The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Nov. 05, 2019
Filed:
Dec. 20, 2011
Girish Mittur Venkataramanappa, Redmond, WA (US);
Mandyam Kishore, Redmond, WA (US);
Andreas Ulbrich, Kirkland, WA (US);
Aarthi Rajmohan Saravanakumar, Redmond, WA (US);
Chandra Prasad, Bellevue, WA (US);
Yann Christensen, Seattle, WA (US);
Dharma Shukla, Sammamish, WA (US);
Amol Kulkarni, Bothell, WA (US);
Girish Mittur Venkataramanappa, Redmond, WA (US);
Mandyam Kishore, Redmond, WA (US);
Andreas Ulbrich, Kirkland, WA (US);
Aarthi Rajmohan Saravanakumar, Redmond, WA (US);
Chandra Prasad, Bellevue, WA (US);
Yann Christensen, Seattle, WA (US);
Dharma Shukla, Sammamish, WA (US);
Amol Kulkarni, Bothell, WA (US);
MICROSOFT TECHNOLOGY LICENSING, LLC, Redmond, WA (US);
Abstract
Systems and methods according to various embodiments disclose a worker process manager adapted to spawn one or more worker processes on a server and to load an application on each of the worker processes. The worker process manager is adapted to isolate the one or more worker processes from each other and to control resource usage by the worker processes. A resource manager is adapted to detect applications that overuse system resources. The worker process manager is adapted to isolate worker processes and to control resource usage using one or more of the following techniques: least-privilege execution, messaging isolation, credentials isolation, data isolation, network isolation, fair share resource usage, and managed runtime security. Heuristic algorithms are used to detect applications that frequently overuse system resources that are unchargeable and that cause system unresponsiveness.