Search

Valeriy Tsuryk Phones & Addresses

  • Snoqualmie, WA
  • Seattle, WA
  • Issaquah, WA
  • Cleveland, OH
  • 22626 Inglewood Hill Rd, Sammamish, WA 98074 (425) 898-0412
  • Redmond, WA

Industries

Computer Software

Resumes

Resumes

Valeriy Tsuryk Photo 1

Program Manager @ Microsoft

View page
Position:
Program Manager, Windows Core OS at Microsoft
Location:
Greater Seattle Area
Industry:
Computer Software

Publications

Us Patents

Dynamic Out-Of-Process Software Components Isolation For Trustworthiness Execution

View page
US Patent:
7587594, Sep 8, 2009
Filed:
Aug 30, 2004
Appl. No.:
10/929339
Inventors:
Jude Jacob Kavalam - Seattle WA, US
Edward J. Praitis - Woodinville WA, US
Jonathan C. Lew - Redmond WA, US
Pierre-Yves Santerre - Bellevue WA, US
Timothy D. Noonan - Cary NC, US
Valeriy V. Tsuryk - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 26/06
US Classification:
713167
Abstract:
Preventing uncontrolled access to an execution environment of a first component object by a second component object. A system includes a memory area storing the first component object, the second component object, and one or more predefined properties associated with the second component object. The system comprises a processor configured to receive a request from the first component object stored in the memory area to create the second component object stored in the memory area. The first component object executes in a first execution environment and the request specifies a requested execution environment for the second component object. The processor is also configured for analyzing the predefined properties stored in the memory area to determine an execution environment privilege associated with the second component object. The processor is configured for granting the received request as a function of the determined execution environment privilege.

System And Method For Monitoring Interactions Between Application Programs And Data Stores

View page
US Patent:
7665098, Feb 16, 2010
Filed:
Apr 29, 2005
Appl. No.:
11/117869
Inventors:
Jude Jacob Kavalam - Seattle WA, US
Adam D. Stritzel - Redmond WA, US
Nigel S. Keam - Redmond WA, US
Timothy D. Noonan - Cary NC, US
Valeriy V. Tsuryk - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/44
H04L 29/06
G06F 17/30
US Classification:
719328, 713164, 707 3
Abstract:
Monitoring interactions between application programs and data stores for analyzing stability of application programs. A method of the invention intercepts interactions from a plurality of application programs to a data store. The method also identifies pre-execution data relating to each of the intercepted interactions and the intercepted interaction is executed. The method identifies post-execution data relating to each of the executed interactions. The identified pre-execution data and the identified post-execution data from each of the interactions are normalized to create normalized interaction data for each of the interactions. The method combines the normalized interaction data for each of the interactions as a function of the application programs associated with each of the interactions. The method further stores the combined interaction data for analysis of the interactions between the application programs and the data store which is indicative of the stability of the application programs.

Internal Object Protection From Application Programs

View page
US Patent:
20050091214, Apr 28, 2005
Filed:
Sep 10, 2004
Appl. No.:
10/938094
Inventors:
David Probert - Woodinville WA, US
Eric Li - Redmond WA, US
Dragos Sambotin - Issaquah WA, US
Genevieve Fernandes - Bellevue WA, US
John Rector - Redmond WA, US
Edward Praitis - Woodinville WA, US
Valeriy Tsuryk - Sammamish WA, US
Assignee:
Mircrosoft Corporation - Redmond WA
International Classification:
G06F007/00
US Classification:
707009000
Abstract:
Granting an executable object (e.g., an application program, thread, or process) access to a namespace object (e.g., a named object, resource, file, or folder). A request by the executable object for the namespace object is intercepted and processed to determine whether a local namespace associated with the executable object, user, or session stores a copy of the requested namespace object. If the copy exists in one of the local namespaces, the request is granted and allowed to operate on that local namespace. If the requested namespace object exists only in a global namespace, the namespace object is copied to a local namespace. The request is then granted and allowed to operate on the copy of the namespace object in the local namespace. Protecting the namespace objects stored in the global namespace from modification improves the stability of the application program and operating system.

