Patents by Inventor Yuri Gurevich
Yuri Gurevich has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10771492Abstract: Systems and methods for analyzing security alerts within an enterprise are provided. An enterprise graph is generated based on information such as operational intelligence regarding the enterprise. The enterprise graph identifies relationships between entities of the enterprise and a plurality of security alerts are produced by a plurality of security components of the enterprise. One or more significant relationships are identified between two or more of the plurality of security alerts based on a strength of a relationship identified in the enterprise graph. A significant relationship is utilized to identify a potential security incident between two or more of the security alerts.Type: GrantFiled: September 22, 2016Date of Patent: September 8, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Efim Hudis, Michal Braverman-Blumenstyk, Daniel Alon, Hani Hana Neuvirth, Royi Ronen, Yuri Gurevich
-
Patent number: 10380008Abstract: A framework is described herein for identifying implicit assumptions associated with an SDK and its accompanying documentation (e.g., dev guide). An implicit assumption is information that is not expressly stated in the documentation, but which would be useful in assisting an application developer in building an application. The framework also describes a systematic approach for identifying one or more vulnerability patterns based on the identified implicit assumptions. An application developer may run a test on an application that is being developed to ensure that it does not have any deficiency which matches a vulnerability pattern.Type: GrantFiled: May 16, 2016Date of Patent: August 13, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, Yuri Gurevich
-
Publication number: 20180084001Abstract: Systems and methods for analyzing security alerts within an enterprise are provided. An enterprise graph is generated based on information such as operational intelligence regarding the enterprise. The enterprise graph identifies relationships between entities of the enterprise and a plurality of security alerts are produced by a plurality of security components of the enterprise. One or more significant relationships are identified between two or more of the plurality of security alerts based on a strength of a relationship identified in the enterprise graph. A significant relationship is utilized to identify a potential security incident between two or more of the security alerts.Type: ApplicationFiled: September 22, 2016Publication date: March 22, 2018Applicant: Microsoft Technology Licensing, LLC.Inventors: Efim Hudis, Michal Braverman-Blumenstyk, Daniel Alon, Hani Hana Neuvirth, Royi Ronen, Yuri Gurevich
-
Patent number: 9547664Abstract: The present invention extends to methods, systems, and computer program products for selecting candidate records for deduplication from a table. A table can be processed to compute an inverse index for each field of the table. A deduplication algorithm can traverse the inverse indices in accordance with a flexible user-defined policy to identify candidate records for deduplication. Both exact matches and approximate matches can be found.Type: GrantFiled: May 1, 2014Date of Patent: January 17, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Yaron Zinar, Efim Hudis, Yifat Orlin, Gal Novik, Yuri Gurevich, Gad Peleg
-
Patent number: 9514415Abstract: A target quantum circuit expressed in a first quantum gate basis may be transformed into a corresponding quantum circuit expressed in a second quantum gate basis, which may be a universal set of gates such as a V gate basis set. The target quantum circuit may be expressed as a linear combination of quantum gates. The linear combination of quantum gates may be mapped to a quaternion. The quaternion may be factorized, based at least in part on an amount of precision between the target quantum circuit and the corresponding quantum circuit expressed in the second quantum gate basis, into a sequence of quaternion factors. The sequence of quaternion factors may be mapped into a sequence of quantum gates of the second quantum gate basis, where the sequence of sequence of quantum gates is the corresponding quantum circuit.Type: GrantFiled: September 4, 2013Date of Patent: December 6, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Alexei V. Bocharov, Yuri Gurevich, Krysta M. Svore
-
Publication number: 20160259718Abstract: A framework is described herein for identifying implicit assumptions associated with an SDK and its accompanying documentation (e.g., dev guide). An implicit assumption is information that is not expressly stated in the documentation, but which would be useful in assisting an application developer in building an application. The framework also describes a systematic approach for identifying one or more vulnerability patterns based on the identified implicit assumptions. An application developer may run a test on an application that is being developed to ensure that it does not have any deficiency which matches a vulnerability pattern.Type: ApplicationFiled: May 16, 2016Publication date: September 8, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Rui WANG, Yuchen ZHOU, Shuo CHEN, Shaz QADEER, Yuri GUREVICH
-
Patent number: 9372785Abstract: A framework is described herein for identifying implicit assumptions associated with an SDK and its accompanying documentation (e.g., dev guide). An implicit assumption is information that is not expressly stated in the documentation, but which would be useful in assisting an application developer in building an application. The framework also describes a systematic approach for identifying one or more vulnerability patterns based on the identified implicit assumptions. An application developer may run a test on an application that is being developed to ensure that it does not have any deficiency which matches a vulnerability pattern.Type: GrantFiled: March 7, 2013Date of Patent: June 21, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, Yuri Gurevich
