-
公开(公告)号:US20170272235A1
公开(公告)日:2017-09-21
申请号:US15406597
申请日:2017-01-13
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ranjita Bhagwan , Nishanth Chandran , Ramachandran Ramjee , Harmeet Singh , Antonios Papadimitriou , Saikrishna Badrinarayanan
CPC classification number: H04L9/008 , G06F7/50 , G06Q20/401 , G06Q2220/12 , H04L9/0618
Abstract: In some embodiments, an encryption system secures data using a homomorphic encryption. The encryption system encrypts a number by encrypting a number identifier of the number and combining the number and the encrypted number identifier using a mathematical operation to generate an encrypted number. The encrypted numbers may be stored at a server system along with their number identifiers. The server system can then generate an aggregation (e.g., sum) of the encrypted numbers and provide the aggregation, the encrypted numbers, and the number identifiers. The encryption system can then separate the aggregation of the numbers from the aggregation of the encrypted numbers using an inverse of the mathematical operation used in the encryption to effect removal of an aggregation of the encrypted number identifiers of the numbers from the aggregation of the encrypted numbers. The separated aggregation of the numbers is an aggregation of the plurality of the numbers.
-
公开(公告)号:US12095610B2
公开(公告)日:2024-09-17
申请号:US17674716
申请日:2022-02-17
Applicant: MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Ranjita Bhagwan , Harsha Sharma , Parth Dhaval Thakkar , Sagar Bharadwaj Kalasibail Seetharam , Venkata N. Padmanabhan , Kathleen Voelbel , Vijay Rajeshkumar , Yogesh Bansal
IPC: H04L41/0806 , H04L41/069 , H04L41/14 , H04L41/147 , H04L45/02
CPC classification number: H04L41/0806 , H04L41/069 , H04L41/145 , H04L41/147 , H04L45/02
Abstract: The techniques disclosed herein provision inter-DC WAN capacity based on network failure statistics and bandwidth demands of a cloud-hosted application. Network capacity is provisioned based on an assumption of runtime cooperation between the application and the network. For example, if the network detects that a link has failed, the application may cooperate with the network to pause a deferrable transfer, reserving bandwidth for non-deferrable transfers. With knowledge that deferrable transfers will be dynamically paused when a primary link fails, backup links may be provisioned with less capacity than the primary link. The ability to dynamically defer transfers also enables a greater degree of bandwidth smoothing, e.g. reducing peak demand by scheduling deferrable transfers for off-peak hours. This allows network links to be provisioned with less capacity than if all transfers were performed immediately.
-
公开(公告)号:US11977606B2
公开(公告)日:2024-05-07
申请号:US17607621
申请日:2021-08-31
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ranjita Bhagwan , Sonu Mehta , Arjun Radhakrishna , Sahil Garg
IPC: G06F16/35 , G06F16/2455 , G06F18/2323
CPC classification number: G06F18/2323 , G06F16/24564 , G06F16/24565 , G06F16/35
Abstract: A computer implemented method includes obtaining multiple configuration files that include configuration commit histories, detecting patterns in parameter values in the configuration files to generate file-based rules for configuration parameters, detecting patterns in parameter values in the configuration files to generate history-based rules using commit histories for the configuration parameters, and exposing the rules to calling programs.
-
公开(公告)号:US20180076951A1
公开(公告)日:2018-03-15
申请号:US15331715
申请日:2016-10-21
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ranjita Bhagwan , Nishanth Chandran , Ramachandran Ramjee
CPC classification number: H04L9/008 , H04L63/0428
Abstract: An encryption system stores encrypted values for aggregation is provided. The encryption system accesses an input set with input values. For each distinct value in the input set of input values, the encryption system generates an output set with an encrypted output value corresponding to each input value. The encryption system sets the encrypted output value for a corresponding input value to an encryption of an indicator of a match when the corresponding input value is the same as that distinct value. Otherwise, the encryption sets the encrypted output value for the corresponding input value to an encryption of an indicator of no match. The encrypted output values can then be aggregated to generate an encrypted aggregation based on input values that match, and the encrypted aggregation can be decrypted to generated a decrypted aggregation based on the input values that match.
