Patents by Inventor Victor Boctor

Victor Boctor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11855979
    Abstract: Techniques are described herein that are capable of dynamically failing over authentication traffic to a backup authentication system by a proxy system. An authentication request, which requests authentication of a principal, is received at the proxy system. The authentication request is directed to a primary authentication system. A determination is made, by the proxy system, that the primary authentication system is incapable of providing a valid response to the authentication request. The backup authentication system is caused, by the proxy system, to authenticate the principal using an authentication package received from the primary authentication system by dynamically routing the authentication request to the backup authentication system as a result of the primary authentication system being incapable of providing a valid response to the authentication request.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: December 26, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anirban Basu, Oren Jordan Melzer, Kamen K. Moutafov, Victor Boctor, Shuang Lu
  • Patent number: 11736464
    Abstract: Techniques are described herein that are capable of using an authentication package from a primary authentication system to authenticate a principal by a backup authentication system. The authentication package includes an authentication artifact, which is signed with a cryptographic key by the primary authentication system and which includes claim(s) that are usable to authenticate the principal, and further includes metadata. The metadata includes credential verification information that is usable to verify a credential of the principal and a first principal identifier that identifies the principal. A request to authenticate the principal is received at the backup authentication system. The request includes the credential and a second principal identifier that identifies the principal.
    Type: Grant
    Filed: May 28, 2021
    Date of Patent: August 22, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Anirban Basu, Oren Jordan Melzer, Kamen K. Moutafov, Victor Boctor, Shuang Lu, Sarvani Kumar Bhamidipati
  • Patent number: 11671383
    Abstract: A message is received, that represents an action to be performed in a service. The message includes a natural language portion and an endpoint to interact with. The natural language portion is parsed to identify the action and the endpoint is interacted with to perform the action.
    Type: Grant
    Filed: September 26, 2016
    Date of Patent: June 6, 2023
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Chowdhury Barua, Lei Yu, Victor Boctor, Pretish Abraham, Raju Nagalinga S
  • Publication number: 20220385646
    Abstract: Techniques are described herein that are capable of using an authentication package from a primary authentication system to authenticate a principal by a backup authentication system. The authentication package includes an authentication artifact, which is signed with a cryptographic key by the primary authentication system and which includes claim(s) that are usable to authenticate the principal, and further includes metadata. The metadata includes credential verification information that is usable to verify a credential of the principal and a first principal identifier that identifies the principal. A request to authenticate the principal is received at the backup authentication system. The request includes the credential and a second principal identifier that identifies the principal.
    Type: Application
    Filed: May 28, 2021
    Publication date: December 1, 2022
    Inventors: Anirban BASU, Oren Jordan MELZER, Kamen K. MOUTAFOV, Victor BOCTOR, Shuang LU, Sarvani Kumar BHAMIDIPATI
  • Publication number: 20220385649
    Abstract: Techniques are described herein that are capable of dynamically failing over authentication traffic to a backup authentication system by a proxy system. An authentication request, which requests authentication of a principal, is received at the proxy system. The authentication request is directed to a primary authentication system. A determination is made, by the proxy system, that the primary authentication system is incapable of providing a valid response to the authentication request. The backup authentication system is caused, by the proxy system, to authenticate the principal using an authentication package received from the primary authentication system by dynamically routing the authentication request to the backup authentication system as a result of the primary authentication system being incapable of providing a valid response to the authentication request.
    Type: Application
    Filed: May 28, 2021
    Publication date: December 1, 2022
    Inventors: Anirban BASU, Oren Jordan MELZER, Kamen K. MOUTAFOV, Victor BOCTOR, Shuang LU
  • Publication number: 20220385660
    Abstract: Techniques are described herein that are capable of dynamically routing an authentication request to a backup authentication system by a client device. For instance, the client device stores a list, which identifies authentication systems that are authorized to respond to authentication requests from the client device. The client device sends the authentication request toward a primary authentication system based at least in part on the authentication request identifying the primary authentication system as a recipient of the authentication request. The authentication request requests authentication of a principal by the primary authentication system.
