Patents by Inventor Victor Boctor
Victor Boctor has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11855979Abstract: Techniques are described herein that are capable of dynamically failing over authentication traffic to a backup authentication system by a proxy system. An authentication request, which requests authentication of a principal, is received at the proxy system. The authentication request is directed to a primary authentication system. A determination is made, by the proxy system, that the primary authentication system is incapable of providing a valid response to the authentication request. The backup authentication system is caused, by the proxy system, to authenticate the principal using an authentication package received from the primary authentication system by dynamically routing the authentication request to the backup authentication system as a result of the primary authentication system being incapable of providing a valid response to the authentication request.Type: GrantFiled: May 28, 2021Date of Patent: December 26, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Anirban Basu, Oren Jordan Melzer, Kamen K. Moutafov, Victor Boctor, Shuang Lu
-
Patent number: 11736464Abstract: Techniques are described herein that are capable of using an authentication package from a primary authentication system to authenticate a principal by a backup authentication system. The authentication package includes an authentication artifact, which is signed with a cryptographic key by the primary authentication system and which includes claim(s) that are usable to authenticate the principal, and further includes metadata. The metadata includes credential verification information that is usable to verify a credential of the principal and a first principal identifier that identifies the principal. A request to authenticate the principal is received at the backup authentication system. The request includes the credential and a second principal identifier that identifies the principal.Type: GrantFiled: May 28, 2021Date of Patent: August 22, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Anirban Basu, Oren Jordan Melzer, Kamen K. Moutafov, Victor Boctor, Shuang Lu, Sarvani Kumar Bhamidipati
-
Patent number: 11671383Abstract: A message is received, that represents an action to be performed in a service. The message includes a natural language portion and an endpoint to interact with. The natural language portion is parsed to identify the action and the endpoint is interacted with to perform the action.Type: GrantFiled: September 26, 2016Date of Patent: June 6, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Chowdhury Barua, Lei Yu, Victor Boctor, Pretish Abraham, Raju Nagalinga S
-
Publication number: 20220385646Abstract: Techniques are described herein that are capable of using an authentication package from a primary authentication system to authenticate a principal by a backup authentication system. The authentication package includes an authentication artifact, which is signed with a cryptographic key by the primary authentication system and which includes claim(s) that are usable to authenticate the principal, and further includes metadata. The metadata includes credential verification information that is usable to verify a credential of the principal and a first principal identifier that identifies the principal. A request to authenticate the principal is received at the backup authentication system. The request includes the credential and a second principal identifier that identifies the principal.Type: ApplicationFiled: May 28, 2021Publication date: December 1, 2022Inventors: Anirban BASU, Oren Jordan MELZER, Kamen K. MOUTAFOV, Victor BOCTOR, Shuang LU, Sarvani Kumar BHAMIDIPATI
-
Publication number: 20220385649Abstract: Techniques are described herein that are capable of dynamically failing over authentication traffic to a backup authentication system by a proxy system. An authentication request, which requests authentication of a principal, is received at the proxy system. The authentication request is directed to a primary authentication system. A determination is made, by the proxy system, that the primary authentication system is incapable of providing a valid response to the authentication request. The backup authentication system is caused, by the proxy system, to authenticate the principal using an authentication package received from the primary authentication system by dynamically routing the authentication request to the backup authentication system as a result of the primary authentication system being incapable of providing a valid response to the authentication request.Type: ApplicationFiled: May 28, 2021Publication date: December 1, 2022Inventors: Anirban BASU, Oren Jordan MELZER, Kamen K. MOUTAFOV, Victor BOCTOR, Shuang LU
-