-
Publication number: 20160012512Abstract: Disclosed herein is a system and method for generating a user profile for a user from multiple different data sources and providing recommendations to a user that are directed to benefiting the user and not benefiting a particular merchant or service provider. This disparate data is taken from multiple different data sources that are often competitors of one another. From the multiple data sources the same transaction or event can be determined and correlated with each other. This information is then processed to generate the user's profile which is used to generated recommendations for the user based on the user's needs. Recommendations that are presented can be positive or negative recommendations.Type: ApplicationFiled: July 13, 2014Publication date: January 14, 2016Inventors: Neta Haiby, Elad Ziklik, Ronen Yaari, Efim Hudis, Royi Ronen, Yuri Gurevich
-
Publication number: 20140280427Abstract: A target quantum circuit expressed in a first quantum gate basis may be transformed into a corresponding quantum circuit expressed in a second quantum gate basis, which may be a universal set of gates such as a V gate basis set. The target quantum circuit may be expressed as a linear combination of quantum gates. The linear combination of quantum gates may be mapped to a quaternion. The quaternion may be factorized, based at least in part on an amount of precision between the target quantum circuit and the corresponding quantum circuit expressed in the second quantum gate basis, into a sequence of quaternion factors. The sequence of quaternion factors may be mapped into a sequence of quantum gates of the second quantum gate basis, where the sequence of sequence of quantum gates is the corresponding quantum circuit.Type: ApplicationFiled: September 4, 2013Publication date: September 18, 2014Applicant: Microsoft CorporationInventors: Alexei V. Bocharov, Yuri Gurevich, Krysta M. Svore
-
Publication number: 20140258986Abstract: A framework is described herein for identifying implicit assumptions associated with an SDK and its accompanying documentation (e.g., dev guide). An implicit assumption is information that is not expressly stated in the documentation, but which would be useful in assisting an application developer in building an application. The framework also describes a systematic approach for identifying one or more vulnerability patterns based on the identified implicit assumptions. An application developer may run a test on an application that is being developed to ensure that it does not have any deficiency which matches a vulnerability pattern.Type: ApplicationFiled: March 7, 2013Publication date: September 11, 2014Applicant: MICROSOFT CORPORATIONInventors: Rui Wang, Yuchen Zhou, Shuo Chen, Shaz Qadeer, Yuri Gurevich
-
Publication number: 20140236907Abstract: The present invention extends to methods, systems, and computer program products for selecting candidate records for deduplication from a table. A table can be processed to compute an inverse index for each field of the table. A deduplication algorithm can traverse the inverse indices in accordance with a flexible user-defined policy to identify candidate records for deduplication. Both exact matches and approximate matches can be found.Type: ApplicationFiled: May 1, 2014Publication date: August 21, 2014Applicant: Microsoft CorporationInventors: Yaron Zinar, Efim Hudis, Yifat Orlin, Gal Novik, Yuri Gurevich, Gad Peleg
-
Patent number: 8719236Abstract: The present invention extends to methods, systems, and computer program products for selecting candidate records for deduplication from a table. A table can be processed to compute an inverse index for each field of the table. A deduplication algorithm can traverse the inverse indices in accordance with a flexible user-defined policy to identify candidate records for deduplication. Both exact matches and approximate matches can be found.Type: GrantFiled: August 23, 2012Date of Patent: May 6, 2014Assignee: Microsoft CorporationInventors: Yaron Zinar, Efim Hudis, Yifat Orlin, Gal Novik, Yuri Gurevich, Gad Peleg
-
Publication number: 20140059015Abstract: The present invention extends to methods, systems, and computer program products for selecting candidate records for deduplication from a table. A table can be processed to compute an inverse index for each field of the table. A deduplication algorithm can traverse the inverse indices in accordance with a flexible user-defined policy to identify candidate records for deduplication. Both exact matches and approximate matches can be found.Type: ApplicationFiled: August 23, 2012Publication date: February 27, 2014Applicant: MICROSOFT CORPORATIONInventors: Yaron Zinar, Efim Hudis, Yifat Orlin, Gal Novik, Yuri Gurevich, Gad Peleg
-
Patent number: 8468505Abstract: A state component saves a present state of a program or model. This state component can be invoked by the program or model itself, thereby making state a first-class citizen. As the state of the program evolves from the saved state, the saved state remains for reflection and recall, for example, for testing, verification, transaction processing, etc. Using a state reference token, the saved state of the program or model can be accessed by the program or model. For example, the program or model by utilizing a state component, can return itself to the saved state. After returning to the saved state, a second execution path can be introduced without requiring re-execution of the actions leading to the saved state. In another example, the state space of an executing model is saved in order to generate inputs required to exercise a program or model.Type: GrantFiled: August 31, 2009Date of Patent: June 18, 2013Assignee: Microsoft CorporationInventors: Wolfgang Grieskamp, Yuri Gurevich, Wolfram Schulte, Nikolai Tillmann
