Microsoft Technology Licensing, LLC

United States of America

Back to Profile

1-100 of 36,482 for Microsoft Technology Licensing, LLC Sort by
Query
Patent
United States - USPTO
Aggregations Reset Report
Date
New (last 4 weeks) 206
2024 April (MTD) 134
2024 March 136
2024 February 128
2024 January 131
See more
IPC Class
G06F 17/30 - Information retrieval; Database structures therefor 3,722
H04L 29/06 - Communication control; Communication processing characterised by a protocol 3,158
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 2,602
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs 2,164
G06F 9/44 - Arrangements for executing specific programs 1,910
See more
Status
Pending 3,201
Registered / In Force 33,281
Found results for  patents
  1     2     3     ...     100        Next Page

1.

LOCAL PAGE WRITES VIA PRE-STAGING BUFFERS FOR RESILIENT BUFFER POOL EXTENSIONS

      
Application Number 18534126
Status Pending
Filing Date 2023-12-08
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Ramos, Rogério
  • Golaub, Kareem Aladdin
  • Gottipati, Chaitanya
  • Saenz, Alejandro Hernandez
  • Danday, Raj Kripal

Abstract

Methods for local page writes via pre-staging buffers for resilient buffer pool extensions are performed by computing systems. Compute nodes in database systems insert, update, and query data pages maintained in storage nodes. Data pages cached locally by compute node buffer pools are provided to buffer pool extensions on local disks as pre-copies via staging buffers that store data pages prior to local disk storage. Encryption of data pages occurs at the staging buffers, which allows a less restrictive update latching during the copy process, with page metadata being updated in buffer pool extensions page tables with in-progress states indicating it is not yet written to local disk. When stage buffers are filled, data pages are written to buffer pool extensions and metadata is updated in page tables to indicate available/valid states. Data pages in staging buffers can be read and updated prior to writing to the local disk.

IPC Classes  ?

  • G06F 13/16 - Handling requests for interconnection or transfer for access to memory bus

2.

RESPONSE-TIME-BASED ORDERING OF FINANCIAL MARKET TRADES

      
Application Number 18046806
Status Pending
Filing Date 2022-10-14
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Goyal, Prateesh
  • Marinos, Ilias
  • Chandra, Ranveer
  • Russinovich, Mark Eugene

Abstract

Examples are disclosed that relate to fairly ordering financial market trades received from different market participant computers via a cloud computing network. In one example, a plurality of trades generated by a plurality of market participant computers are received. The trades are generated based at least on a financial market data point received by the plurality of market participant computers. Each trade is tagged with a delivery clock time stamp that tracks time in relation to financial market events that occur at a corresponding market participant computer. The trades are ordered based on the delivery clock time stamps and sent to a central exchange server computer. The central exchange server computer processes the trades.

IPC Classes  ?

  • G06Q 40/04 - Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

3.

Reduced Video Stream Resource Usage

      
Application Number 17968694
Status Pending
Filing Date 2022-10-18
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Hao, Yichen
  • Li, Lihang
  • Romano, Anthony C.
  • Sangani, Naiteek
  • Menezes, Ryan S.

Abstract

The description relates to resource aware object detection for encoded video streams that can identify frames of the video stream that include an object of interest, such as a human, without decoding the frames.

IPC Classes  ?

  • H04N 19/177 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being a group of pictures [GOP]
  • H04N 19/169 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding

4.

AUTOMATED REMEDIATION OF EXPOSED SECRETS

      
Application Number 17967124
Status Pending
Filing Date 2022-10-17
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Fanning, Michael Christopher
  • Couraud, Nicolas Yves
  • Czerwonka, Jacek Andrzej
  • Faucon, Christopher Michael Henry
  • Yu, Yingting
  • Basseri, Etan Micah
  • K'Otohoyoh, Floyd Odiwuor
  • Lichwa, Jacek Ernest

Abstract

Techniques for identifying an exposed credential that, if used, would provide access to a resource are disclosed. The techniques enable the resource to remain online while (i) a new credential is allocated for the resource, (ii) the resource is transitioned to using the new credential instead of the exposed credential, and (iii) the exposed credential is attempted to be invalidated. A credential is accessed. This credential is suspected of being in an exposed state. The credential is accessible from within an artifact and is determined to be in the exposed state. A new credential is generated. This new credential is designed to replace the exposed credential. An instruction is transmitted to the resource to cause it to transition from using the exposed credential to using the new credential. The exposed credential is then invalidated.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures

5.

