023Applicant: Microsoft Technology Licensing, LLCInventors: Vadim MAKHERVAKS, Aaron William OGUS, Jason David ADRIAN
-
Publication number: 20230385204Abstract: A computing system uses AES-XTS encryption to encrypt data of a first part of first data stream using a tweak key, a data key, an initial tweak value, in a first encryption session, store the encrypted first part, then encrypts a second part of the first data stream in a second encryption session commenced after the termination of the first encryption session; and store the encrypted second part in the encrypted data store. The second part of the first data stream is encrypted using a modified tweak value computed based on the initial tweak value, the tweak key, and a block index of a last cipher block of the first part of the first data stream.Type: ApplicationFiled: May 25, 2022Publication date: November 30, 2023Applicant: Microsoft Technology Licensing, LLCInventors: Yevgeny YANKILEVICH, Vadim MAKHERVAKS, Robert GROZA, JR., Yi YUAN, Oren ISH-AM
-
Publication number: 20230342028Abstract: Zone hints for use with a zoned namespace (ZNS) storage device. Zone hints include one or more of a first hint indicating that a zone is part of a group of a plurality of zones, a second hint indicating that the zone is to be fast-filled, or a third hint indicating that the zone is associated with a background operation. The first hint is structured to instruct the ZNS storage device to allocate to the zone a first storage resources that are physically adjacent to second storage resources reserved for others of the plurality of zones. The second hint is structured to instruct the ZNS storage device to bypass a staging area when writing to the zone. The third hint is structured to instruct the ZNS storage device to deprioritizing at least one operation writing to the zone, or to bypass the staging area when writing to the zone.Type: ApplicationFiled: September 28, 2021Publication date: October 26, 2023Inventors: Scott Chao-Chueh LEE, Vadim MAKHERVAKS, Madhav Himanshubhai PANDYA, Ioan OLTEAN, Laura Marie CAULFIELD, Lee Edward PREWITT
-
Patent number: 11768783Abstract: A server system is provided that includes one or more compute nodes that include at least one processor and a host memory device. The server system further includes a plurality of solid-state drive (SSD) devices, a local non-volatile memory express virtualization (LNV) device, and a non-transparent (NT) switch for a peripheral component interconnect express (PCIe) bus that interconnects the plurality of SSD devices and the LNV device to the at least one processor of each compute node. The LNV device is configured to virtualize hardware resources of the plurality of SSD devices. The plurality of SSD devices are configured to directly access data buffers of the host memory device. The NT switch is configured to hide the plurality of SSD devices such that the plurality of SSD devices are not visible to the at least one processor of each compute node.Type: GrantFiled: May 23, 2022Date of Patent: September 26, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Vadim Makhervaks, Aaron William Ogus, Jason David Adrian
-
Patent number: 11755527Abstract: Examples are disclosed for access to a storage device maintained at a server. In some examples, a network input/output device coupled to the server may allocate, in a memory of the server, a buffer, a doorbell, and a queue pair accessible to a client remote to the server. For these examples, the network input/output device may assign an Non-Volatile Memory Express (NVMe) namespace context to the client. For these examples, indications of the allocated buffer, doorbell, queue pair, and namespace context may be transmitted to the client. Other examples are described and claimed.Type: GrantFiled: August 15, 2022Date of Patent: September 12, 2023Assignee: Tahoe Research, Ltd.Inventors: Eliezer Tamir, Vadim Makhervaks, Ben-Zion Friedman, Phil Cayton, Theodore L. Willke
-
Publication number: 20230259656Abstract: Methods, systems, apparatuses, and computer program products are provided herein for rendering secured content. For instance, a computing device may be utilized to view content that is to be displayed via a display device coupled thereto. However, rather than rendering the content, the computing device generates and/or provides a graphical representation of the content to a rendering device coupled between the computing device and the display device. The rendering device analyzes the graphical representation to determine characteristics of the graphical representation, characteristics of a display region of an application window in which the content is to be rendered, and a network address at which the actual content is located. The rendering device retrieves the content using the network address and renders the retrieved content over the display region of the application window in accordance with the characteristics determined for the graphical representation and the display region of the application window.Type: ApplicationFiled: February 15, 2022Publication date: August 17, 2023Inventors: Orr SROUR, Vadim MAKHERVAKS
