Patents by Inventor Vikram Kakumani

Vikram Kakumani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8924576
    Abstract: In order to allow a single user registered on a single local host or other machine to access multiple shared resources on a remote host, an aliasing mechanism is employed so that multiple concurrent connections can be established by the user to a single remote host, with each connection using a different identity. Each connection can therefore be used to access a different shared resource on the remote host. In some illustrative examples, a user's identifier such as his or her machine log-in identification may be associated with two or more resource sharing aliases. As a result, two or more resource sharing sessions can be established by the user with a single remote host, with each of the sessions using a different one of the aliases. The resource sharing sessions are usually established in accordance with a resource sharing protocol such as the Server Block Message (SBM) protocol.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: December 30, 2014
    Assignee: Microsoft Corporation
    Inventors: Jason Brewer, Neeraj Garg, Gavarraju Nanduri, Vikram Kakumani
  • Patent number: 8782251
    Abstract: Aspects of the subject matter described herein relate to a mechanism for seamlessly changing a network mode of a network device that is connected to multiple nodes. In aspects, agents reside on the nodes. A master agent communicates with the other agents and receives the capabilities of the nodes on which they execute. The master agent creates a data structure that includes the settings needed to connect using the new network mode. The master agent distributes this data structure to the other agents and each agent stores settings associated with the current network mode in case a rollback is needed. The master agent then instructs the other agents to begin communicating using the new network mode and the network device is reconfigured. If the master agent does not receive success acknowledgments from all of the other agents, the master agent initiates a rollback procedure.
    Type: Grant
    Filed: February 27, 2008
    Date of Patent: July 15, 2014
    Assignee: Microsoft Corporation
    Inventors: Anthony Joseph Girolamo, Scott David Hoogerwerf, Vikram Kakumani
  • Patent number: 8713535
    Abstract: Use of software applications is detected by categorizing components of applications into a usage manifest and implementing a usage detection background service on a client PC that monitors the components according to the usage manifest. The application components are categorized based on the mode of user interaction as well as the component's correlation to active use of an application. The background service tracks events and activities associated with the application components to generate usage metrics that include the frequency of unique launches of an application and the duration of each unique use. A usage manager for the background service may utilize the usage metrics for a component independently, or combine metrics for multiple components in cases where applications work in an interactive manner (such as a plug-in to a web browser) in order to compute application usage by comparing the metrics against predefined thresholds.
    Type: Grant
    Filed: June 30, 2008
    Date of Patent: April 29, 2014
    Assignee: Microsoft Corporation
    Inventors: Nipoon Malhotra, Ram Viswanathan, Vikram Kakumani, Mauktik H. Gandhi, Sarath Madakasira, Yiming Li, Kiran Sagi
  • Publication number: 20140020045
    Abstract: Systems and/or methods for deploying and implementing data loss prevention (DLP) policy definition that may encapsulate the requirements, control objectives and directives, and/or the definitions of sensitive data types as stipulated directly or indirectly by the regulatory policy are disclosed. In one embodiment, DLP policies may be identified by an organization to run on top of a set of electronic file systems (e.g., email systems, file systems, web servers and the like). Organizations and their administrators may implement a set of DLP policy instance which are derived from DLP policy templates. DLP policy templates may comprise both structure and meaning—and may acquire a given DLP policy by the replacement of parameterized expressions with desired parameter values. In another embodiment, the state of the DLP policy instance may change according to the lifecycle of the policy instance deployment.
    Type: Application
    Filed: July 10, 2012
    Publication date: January 16, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Lynn Ayres, Jack Kabat, Vikram Kakumani, Mashuri Libman, Benjamin Stull, Anatoly Koretsky, Andrey Shur, Joseph Schulman
  • Publication number: 20140020044
    Abstract: System and methods for the implementation and/or enforcement of an email policy for an organization's email system are presented. A Data Loss Prevention (DLP) policy may be implemented on top of the email system. In one embodiment, the DLP policy may comprise modules and/or processing that tests emails for such sensitive data within emails. If an email comprises such sensitive data, then the DLP policy directives may specify processing to be applied as part of each stage of mail processing, from authoring to mail processing on the server and delivery. A single policy may be authored and managed that will apply the policy directives uniformly across all aspects of the message lifecycle. Each of the message policy enforcement systems may evaluate the single policy definition and apply the policy directives in a manner consistent with the contextual evaluation of the policy.