Publication number: 20220385660Abstract: Techniques are described herein that are capable of dynamically routing an authentication request to a backup authentication system by a client device. For instance, the client device stores a list, which identifies authentication systems that are authorized to respond to authentication requests from the client device. The client device sends the authentication request toward a primary authentication system based at least in part on the authentication request identifying the primary authentication system as a recipient of the authentication request. The authentication request requests authentication of a principal by the primary authentication system.Type: ApplicationFiled: May 28, 2021Publication date: December 1, 2022Inventors: Anirban BASU, Oren Jordan MELZER, Kamen K. MOUTAFOV, Victor BOCTOR
-
Patent number: 11310059Abstract: Techniques of data authentication in a distributed computing system are disclosed herein. One example technique includes receiving a request for performing an operation along with a data package that includes a security token, a first digital signature of the security token generated using an ephemeral private key, and an ephemeral public key with a second digital signature generated using a master private key stored at a secure location. The example technique can also include initially validating the second digital signature using a public key corresponding to the master private key, and upon validating the second digital signature, validating the first digital signature of the security token using the ephemeral public key included in the data package. Upon validating that the first digital signature of the security token, the request can be authenticated, and the requested operation can be performed.Type: GrantFiled: June 2, 2020Date of Patent: April 19, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Matthias Adam Leibmann, Victor Boctor, Grigory V. Kaplin, Liang Zou, Paranthaman Saravanan
-
Publication number: 20210377044Abstract: Techniques of data authentication in a distributed computing system are disclosed herein. One example technique includes receiving a request for performing an operation along with a data package that includes a security token, a first digital signature of the security token generated using an ephemeral private key, and an ephemeral public key with a second digital signature generated using a master private key stored at a secure location. The example technique can also include initially validating the second digital signature using a public key corresponding to the master private key, and upon validating the second digital signature, validating the first digital signature of the security token using the ephemeral public key included in the data package. Upon validating that the first digital signature of the security token, the request can be authenticated, and the requested operation can be performed.Type: ApplicationFiled: June 2, 2020Publication date: December 2, 2021Inventors: Matthias Adam Leibmann, Victor Boctor, Grigory V. Kaplin, Liang Zou, Paranthaman Saravanan
-
Patent number: 10645052Abstract: A connector surfaces a configuration user experience that allows a user to select notifications that a user wishes to receive from a service. The user's e-mail system has a URL endpoint identifier, and the service sends the selected notifications to the URL endpoint. The notifications are integrated into the user's inbox, as e-mail messages.Type: GrantFiled: September 26, 2016Date of Patent: May 5, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Lei Yu, Darrell Brunsch, Victor Boctor, Jayteerth N. Katti, Shivakumar Seetharaman, Nimeesh Patel
-
Patent number: 10541957Abstract: Message prioritization may be provided. First, a message may be received and a priority level may be calculated for the message. If the message is not rejected for having a priority lower than a predetermined threshold, the message may be placed in a first priority queue. Next, the message may be de-queued from the first priority queue based upon the calculated priority level for the message. Distribution group recipients corresponding to the message may then be expanded and the priority level for the message may be re-calculated based upon the expanded distribution group recipients. Next, the message may be placed in a second priority queue. The message may then be de-queued from the second priority queue based upon the re-calculated priority level for the message and delivered.Type: GrantFiled: June 13, 2018Date of Patent: January 21, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Gregory Gourevitch, Todd Luttinen, Victor Boctor, Wilbert De Graaf, Lizhuang Zhao
-
Publication number: 20190199710Abstract: An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.Type: ApplicationFiled: February 26, 2019Publication date: June 27, 2019Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Kutlay Topatan, Maxim Ivanov, Victor Boctor, Palash Biswas, Bernard Luke Gallagher
-
Patent number: 10263977Abstract: An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.Type: GrantFiled: September 18, 2017Date of Patent: April 16, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Kutlay Topatan, Maxim Ivanov, Victor Boctor, Palash Biswas, Bernard Luke Gallagher
-