-
Publication number: 20230185759Abstract: Examples are disclosed for access to a storage device maintained at a server. In some examples, a network input/output device coupled to the server may allocate, in a memory of the server, a buffer, a doorbell, and a queue pair accessible to a client remote to the server. For these examples, the network input/output device may assign an Non-Volatile Memory Express (NVMe) namespace context to the client. For these examples, indications of the allocated buffer, doorbell, queue pair, and namespace context may be transmitted to the client. Other examples are described and claimed.Type: ApplicationFiled: August 15, 2022Publication date: June 15, 2023Applicant: Tahoe Research, Ltd.Inventors: ELIEZER TAMIR, VADIM MAKHERVAKS, BEN-ZION FRIEDMAN, PHIL CAYTON, THEODORE L. WILLKE
-
Patent number: 11500810Abstract: Examples are disclosed for access to a storage device maintained at a server. In some examples, a network input/output device coupled to the server may allocate, in a memory of the server, a buffer, a doorbell, and a queue pair accessible to a client remote to the server. For these examples, the network input/output device may assign an Non-Volatile Memory Express (NVMe) namespace context to the client. For these examples, indications of the allocated buffer, doorbell, queue pair, and namespace context may be transmitted to the client. Other examples are described and claimed.Type: GrantFiled: September 3, 2021Date of Patent: November 15, 2022Assignee: Tahoe Research, Ltd.Inventors: Eliezer Tamir, Vadim Makhervaks, Ben-Zion Friedman, Phil Cayton, Theodore L. Willke
-
Publication number: 20220283967Abstract: A server system is provided that includes one or more compute nodes that include at least one processor and a host memory device. The server system further includes a plurality of solid-state drive (SSD) devices, a local non-volatile memory express virtualization (LNV) device, and a non-transparent (NT) switch for a peripheral component interconnect express (PCIe) bus that interconnects the plurality of SSD devices and the LNV device to the at least one processor of each compute node. The LNV device is configured to virtualize hardware resources of the plurality of SSD devices. The plurality of SSD devices are configured to directly access data buffers of the host memory device. The NT switch is configured to hide the plurality of SSD devices such that the plurality of SSD devices are not visible to the at least one processor of each compute node.Type: ApplicationFiled: May 23, 2022Publication date: September 8, 2022Applicant: Microsoft Technology Licensing, LLCInventors: Vadim MAKHERVAKS, Aaron William OGUS, Jason David ADRIAN
-
Patent number: 11372785Abstract: A server system is provided that includes one or more compute nodes that include at least one processor and a host memory device. The server system further includes a plurality of solid-state drive (SSD) devices, a local non-volatile memory express virtualization (LNV) device, and a non-transparent (NT) switch for a peripheral component interconnect express (PCIe) bus that interconnects the plurality of SSD devices and the LNV device to the at least one processor of each compute node. The LNV device is configured to virtualize hardware resources of the plurality of SSD devices. The plurality of SSD devices are configured to directly access data buffers of the host memory device. The NT switch is configured to hide the plurality of SSD devices such that the plurality of SSD devices are not visible to the at least one processor of each compute node.Type: GrantFiled: May 6, 2020Date of Patent: June 28, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Vadim Makhervaks, Aaron William Ogus, Jason David Adrian
-
Publication number: 20220100696Abstract: Examples are disclosed for access to a storage device maintained at a server. In some examples, a network input/output device coupled to the server may allocate, in a memory of the server, a buffer, a doorbell, and a queue pair accessible to a client remote to the server. For these examples, the network input/output device may assign an Non-Volatile Memory Express (NVMe) namespace context to the client. For these examples, indications of the allocated buffer, doorbell, queue pair, and namespace context may be transmitted to the client. Other examples are described and claimed.Type: ApplicationFiled: September 3, 2021Publication date: March 31, 2022Applicant: INTEL CORPORATIONInventors: ELIEZER TAMIR, VADIM MAKHERVAKS, BEN-ZION FRIEDMAN, PHIL CAYTON, THEODORE L. WILLKE