CODE RADAR

      
Application Number 18168229
Status Pending
Filing Date 2023-02-13
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Ziegler, Albert
  • Wattenberger, Amelia Mein-Rou

Abstract

Using a language model attention matrix to facilitate a “code radar” source code navigation experience that highlights related source code locations. A computer system identifies a first source code location within source code that is displayed at a code editor user interface (UI). From a set of mappings generated based on a language model attention matrix, the computer system identifies a second source code location as being related to the first source code location. Concurrent with presenting the first source code location in the code editor UI, the computer system presents a related source code navigation experience, which includes both (i) presenting the second source code location in the code editor UI, and (ii) presenting a visual indication that the second source code location is related to the first source code location. Some embodiments include generating the set of mappings based on a language model attention matrix.

IPC Classes  ?

6.

IDENTITY ANONYMIZATION WITH CONTROLLED MASKING AND FORMAT PRESERVING ENCRYPTION

      
Application Number 17966490
Status Pending
Filing Date 2022-10-14
First Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Proano, Guillermo Paul

Abstract

Systems are methods are used for facilitating identify anonymization by using controlled masking and encryption of user identifiers, such as UUIDs. A system that manages a UUID converts the UUID into a set of one or more different unique versions of the UUID for one or more corresponding different partner system(s) by removing and replacing masked portions of the UUID and by selectively encrypting the non-masked portions of the UUID. New masked portions added to the new version(s) of the UUID identify different corresponding partner(s) and/or rules to be applied by the different partner(s) when handling the different unique version(s) of the UUID(s). Partner systems that receive the new versions of the UUID identify and utilize the new masked portions to deterministically control decrypting and/or other processing of the new version of the UUID.

IPC Classes  ?

7.

MULTITENANT SHARING ANOMALY CYBERATTACK CAMPAIGN DETECTION

      
Application Number 18530853
Status Pending
Filing Date 2023-12-06
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Garyani, Yaakov
  • Israel, Moshe
  • Neuvirth, Hani Hana
  • Abramovitch, Ely
  • Keren, Amir
  • Burrell, Timothy William

Abstract

Embodiments detect cyberattack campaigns against multiple cloud tenants by analyzing activity data to find sharing anomalies. Data that appears benign in a single tenant's activities may indicate an attack when the same or similar data is also found for additional tenants. Attack detection may depend on activity time frames, on how similar certain activities of different tenants are to one another, on how unusual it is for different tenants to share an activity, and on other factors. Sharing anomaly analysis may utilize hypergeometric probabilities or other statistical measures. Detection avoidance attempts using digital entity randomization are revealed and thwarted. Authorized vendors may be recognized, mooting anomalousness. Although data from multiple tenants is analyzed together for sharing anomalies while monitoring for attacks, tenant confidentiality and privacy are respected through technical and legal mechanisms. Mitigation is performed in response to an attack indication.

IPC Classes  ?

8.

MULTI-MODAL THREE-DIMENSIONAL FACE MODELING AND TRACKING FOR GENERATING EXPRESSIVE AVATARS

      
Application Number 18062239
Status Pending
Filing Date 2022-12-06
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Sawhney, Harpreet Singh
  • Lundell, Benjamin Eliot
  • Shah, Anshul Bhavesh
  • Cristian, Calin
  • Hewitt, Charles Thomas
  • Baltrusaitis, Tadas
  • Radojevic, Mladen
  • Grujcic, Kosta
  • Stojiljkovic, Ivan
  • Mcilroy, Paul Malcolm
  • Olafenwa, John Ishola
  • Jadidian, Jouya
  • Jakubzak, Kenneth Mitchell

Abstract

Examples are disclosed that relate to generating expressive avatars using multi-modal three-dimensional face modeling and tracking. One example includes a computer system comprising a processor coupled to a storage system that stores instructions. Upon execution by the processor, the instructions cause the processor to receive initialization data describing an initial state of a facial model. The instructions further cause the processor to receive a plurality of multi-modal data signals. The instructions further cause the processor to perform a fitting process using the initialization data and the plurality of multi-modal data signals. The instructions further cause the processor to determine a set of parameters based on the fitting process, wherein the determined set of parameters describes an updated state of the facial model.