-
Patent number: 8117173Abstract: The present invention provides a method for chunking an object. The method is arranged to provide efficient chunking of objects such that objects can be efficiently updated between a remote machine and a local machine over a network. The chunking algorithm is applicable in networked application such as file synchronization using remote differential compression (RDC) techniques. The chunking algorithm provides enhanced efficiencies by locating chunk boundaries around local maxima.Type: GrantFiled: April 28, 2009Date of Patent: February 14, 2012Assignee: Microsoft CorporationInventors: Yuri Gurevich, Nikolaj S. Bjorner, Dan Teodosiu
-
Publication number: 20100011194Abstract: A state component saves a present state of a program or model. This state component can be invoked by the program or model itself, thereby making state a first-class citizen. As the state of the program evolves from the saved state, the saved state remains for reflection and recall, for example, for testing, verification, transaction processing, etc. Using a state reference token, the saved state of the program or model can be accessed by the program or model. For example, the program or model by utilizing a state component, can return itself to the saved state. After returning to the saved state, a second execution path can be introduced without requiring re-execution of the actions leading to the saved state. In another example, the state space of an executing model is saved in order to generate inputs required to exercise a program or model.Type: ApplicationFiled: August 31, 2009Publication date: January 14, 2010Applicant: Microsoft CorporationInventors: Wolfgang Grieskamp, Yuri Gurevich, Wolfram Schulte, Nikolai Tillmann
-
Publication number: 20090271528Abstract: The present invention provides a method for chunking an object. The method is arranged to provide efficient chunking of objects such that objects can be efficiently updated between a remote machine and a local machine over a network. The chunking algorithm is applicable in networked application such as file synchronization using remote differential compression (RDC) techniques. The chunking algorithm provides enhanced efficiencies by locating chunk boundaries around local maxima.Type: ApplicationFiled: April 28, 2009Publication date: October 29, 2009Applicant: MICROSOFT CORPORATIONInventors: Yuri Gurevich, Nikolaj S. Bjorner, Dan Teodosiu
-
Patent number: 7584463Abstract: A state component saves a present state of a program or model. This state component can be invoked by the program or model itself, thereby making state a first-class citizen. As the state of the program evolves from the saved state, the saved state remains for reflection and recall, for example, for testing, verification, transaction processing, etc. Using a state reference token, the saved state of the program or model can be accessed by the program or model. For example, the program or model by utilizing a state component, can return itself to the saved state. After returning to the saved state, a second execution path can be introduced without requiring re-execution of the actions leading to the saved state. In another example, the state space of an executing model is saved in order to generate inputs required to exercise a program or model.Type: GrantFiled: August 27, 2003Date of Patent: September 1, 2009Assignee: Microsoft CorporationInventors: Wolfgang Grieskamp, Yuri Gurevich, Wolfram Schulte, Nikolai Tillmann
-
Patent number: 7555531Abstract: A method and system are related to updating objects over limited bandwidth networks. Objects are updated between two or more computing devices using remote differential compression (RDC) techniques such that required data transfers are minimized. In one aspect, efficient large object transfers are achieved by recursively applying the RDC algorithm to its own metadata; a single or multiple recursion step(s) may be used in this case to reduce the amount of metadata sent over the network by the RDC algorithm. Objects and/or signature and chunk length lists can be chunked by locating boundaries at dynamically determined locations. A mathematical function evaluates hash values associated within a horizon window relative to potential chunk boundary.Type: GrantFiled: April 15, 2004Date of Patent: June 30, 2009Assignee: Microsoft CorporationInventors: Dan Teodosiu, Nikolaj S. Bjørner, Yuri Gurevich, Patrick E. Bozeman
-
Patent number: 7493544Abstract: State spaces are traversed to produce test cases, or test coverage. Test coverage is a test suite of sequences. Accepting states are defined. Expected costs are assigned to the test graph states. Strategies are created providing transitions to states with lower expected costs. Linear programs and other approximations are discussed for providing expected costs. Strategies are more likely to provide access to an accepting state, based on expected costs. Strategies are used to append transitions to test segments such that the new test segment ends in an accepting state.Type: GrantFiled: January 21, 2005Date of Patent: February 17, 2009Assignee: Microsoft CorporationInventors: Andreas Blass, Colin L. Campbell, Lev Borisovich Nachmanson, Margus Veanes, Michael Barnett, Nikolai Tillmann, Wolfgang Grieskamp, Wolfram Schulte, Yuri Gurevich