Publication number: 20180295084Abstract: Message prioritization may be provided. First, a message may be received and a priority level may be calculated for the message. If the message is not rejected for having a priority lower than a predetermined threshold, the message may be placed in a first priority queue. Next, the message may be de-queued from the first priority queue based upon the calculated priority level for the message. Distribution group recipients corresponding to the message may then be expanded and the priority level for the message may be re-calculated based upon the expanded distribution group recipients. Next, the message may be placed in a second priority queue. The message may then be de-queued from the second priority queue based upon the re-calculated priority level for the message and delivered.Type: ApplicationFiled: June 13, 2018Publication date: October 11, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Gregory GOUREVITCH, Todd LUTTINEN, Victor BOCTOR, Wilbert DE GRAAF, Lizhuang ZHAO
-
Patent number: 10025793Abstract: A method is presented for using a distributed source control system with a centralized source control system. A first set of files is obtained from a source control repository and stored on a first electronic computing device. The first set of files comprises all or part of a code base in the centralized source control system. A request is received for at least part of the code base from a second electronic computing device in a distributed source control system. As a result of the request, at least a part of the first set of files is sent to the second electronic computing device. A change set for the first set of files is received from the second electronic computing device. The change set is processed to be in a format compatible with the source control repository. The change set is submitted to the source control repository.Type: GrantFiled: June 11, 2015Date of Patent: July 17, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Victor Boctor, Theodore Albert Bucher
-
Patent number: 10021055Abstract: Message prioritization may be provided. First, a message may be received and a priority level may be calculated for the message. If the message is not rejected for having a priority lower than a predetermined threshold, the message may be placed in a first priority queue. Next, the message may be de-queued from the first priority queue based upon the calculated priority level for the message. Distribution group recipients corresponding to the message may then be expanded and the priority level for the message may be re-calculated based upon the expanded distribution group recipients. Next, the message may be placed in a second priority queue. The message may then be de-queued from the second priority queue based upon the re-calculated priority level for the message and delivered.Type: GrantFiled: February 21, 2017Date of Patent: July 10, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Gregory Gourevitch, Todd Luttinen, Victor Boctor, Wilbert De Graaf, Lizhuang Zhao
-
Publication number: 20180091462Abstract: A connector surfaces a configuration user experience that allows a user to select notifications that a user wishes to receive from a service. The user's e-mail system has a URL endpoint identifier, and the service sends the selected notifications to the URL endpoint. The notifications are integrated into the user's inbox, as e-mail messages.Type: ApplicationFiled: September 26, 2016Publication date: March 29, 2018Inventors: Lei Yu, Darrell Brunsch, Victor Boctor, Jayteerth N. Katti, Shivakumar Seetharaman, Nimeesh Patel
-
Publication number: 20180089165Abstract: A message is received, that represents an action to be performed in a service. The message includes a natural language portion and an endpoint to interact with. The natural language portion is parsed to identify the action and the endpoint is interacted with to perform the action.Type: ApplicationFiled: September 26, 2016Publication date: March 29, 2018Inventors: Chowdhury Barua, Lei Yu, Victor Boctor, Pretish Abraham, Raju Nagalinga S
-
Publication number: 20180007036Abstract: An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.Type: ApplicationFiled: September 18, 2017Publication date: January 4, 2018Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Kutlay Topatan, Maxim Ivanov, Victor Boctor, Palash Biswas, Bernard Luke Gallagher
-
Patent number: 9825869Abstract: A current request for a server to perform work for a user profile can be received and processed at the server. It can be determined whether server usage by the profile exhibits a sufficient trend toward a threshold value to warrant performing traffic shaping for the user profile. If so, then a delay time can be calculated based on, or as a function of, server resources used in processing the current request, and a response to the current request can be delayed by the delay time.Type: GrantFiled: February 25, 2016Date of Patent: November 21, 2017Assignee: Microsoft Technology Licensing, LLCInventors: David A. Sterling, Siddhartha Mathur, Victor Boctor
-
Patent number: 9769150Abstract: An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.Type: GrantFiled: January 14, 2011Date of Patent: September 19, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Kutlay Topatan, Maxim Ivanov, Victor Boctor, Palash Biswas, Bernard Luke Gallagher