IPC Classes  ?

  • G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
  • G06T 17/00 - 3D modelling for computer graphics
  • G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions

9.

ROSTER MANAGEMENT ACROSS ORGANIZATIONS

      
Application Number 18396387
Status Pending
Filing Date 2023-12-26
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Mclean, Michael Thomas
  • Conceicao, Ladislau
  • Sanghavi, Priyank Deepak
  • Li, Li
  • Manglani, Jayant Kishorbhai

Abstract

Systems and methods for generating a shared collaborative channel for collaboration are provided. In particular, a computing device may receive a request, from an originating member of an organization, to create the shared collaborative channel, the request including an invitee to be added to the shared collaborative channel. In response to receipt of the request, the computing device may provision a substrate group by creating a container associate with the shared collaborative channel including a substrate database associated with the shared collaborative channel, generate an invitation including a custom link to the shared collaborative channel for the invitee, and determine whether the invitee belongs to an originating collaboration team associated with the originating member based on the substrate database. If the invitee belongs to the originating collaboration team, the computing device may further update the substrate group to add the invitee as a new member of the shared collaborative channel.

IPC Classes  ?

  • G06Q 10/101 - Collaborative creation, e.g. joint development of products or services
  • G06Q 10/10 - Office automation; Time management
  • H04L 9/40 - Network security protocols
  • H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference

10.

SYSTEM AND METHOD FOR SEMANTIC AWARE DATA SCIENCE

      
Application Number 18396972
Status Pending
Filing Date 2023-12-27
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Floratou, Avrilia
  • Mueller, Andreas Christian
  • Banda, Dalitso Hansini
  • Cahoon, Joyce Yu
  • Gruenheid, Anja
  • Godwal, Neha

Abstract

Systems, methods, and devices are described for enabling a user to import a library into a computer program under development. The library includes a data storage interface, one or more semantic objects, and one or more data manipulation or data analysis operations. A user is able to reference code of the library within the computer program under development to generate a dataset from data obtained via the data storage interface and associate the one or more semantic objects with the dataset to generate a semantically-annotated dataset. Systems, methods, and devices enable, based on the importing: the user to invoke a semantic-guided operation of the library that utilizes the semantically-annotated dataset to infer an aspect of a data manipulation or data analysis operation to be performed on the semantically-annotated dataset; or the suggestion of a data manipulation or data analysis operation to the user based on the semantically-annotated dataset.

IPC Classes  ?

11.

CLICK-TO-SCRIPT REFLECTION

      
Application Number 18004447
Status Pending
Filing Date 2021-06-25
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Li, Xiangnan
  • Friedman, Marc Todd
  • Le, Wangchao
  • Zabokritski, Evgueni

Abstract

A click-to-script service enables developers of big-data job scripts to quickly see the underlying script operations from optimized execution plans. Once a big-data job is received, the disclosed examples compile it and generate tokens that are associated with each operation of the big-data job. These tokens include may include the file name of the job, the line number of the operation, and/or an Abstract Syntax Tree (AST) node for the given operations. An original execution plan is optimized into an optimized execution plan, and the tokens for the original operations of the job script are assigned to the optimized operations of the optimized execution plan. The optimized execution plan is graphically displayed in an interactive manner such that users may view the optimized execution plan and click on its optimized operations to find the original operations of the job script.

IPC Classes  ?

12.

BLINKLESS AND MARKERLESS BI-PHASE DISPLAY CALIBRATION

      
Application Number 17964775
Status Pending
Filing Date 2022-10-12
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Kim, Taemin

Abstract

Techniques for separating an image into a forward sweeping image and a backward sweeping image are disclosed. A lookup table maps MEMS projection positions on a display with corresponding pixel positions in an image generated by a camera facing the display. The lookup table is used to associate a first set of pixel positions in the image with a forward scanning sweep of the MEMS system. The lookup table is also used to associate a second set of pixel positions in the image with a backward scanning sweep of the MEMS system. The first and second sets of pixel positions are used to generate the forward sweeping image and the backward sweeping image, respectively. These images can then be used to calibrate the MEMS system to compensate for bi-phase.