    Type: Application
    Filed: May 28, 2021
    Publication date: December 1, 2022
    Inventors: Anirban BASU, Oren Jordan MELZER, Kamen K. MOUTAFOV, Victor BOCTOR
  • Patent number: 11310059
    Abstract: Techniques of data authentication in a distributed computing system are disclosed herein. One example technique includes receiving a request for performing an operation along with a data package that includes a security token, a first digital signature of the security token generated using an ephemeral private key, and an ephemeral public key with a second digital signature generated using a master private key stored at a secure location. The example technique can also include initially validating the second digital signature using a public key corresponding to the master private key, and upon validating the second digital signature, validating the first digital signature of the security token using the ephemeral public key included in the data package. Upon validating that the first digital signature of the security token, the request can be authenticated, and the requested operation can be performed.
    Type: Grant
    Filed: June 2, 2020
    Date of Patent: April 19, 2022
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Matthias Adam Leibmann, Victor Boctor, Grigory V. Kaplin, Liang Zou, Paranthaman Saravanan
  • Publication number: 20210377044
    Abstract: Techniques of data authentication in a distributed computing system are disclosed herein. One example technique includes receiving a request for performing an operation along with a data package that includes a security token, a first digital signature of the security token generated using an ephemeral private key, and an ephemeral public key with a second digital signature generated using a master private key stored at a secure location. The example technique can also include initially validating the second digital signature using a public key corresponding to the master private key, and upon validating the second digital signature, validating the first digital signature of the security token using the ephemeral public key included in the data package. Upon validating that the first digital signature of the security token, the request can be authenticated, and the requested operation can be performed.
    Type: Application
    Filed: June 2, 2020
    Publication date: December 2, 2021
    Inventors: Matthias Adam Leibmann, Victor Boctor, Grigory V. Kaplin, Liang Zou, Paranthaman Saravanan
  • Patent number: 10645052
    Abstract: A connector surfaces a configuration user experience that allows a user to select notifications that a user wishes to receive from a service. The user's e-mail system has a URL endpoint identifier, and the service sends the selected notifications to the URL endpoint. The notifications are integrated into the user's inbox, as e-mail messages.
    Type: Grant
    Filed: September 26, 2016
    Date of Patent: May 5, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Lei Yu, Darrell Brunsch, Victor Boctor, Jayteerth N. Katti, Shivakumar Seetharaman, Nimeesh Patel
  • Patent number: 10541957
    Abstract: Message prioritization may be provided. First, a message may be received and a priority level may be calculated for the message. If the message is not rejected for having a priority lower than a predetermined threshold, the message may be placed in a first priority queue. Next, the message may be de-queued from the first priority queue based upon the calculated priority level for the message. Distribution group recipients corresponding to the message may then be expanded and the priority level for the message may be re-calculated based upon the expanded distribution group recipients. Next, the message may be placed in a second priority queue. The message may then be de-queued from the second priority queue based upon the re-calculated priority level for the message and delivered.
    Type: Grant
    Filed: June 13, 2018
    Date of Patent: January 21, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gregory Gourevitch, Todd Luttinen, Victor Boctor, Wilbert De Graaf, Lizhuang Zhao
  • Publication number: 20190199710
    Abstract: An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.
    Type: Application
    Filed: February 26, 2019
    Publication date: June 27, 2019
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Kutlay Topatan, Maxim Ivanov, Victor Boctor, Palash Biswas, Bernard Luke Gallagher
  • Patent number: 10263977
    Abstract: An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.
    Type: Grant
    Filed: September 18, 2017
    Date of Patent: April 16, 2019
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Kutlay Topatan, Maxim Ivanov, Victor Boctor, Palash Biswas, Bernard Luke Gallagher
  • Publication number: 20180295084
    Abstract: Message prioritization may be provided. First, a message may be received and a priority level may be calculated for the message. If the message is not rejected for having a priority lower than a predetermined threshold, the message may be placed in a first priority queue. Next, the message may be de-queued from the first priority queue based upon the calculated priority level for the message. Distribution group recipients corresponding to the message may then be expanded and the priority level for the message may be re-calculated based upon the expanded distribution group recipients. Next, the message may be placed in a second priority queue. The message may then be de-queued from the second priority queue based upon the re-calculated priority level for the message and delivered.
