Patents by Inventor Yadhu Gopalan
Yadhu Gopalan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240053992Abstract: Systems and methods for automated migration of operating systems on computing devices are disclosed. For example, a system may include a processor, and a storage operatively coupled to the processor. The storage stores instructions that perform operations that may include reducing a size of the first operating system to require less space on a first storage portion storing the first operating system, repartitioning the storage to form a second storage portion sized to receive a second operating system, installing a bootloader operable to load either the first operating system or the second operating system, installing the second operating system into the second storage portion, rebooting the system using the bootloader, receiving an input indicative of a selection of either the first operating system or the second operating system, and booting one of the first operating system or the second operating system in accordance with the input.Type: ApplicationFiled: August 11, 2023Publication date: February 15, 2024Inventors: Varun Chitre, Yadhu Gopalan
-
Patent number: 9239761Abstract: A transaction safe file system uses two sets of file allocation tables and bitmap images to perform file modifications on one of the sets while the other set remains a last known good set. After a modification is complete, a pointer is changed to the newly modified set, and the newly modified set becomes the last known good set. The sets are then synchronized. The file allocation table is used to define cluster chains while the bitmap image is used to determine if a cluster is free or not. In some operations, only the bitmap image may need to be manipulated. The file system may be used in a transaction safe mode as well as a non-transaction safe mode.Type: GrantFiled: August 15, 2011Date of Patent: January 19, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Patent number: 9141630Abstract: Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second.Type: GrantFiled: July 29, 2013Date of Patent: September 22, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Publication number: 20130318136Abstract: Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second.Type: ApplicationFiled: July 29, 2013Publication date: November 28, 2013Applicant: MICROSOFT CORPORATIONInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Patent number: 8544014Abstract: Scheduling of threads in a multi-core system is performed using per-processor queues for each core to hold threads with fixed affinity for each core. Cores are configured to pick the highest priority thread among the global run queue, which holds threads without affinity, and their respective per-processor queue. To select between two threads with same priority on both queues, the threads are assigned sequence numbers based on their time of arrival. The sequence numbers may be weighted for either queue to prioritize one over the other.Type: GrantFiled: July 24, 2007Date of Patent: September 24, 2013Assignee: Microsoft CorporationInventors: Yadhu Gopalan, Bor-ming Hsieh, Mark Miller
-
Patent number: 8499013Abstract: Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second.Type: GrantFiled: September 19, 2011Date of Patent: July 30, 2013Assignee: Microsoft CorporationInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Patent number: 8397290Abstract: Embodiments provide a security infrastructure that may be configured to run on top of an existing operating system to control what resources can be accessed by an applications and what APIs an application can call. Security decisions are made by taking into account both the current thread's identity and the current thread's call chain context to enable minimal privilege by default. The current thread context is captured and a copy of it is created to be used to perform security checks asynchronously. Every thread in the system has an associated identity. To obtain access to a particular resource, all the callers on the current thread are analyzed to make sure that each caller and thread has access to that resource. Only when each caller and thread has access to that resource is the caller given access to that resource.Type: GrantFiled: June 27, 2008Date of Patent: March 12, 2013Assignee: Microsoft CorporationInventors: Neil Laurence Coles, Scott Randall Shell, Upender Reddy Sandadi, Angelo Renato Vals, Matthew G. Lyons, Christopher Ross Jordan, Andrew Rogers, Yadhu Gopalan, Bor-Ming Hsieh
-
Patent number: 8327363Abstract: Scheduling of threads in a multi-core system running various legacy applications along with multi-core compatible applications is configured such that threads from older single thread applications are assigned fixed affinity. Threads from multi-thread/single core applications are scheduled such that one thread at a time is made available to the cores based on the thread priority preventing conflicts and increasing resource efficiency. Threads from multi-core compatible applications are handled regularly.Type: GrantFiled: July 24, 2007Date of Patent: December 4, 2012Assignee: Microsoft CorporationInventors: Yadhu Gopalan, Bor-ming Hsieh, Mark Miller
-
Publication number: 20120011179Abstract: Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second.Type: ApplicationFiled: September 19, 2011Publication date: January 12, 2012Applicant: MICROSOFT CORPORATIONInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Publication number: 20110302142Abstract: A transaction safe file system uses two sets of file allocation tables and bitmap images to perform file modifications on one of the sets while the other set remains a last known good set. After a modification is complete, a pointer is changed to the newly modified set, and the newly modified set becomes the last known good set. The sets are then synchronized. The file allocation table is used to define cluster chains while the bitmap image is used to determine if a cluster is free or not. In some operations, only the bitmap image may need to be manipulated. The file system may be used in a transaction safe mode as well as a non-transaction safe mode.Type: ApplicationFiled: August 15, 2011Publication date: December 8, 2011Applicant: MICROSOFT CORPORATIONInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Patent number: 8024383Abstract: Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second.Type: GrantFiled: November 2, 2009Date of Patent: September 20, 2011Assignee: Mircrosoft CorporationInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Patent number: 8001165Abstract: A transaction safe file system uses two sets of file allocation tables and bitmap images to perform file modifications on one of the sets while the other set remains a last known good set. After a modification is complete, a pointer is changed to the newly modified set, and the newly