    Type: Application
    Filed: July 10, 2012
    Publication date: January 16, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Lynn Ayres, Jack Kabat, Vikram Kakumani, Mashuri Libman, Benjamin Stull, Anatoly Koretsky, Vidyaraman Sankaranarayanan
  • Publication number: 20130262589
    Abstract: A simple mail transfer protocol (“SMTP”) computer fails to deliver a multi-recipient e-mail to another SMTP computer. The SMTP computer generates a multi-line SMTP response including a per-recipient delivery status for each recipient of the multi-recipient e-mail message. The multi-line SMTP response may include a line for each recipient of the e-mail message. The multi-line SMTP response alternatively may include a line only for recipients for which delivery of the e-mail message has failed.
    Type: Application
    Filed: March 27, 2012
    Publication date: October 3, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: Alex Dubovik, Gregory Gourevitch, Yehia Ali Zayour, Wilbert De Graaf, Vikram Kakumani
  • Publication number: 20120051657
    Abstract: Similarity is determined between documents based on a method for identifying documents that are likely to be based on another document. The method can include the determination of a containment coefficient, which can indicate when a template document is a subset or substantially a subset of another document. Based on this determination, an appropriate document management action can be taken, such as implementing a security policy or modifying the display of messages from a user interface.
    Type: Application
    Filed: August 30, 2010
    Publication date: March 1, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Charles Lamanna, Raja Charu Vikram Kakumani, Vidyaraman Sankaranarayanan, Arnd Christian König
  • Patent number: 8082218
    Abstract: Conflicts among programs are detected, and advice is given based on the detected conflicts. A set of conflict rules defines what constitutes a conflict, and a set of advice rules defines what advice is to be given in response to a conflict that has been detected. The conflict rules may be provided by a different party from the action rules, so the decision as to what constitutes a conflict can be made separately from the decision as to what advice should be given when a conflict is detected.
    Type: Grant
    Filed: August 21, 2007
    Date of Patent: December 20, 2011
    Assignee: Microsoft Corporation
    Inventors: Karthik Lakshminarayanan, Grigor Shirakyan, R. C. Vikram Kakumani, Terrence Lui
  • Patent number: 7761912
    Abstract: Reputation based firewall policy techniques are described, in which, a computer-implemented method may be employed to collect data from a plurality of clients regarding an application attempting to access a network via the clients. The collected data may be exposed to a community of users to obtain feedback on the application which is used to produce a reputation for the application. The reputation may then be provided to the plurality of clients to determine whether to permit the attempt by the application.
    Type: Grant
    Filed: June 6, 2006
    Date of Patent: July 20, 2010
    Assignee: Microsoft Corporation
    Inventors: Steven C Yee, Mauktik H Gandhi, Brian R. Hall, Vikram Kakumani, Michael Mitchell, Tatiana Shubin
  • Patent number: 7653879
    Abstract: A contextually sensitive user interface for defining an e-mail message handling rule is provided. The user interface includes one or more user interface objects for specifying conditions for the rule and one or more user interface objects for defining the actions to be performed if the specified conditions are met. The conditions that are displayed within the user interface for selection are chosen, at least in part, based upon the context in which a request to create the e-mail handling rule is received. The displayed conditions may be based, in part, upon the contexts of reading an e-mail message, creating an e-mail message, creating an alert subscription, or selecting a user name.
    Type: Grant
    Filed: September 16, 2003
    Date of Patent: January 26, 2010
    Assignee: Microsoft Corporation
    Inventors: Chaitanya Dev Sareen, Paul Daley, Radu Bacioiu, Christopher Cameron White, Michael Philip Arcuri, Raja Charu Vikram Kakumani, Julie Madhusoodanan
  • Publication number: 20090327482
    Abstract: Use of software applications is detected by categorizing components of applications into a usage manifest and implementing a usage detection background service on a client PC that monitors the components according to the usage manifest. The application components are categorized based on the mode of user interaction as well as the component's correlation to active use of an application. The background service tracks events and activities associated with the application components to generate usage metrics that include the frequency of unique launches of an application and the duration of each unique use. A usage manager for the background service may utilize the usage metrics for a component independently, or combine metrics for multiple components in cases where applications work in an interactive manner (such as a plug-in to a web browser) in order to compute application usage by comparing the metrics against predefined thresholds.