    Type: Application
    Filed: June 13, 2018
    Publication date: October 11, 2018
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Gregory GOUREVITCH, Todd LUTTINEN, Victor BOCTOR, Wilbert DE GRAAF, Lizhuang ZHAO
  • Patent number: 10025793
    Abstract: A method is presented for using a distributed source control system with a centralized source control system. A first set of files is obtained from a source control repository and stored on a first electronic computing device. The first set of files comprises all or part of a code base in the centralized source control system. A request is received for at least part of the code base from a second electronic computing device in a distributed source control system. As a result of the request, at least a part of the first set of files is sent to the second electronic computing device. A change set for the first set of files is received from the second electronic computing device. The change set is processed to be in a format compatible with the source control repository. The change set is submitted to the source control repository.
    Type: Grant
    Filed: June 11, 2015
    Date of Patent: July 17, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Victor Boctor, Theodore Albert Bucher
  • Patent number: 10021055
    Abstract: Message prioritization may be provided. First, a message may be received and a priority level may be calculated for the message. If the message is not rejected for having a priority lower than a predetermined threshold, the message may be placed in a first priority queue. Next, the message may be de-queued from the first priority queue based upon the calculated priority level for the message. Distribution group recipients corresponding to the message may then be expanded and the priority level for the message may be re-calculated based upon the expanded distribution group recipients. Next, the message may be placed in a second priority queue. The message may then be de-queued from the second priority queue based upon the re-calculated priority level for the message and delivered.
    Type: Grant
    Filed: February 21, 2017
    Date of Patent: July 10, 2018
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Gregory Gourevitch, Todd Luttinen, Victor Boctor, Wilbert De Graaf, Lizhuang Zhao
  • Publication number: 20180091462
    Abstract: A connector surfaces a configuration user experience that allows a user to select notifications that a user wishes to receive from a service. The user's e-mail system has a URL endpoint identifier, and the service sends the selected notifications to the URL endpoint. The notifications are integrated into the user's inbox, as e-mail messages.
    Type: Application
    Filed: September 26, 2016
    Publication date: March 29, 2018
    Inventors: Lei Yu, Darrell Brunsch, Victor Boctor, Jayteerth N. Katti, Shivakumar Seetharaman, Nimeesh Patel
  • Publication number: 20180089165
    Abstract: A message is received, that represents an action to be performed in a service. The message includes a natural language portion and an endpoint to interact with. The natural language portion is parsed to identify the action and the endpoint is interacted with to perform the action.
    Type: Application
    Filed: September 26, 2016
    Publication date: March 29, 2018
    Inventors: Chowdhury Barua, Lei Yu, Victor Boctor, Pretish Abraham, Raju Nagalinga S
  • Publication number: 20180007036
    Abstract: An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.
    Type: Application
    Filed: September 18, 2017
    Publication date: January 4, 2018
    Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Kutlay Topatan, Maxim Ivanov, Victor Boctor, Palash Biswas, Bernard Luke Gallagher
  • Patent number: 9825869
    Abstract: A current request for a server to perform work for a user profile can be received and processed at the server. It can be determined whether server usage by the profile exhibits a sufficient trend toward a threshold value to warrant performing traffic shaping for the user profile. If so, then a delay time can be calculated based on, or as a function of, server resources used in processing the current request, and a response to the current request can be delayed by the delay time.
    Type: Grant
    Filed: February 25, 2016
    Date of Patent: November 21, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: David A. Sterling, Siddhartha Mathur, Victor Boctor
  • Patent number: 9769150
    Abstract: An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.
    Type: Grant
    Filed: January 14, 2011
    Date of Patent: September 19, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Kutlay Topatan, Maxim Ivanov, Victor Boctor, Palash Biswas, Bernard Luke Gallagher