modified set becomes the last known good set. The sets are then synchronized. The file allocation table is used to define cluster chains while the bitmap image is used to determine if a cluster is free or not. In some operations, only the bitmap image may need to be manipulated. The file system may be used in a transaction safe mode as well as a non-transaction safe mode.Type: GrantFiled: May 6, 2010Date of Patent: August 16, 2011Assignee: Microsoft CorporationInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Patent number: 7930760Abstract: This disclosure describes techniques of using a centralized rule database to control the abilities of software processes to perform actions with regard to resources provided by a computer. As described herein, each software process executing in a computer executes within a chamber and each resource provided by the computer is associated with a canonical name that uniquely identifies the resource. Furthermore, the computer stores a set of security rules in a centralized rule database. In addition, this disclosure describes techniques of enforcing the rules stored in the centralized rule database.Type: GrantFiled: June 27, 2008Date of Patent: April 19, 2011Assignee: Microsoft CorporationInventors: Neil Coles, Yadhu Gopalan, Christopher Jordan, Matthew Lyons, Andrew Rogers, Upender Sandadi, Scott Shell, Zoheb Vacheri, Angelo Vals, Sharath Viswanathan, Loren M. Kohnfelder
-
Publication number: 20100217788Abstract: A transaction safe file system uses two sets of file allocation tables and bitmap images to perform file modifications on one of the sets while the other set remains a last known good set. After a modification is complete, a pointer is changed to the newly modified set, and the newly modified set becomes the last known good set. The sets are then synchronized. The file allocation table is used to define cluster chains while the bitmap image is used to determine if a cluster is free or not. In some operations, only the bitmap image may need to be manipulated. The file system may be used in a transaction safe mode as well as a non-transaction safe mode.Type: ApplicationFiled: May 6, 2010Publication date: August 26, 2010Applicant: MICROSOFT CORPORATIONInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Patent number: 7747664Abstract: A transaction safe file system uses two sets of file allocation tables and bitmap images to perform file modifications on one of the sets while the other set remains a last known good set. After a modification is complete, a pointer is changed to the newly modified set, and the newly modified set becomes the last known good set. The sets are then synchronized. The file allocation table is used to define cluster chains while the bitmap image is used to determine if a cluster is free or not. In some operations, only the bitmap image may need to be manipulated. The file system may be used in a transaction safe mode as well as a non-transaction safe mode.Type: GrantFiled: January 16, 2007Date of Patent: June 29, 2010Assignee: Microsoft CorporationInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Publication number: 20100049776Abstract: Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second.Type: ApplicationFiled: November 2, 2009Publication date: February 25, 2010Applicant: MICROSOFT CORPORATIONInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Publication number: 20090328180Abstract: Embodiments provide a security infrastructure that may be configured to run on top of an existing operating system to control what resources can be accessed by an applications and what APIs an application can call. Security decisions are made by taking into account both the current thread's identity and the current thread's call chain context to enable minimal privilege by default. The current thread context is captured and a copy of it is created to be used to perform security checks asynchronously. Every thread in the system has an associated identity. To obtain access to a particular resource, all the callers on the current thread are analyzed to make sure that each caller and thread has access to that resource. Only when each caller and thread has access to that resource is the caller given access to that resource.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: Microsoft CorporationInventors: Neil Laurence Coles, Scott Randall Shell, Upender Sandadi, Angelo Renato Vals, Matthew G. Lyons, Christopher Ross Jordan, Andrew Rogers, Yadhu Gopalan, Bor-Ming Hsieh
-
Patent number: 7613738Abstract: Directories in a file system are defined with a dummy cluster in a file allocation table as the initial entry. Subsequent clusters in a directory's definition may define any data for the directory that can be changed in a transaction-safe mode. A directory may be modified in a transaction-safe mode by modifying any of the subsequent clusters while tracking changes in a second file allocation table. When the changes have been made to the directory, a pointer to the second file allocation table may be switched to indicate that the second file allocation table is now last known good. The first file allocation table may then be synchronized with the second.Type: GrantFiled: January 16, 2007Date of Patent: November 3, 2009Assignee: Microsoft CorporationInventors: Sachin Patel, Yadhu Gopalan, Andrew Rogers
-
Publication number: 20090249436Abstract: This disclosure describes techniques of using a centralized rule database to control the abilities of software processes to perform actions with regard to resources provided by a computer. As described herein, each software process executing in a computer executes within a chamber and each resource provided by the computer is associated with a canonical name that uniquely identifies the resource. Furthermore, the computer stores a set of security rules in a centralized rule database. In addition, this disclosure describes techniques of enforcing the rules stored in the centralized rule database.Type: ApplicationFiled: June 27, 2008Publication date: October 1, 2009Applicant: MICROSOFT CORPORATIONInventors: Neil Coles, Yadhu Gopalan, Christopher Jordan, Matthew Lyons, Andrew Rogers, Upender Sandadi, Scott Shell, Zoheb Vacheri, Angelo Vals, Sharath Viswanathan, Loren M. Kohnfelder
-
Patent number: 7509497Abstract: The present invention provides an efficient application oriented security model. Prior to execution, an application is authenticated, and security information associated with the application is retrieved. The security information is then used to generate a token that is attached to the application. The security information may include a principle account associated with the application, a list of group accounts, and a corresponding privilege list.Type: GrantFiled: June 23, 2004Date of Patent: March 24, 2009Assignee: Microsoft CorporationInventors: George Joy, Mukkul Dasgupta, Scott Shell, Yadhu Gopalan