Application Identity For Software Products

View page
US Patent:
20050091535, Apr 28, 2005
Filed:
Jun 15, 2004
Appl. No.:
10/868183
Inventors:
Jude Kavalam - Seattle WA, US
Timothy Noonan - Cary WA, US
Valeriy Tsuryk - Sammamish WA, US
Adam Stritzel - Redmond WA, US
David Probert - Woodinville WA, US
Eric Li - Redmond WA, US
John Rector - Redmond WA, US
Dragos Sambotin - Issaquah WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L009/00
US Classification:
713201000
Abstract:
Managing the installation, execution, and removal of application programs by an operating system via an application identity associated with each application program. A method of the invention assigns the application identity to each application program and a resource identity to each resource associated with each application program. The method relates the assigned application identity and resource identity to enable manipulation of the application program and its resources.

Operating System Resource Protection

View page
US Patent:
20050091658, Apr 28, 2005
Filed:
Jun 15, 2004
Appl. No.:
10/868182
Inventors:
Jude Kavalam - Seattle WA, US
Timothy Noonan - Cary NC, US
Valeriy Tsuryk - Sammamish WA, US
RoseMarie FitzSimons - Seattle WA, US
Jonathan Lew - Redmond WA, US
Freddie Aaron - Bothell WA, US
Edward Praitis - Woodinville WA, US
David Probert - Woodinville WA, US
Eric Li - Redmond WA, US
John Rector - Redmond WA, US
Dragos Sambotin - Issaquah WA, US
Genevieve Fernandes - Bellevue WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F007/00
US Classification:
718104000, 707001000
Abstract:
Granting an application program access to a resource as a function of a privilege associated with the application program. An embodiment of the invention employs a persistent, individual identity associated with the components of an application program or a group of application programs to allow an operating system to identify and differentiate between different application programs or groups of application programs installed on a computing system. The identity associated with each component of an application program enables the identification and removal or uninstallation of the application program. The identity also enables isolation of resources of the application program and protection of operating system resources.

Analysis Of The Impact Of Application Programs On Resources Stored In Data Stores

View page
US Patent:
20060282830, Dec 14, 2006
Filed:
Jun 13, 2005
Appl. No.:
11/151155
Inventors:
Jude Kavalam - Seattle WA, US
Adam Stritzel - Redmond WA, US
Nigel Keam - Redmond WA, US
Timothy Noonan - Cary NC, US
Valeriy Tsuryk - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/45
US Classification:
717141000
Abstract:
System and method for analyzing the impact of interactions of application programs with resources stored in a data store. A method of the invention receiving a selection of the application programs from a user. The interactions of the resources by the selected application programs are identified. The method also determines access types for each of the interactions of the resources by the selected application programs. The method further selects a set of the identified interactions and the determined access types that corresponds to a map, said map including a predefined set of interactions having access types associated therewith. The map with the selected set of the identified interactions and the determined access types is provided to the user. For example, the map identifies potential resource conflicts. Alternatively, the method generates a report including the map.

Method And Apparatus For Accelerating Data Through Communication Networks

View page
US Patent:
6449658, Sep 10, 2002
Filed:
Nov 18, 1999
Appl. No.:
09/442797
Inventors:
Olurinde E. Lafe - Chesterland OH
Atila Boros - University Heights OH
Valeriy Tsuryk - Richmond Heights OH
Assignee:
QuikCAT.com, Inc. - Mayfield Village OH
International Classification:
G06F 1516
US Classification:
709247, 709219, 709203
Abstract:
A method and apparatus for accelerating data transport through communication networks (e. g. , the Internet) is taught. The data sources may include Internet web pages, electronic mails, computer files, digitized pictures, voice and video. The method combines smart content-based data compression schemes with intelligent routing to efficiently move information across a network. The apparatus works with existing communications protocols (e. g. , TCP/IP, UDP, HTTP, SMTP and POP3) and fits transparently with Internet browsing applications.
Valeriy Y Tsuryk from Snoqualmie, WA, age ~50 Get Report