    Type: Application
    Filed: June 30, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Nipoon Malhotra, Ram Viswanathan, Vikram Kakumani, Mauktik H. Gandhi, Sarath Madakasira, Yiming Li, Kiran Sagi
  • Publication number: 20090327502
    Abstract: In order to allow a single user registered on a single local host or other machine to access multiple shared resources on a remote host, an aliasing mechanism is employed so that multiple concurrent connections can be established by the user to a single remote host, with each connection using a different identity. Each connection can therefore be used to access a different shared resource on the remote host. In some illustrative examples, a user's identifier such as his or her machine log-in identification may be associated with two or more resource sharing aliases. As a result, two or more resource sharing sessions can be established by the user with a single remote host, with each of the sessions using a different one of the aliases. The resource sharing sessions are usually established in accordance with a resource sharing protocol such as the Server Block Message (SBM) protocol.
    Type: Application
    Filed: June 30, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Jason Brewer, Neeraj Garg, Gavarraju Nanduri, Vikram Kakumani
  • Publication number: 20090213758
    Abstract: Aspects of the subject matter described herein relate to a mechanism for seamlessly changing a network mode of a network device that is connected to multiple nodes. In aspects, agents reside on the nodes. A master agent communicates with the other agents and receives the capabilities of the nodes on which they execute. The master agent creates a data structure that includes the settings needed to connect using the new network mode. The master agent distributes this data structure to the other agents and each agent stores settings associated with the current network mode in case a rollback is needed. The master agent then instructs the other agents to begin communicating using the new network mode and the network device is reconfigured. If the master agent does not receive success acknowledgments from all of the other agents, the master agent initiates a rollback procedure.
    Type: Application
    Filed: February 27, 2008
    Publication date: August 27, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Anthony Joseph Girolamo, Scott David Hoogerwerf, Vikram Kakumani
  • Publication number: 20090055340
    Abstract: Conflicts among programs are detected, and advice is given based on the detected conflicts. A set of conflict rules defines what constitutes a conflict, and a set of advice rules defines what advice is to be given in response to a conflict that has been detected. The conflict rules may be provided by a different party from the action rules, so the decision as to what constitutes a conflict can be made separately from the decision as to what advice should be given when a conflict is detected.
    Type: Application
    Filed: August 21, 2007
    Publication date: February 26, 2009
    Applicant: Microsoft Corporation
    Inventors: Karthik Lakshminarayanan, Grigor Shirakyan, R.C. Vikram Kakumani, Terrence Lui
  • Patent number: 7487181
    Abstract: Targeted rules and action based support techniques are described, in which, operational data collected from a plurality of clients is used to generate support instructions for troubleshooting operational problems of the clients. Clients are provided targeted access to support instructions based upon information included in the support instructions which matches the support instructions to the clients. In an implementation, clients may be placed in one or more groups based on the analysis of the operational data and may receive support instructions corresponding to the group automatically and without user intervention.
    Type: Grant
    Filed: June 6, 2006
    Date of Patent: February 3, 2009
    Assignee: Microsoft Corporation
    Inventors: Karthik Lakshminarayanan, Vikram Kakumani
  • Publication number: 20080022384
    Abstract: Reputation based firewall policy techniques are described, in which, a computer-implemented method may be employed to collect data from a plurality of clients regarding an application attempting to access a network via the clients. The collected data may be exposed to a community of users to obtain feedback on the application which is used to produce a reputation for the application. The reputation may then be provided to the plurality of clients to determine whether to permit the attempt by the application.
    Type: Application
    Filed: June 6, 2006
    Publication date: January 24, 2008
    Applicant: Microsoft Corporation
    Inventors: Steven C. Yee, Mauktik H. Gandhi, Brian R. Hall, Vikram Kakumani, Michael Mitchell, Tatiana Shubin
  • Publication number: 20070282852
    Abstract: Targeted rules and action based support techniques are described, in which, operational data collected from a plurality of clients is used to generate support instructions for troubleshooting operational problems of the clients. Clients are provided targeted access to support instructions based upon information included in the support instructions which matches the support instructions to the clients. In an implementation, clients may be placed in one or more groups based on the analysis of the operational data and may receive support instructions corresponding to the group automatically and without user intervention.
    Type: Application
    Filed: June 6, 2006
    Publication date: December 6, 2007
    Applicant: Microsoft Corporation
    Inventors: Karthik Lakshminarayanan, Vikram Kakumani