Search

Yifat Sagiv Phones & Addresses

  • Redmond, WA
  • Bellevue, WA
  • Kiona, WA

Publications

Us Patents

Caching Techniques For Streaming Media

View page
US Patent:
20030217113, Nov 20, 2003
Filed:
Apr 8, 2002
Appl. No.:
10/104679
Inventors:
Ariel Katz - Redmond WA, US
Yifat Sagiv - Bellevue WA, US
Guy Friedel - Bellevue WA, US
David Heckerman - Bellevue WA, US
John Douceur - Bellevue WA, US
Joshua Goodman - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F015/167
US Classification:
709/213000, 709/224000, 709/231000
Abstract:
A streaming media caching mechanism and cache manager efficiently establish and maintain the contents of a streaming media cache for use in serving streaming media requests from cache rather than from an original data source when appropriate. The cost of caching is incurred only when the benefits of caching are likely to be experienced. The caching mechanism and cache manager evaluate the request count for each requested URL to determine whether the URL represents a cache candidate, and further analyze the URL request rate to determine whether the content associated with the URL will be cached. In an embodiment, the streaming media cache is maintained with a predetermined amount of reserve capacity rather than being filled to capacity whenever possible.

Trusted Store Tamper Detection

View page
US Patent:
20070101131, May 3, 2007
Filed:
Nov 1, 2005
Appl. No.:
11/265265
Inventors:
Ivan Davtchev - Seattle WA, US
Karan Dhillon - Renton WA, US
Nir Zvi - Redmond WA, US
Aaron Goldsmid - Seattle WA, US
Ping Xie - Bellevue WA, US
Yifat Sagiv - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/00
US Classification:
713166000
Abstract:
A security flag stored in a trusted store is utilized to determine if the trusted store has been subjected to tampering. The security flag is indicative of a globally unique identifier (GUID), the version of the trusted store, and a counter. The security flag is created when the trusted store is created. Each time a critical event occurs, the security flag is updated to indicate the occurrence thereof. The security flag also is stored in a write-once portion of the system registry. At appropriate times, the security flag stored in the trusted store is compared with the corresponding security flag stored in the write-once registry. If the security flags match within a predetermined tolerance, it is determined that the trusted store has not been subjected to tampering. If the security flags do not match, or if a security flag is missing, it is determined that the trusted store has been subjected to tampering.
Yifat Sagiv from Redmond, WA, age ~51 Get Report