-
5.
公开(公告)号:US11599354B2
公开(公告)日:2023-03-07
申请号:US16515135
申请日:2019-07-18
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ranjita Bhagwan , Chandra Sekhar Maddila , Aditya Kumar , Sumit Asthana , Rahul Kumar , Sonu Mehta , Chetan Bansal , Balasubramanyan Ashok , Christian Alma Bird
Abstract: Described herein is a system and method for detecting correlated changes (e.g., between code files and configuration files). For a plurality of code files and a plurality of configuration files, a correlated change model is trained to identify correlated changes across the code files and the configuration files using a machine learning algorithm that discovers change rules using a support parameter, and, a confidence parameter, and, a refinement algorithm that refines the discovered change rules. The correlated change model comprising the change rules is stored. The correlated change model can be used to identify potential issue(s) regarding a particular file (e.g., changed code or configuration file(s)). Information regarding the identified potential issue(s) can be provided to a user.
-
公开(公告)号:US10554384B2
公开(公告)日:2020-02-04
申请号:US15406597
申请日:2017-01-13
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ranjita Bhagwan , Nishanth Chandran , Ramachandran Ramjee , Harmeet Singh , Antonios Papadimitriou , Saikrishna Badrinarayanan
Abstract: In some embodiments, an encryption system secures data using a homomorphic encryption. The encryption system encrypts a number by encrypting a number identifier of the number and combining the number and the encrypted number identifier using a mathematical operation to generate an encrypted number. The encrypted numbers may be stored at a server system along with their number identifiers. The server system can then generate an aggregation (e.g., sum) of the encrypted numbers and provide the aggregation, the encrypted numbers, and the number identifiers. The encryption system can then separate the aggregation of the numbers from the aggregation of the encrypted numbers using an inverse of the mathematical operation used in the encryption to effect removal of an aggregation of the encrypted number identifiers of the numbers from the aggregation of the encrypted numbers. The separated aggregation of the numbers is an aggregation of the plurality of the numbers.
-
公开(公告)号:US10187199B2
公开(公告)日:2019-01-22
申请号:US15331715
申请日:2016-10-21
Applicant: Microsoft Technology Licensing, LLC
Inventor: Ranjita Bhagwan , Nishanth Chandran , Ramachandran Ramjee
Abstract: An encryption system stores encrypted values for aggregation is provided. The encryption system accesses an input set with input values. For each distinct value in the input set of input values, the encryption system generates an output set with an encrypted output value corresponding to each input value. The encryption system sets the encrypted output value for a corresponding input value to an encryption of an indicator of a match when the corresponding input value is the same as that distinct value. Otherwise, the encryption sets the encrypted output value for the corresponding input value to an encryption of an indicator of no match. The encrypted output values can then be aggregated to generate an encrypted aggregation based on input values that match, and the encrypted aggregation can be decrypted to generated a decrypted aggregation based on the input values that match.
-
公开(公告)号:US20230267178A1
公开(公告)日:2023-08-24
申请号:US17607621
申请日:2021-08-31
Applicant: Microsoft Technology Licensing, LLC.
Inventor: Ranjita Bhagwan , Sonu MEHTA , Arjun RADHAKRISHNA , Sahil GARG
IPC: G06F18/2323
CPC classification number: G06F18/2323
Abstract: A computer implemented method includes obtaining multiple configuration files that include configuration commit histories, detecting patterns in parameter values in the configuration files to generate file-based rules for configuration parameters, detecting patterns in parameter values in the configuration files to generate history-based rules using commit histories for the configuration parameters, and exposing the rules to calling programs.
-
-
-
-
-
-
-