IPC Classes  ?

  • H04N 9/31 - Projection devices for colour picture display
  • G02B 26/08 - Optical devices or arrangements for the control of light using movable or deformable optical elements for controlling the direction of light
  • G02B 26/10 - Scanning systems
  • G02B 27/01 - Head-up displays

13.

OVERLAY SCHEME FOR CONTAINER ADDRESSING IN VIRTUAL NETWORKS

      
Application Number 18047345
Status Pending
Filing Date 2022-10-18
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Aggarwal, Neha
  • Aggarwal, Chandan
  • Tewari, Rishabh
  • Kumar, Abhijeet
  • Goel, Sudhir
  • Nuwal, Trilok
  • Long, Matthew Francis
  • Baker, Evan Alexander
  • Ramachandran, Aanand
  • Upadhyay, Alok

Abstract

A virtual network provider system supports a virtual network including virtual machines that are each assigned to an underlay address of an underlay addressing scheme. The virtual network provider system further includes multiple routing domains each defined to include a different subset of the virtual machines. Each of the routing domains is assigned to a range of overlay addresses of an overlay addressing scheme. For each routing domain, the assigned range of overlay addresses is allocated among the subset of the virtual machines in the routing domain. The system further includes a virtual network host configured to use addresses of the overlay addressing scheme to selectively route messages between endpoints on select pairs of the virtual machines assigned to a same routing domain of the plurality of routing domains.

IPC Classes  ?

  • H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
  • H04L 45/74 - Address processing for routing
  • H04L 45/76 - Routing in software-defined topologies, e.g. routing between virtual machines

14.

QUALITY ESTIMATION MODEL FOR PACKET LOSS CONCEALMENT

      
Application Number 18079342
Status Pending
Filing Date 2022-12-12
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Diener, Carl Lorenz

Abstract

This document relates to training and employing a quality estimation model. One example includes a method or technique that can be performed on a computing device. The method or technique can include providing degraded audio signals to one or more packet loss concealment models, and obtaining enhanced audio signals output by the one or more packet loss concealment models. The method or technique can also include obtaining quality labels for the enhanced audio signals and training a quality estimation model to estimate audio signal quality based at least on the enhanced audio signals and the quality labels.

IPC Classes  ?

  • G10L 25/60 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for measuring the quality of voice signals
  • G10L 19/005 - Correction of errors induced by the transmission channel, if related to the coding algorithm
  • G10L 25/30 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the analysis technique using neural networks
  • G10L 25/69 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for evaluating synthetic or decoded voice signals

15.

IDENTIFYING AND CONSENTING TO PERMISSIONS FOR WORKFLOW AND CODE EXECUTION

      
Application Number 18395825
Status Pending
Filing Date 2023-12-26
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Vaishnav, Sunay
  • Hade, Merwan Vishnu
  • Siciliano, Stephen Christopher
  • Nissimoff, David
  • Anubhav, Fnu

Abstract

The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/60 - Protecting data

16.

TRACKING IN-GAME EVENTS AND GENERATING EVENT REPORTS ACROSS MULTIPLE GAMING APPLICATIONS

      
Application Number 18391250
Status Pending
Filing Date 2023-12-20
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Kennett, Daniel Gilbert
  • Rabold, Mark Edward

Abstract

The present disclosure relates to systems, methods, and computer-readable media for identifying a variety of events that occur within a gaming session and generating event reports based on the identified events. For example, a gaming service (e.g., a cloud gaming server) can leverage content analysis and event recognizer services on a cloud computing system to detect one or more in-game events based on gaming content (e.g., video content, audio content, controller inputs) that is delivered to a client system. Systems described herein can train and implement event recognizers trained to track various in-game events across multiple gaming applications. Based on the tracked events, the systems described herein can generate event reports for events, individual users, and groups of users of the cloud computing system.

IPC Classes  ?

  • A63F 13/77 - Game security or game management aspects involving data related to game devices or game servers, e.g. configuration data, software version or amount of memory
  • A63F 13/75 - Enforcing rules, e.g. detecting foul play or generating lists of cheating players

17.

DEVICE PUSH-TO-OPEN DETECTION AND POWER CONTROL

      
Application Number 18046411
Status Pending
Filing Date 2022-10-13
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Jensen, Michael Dale
  • Lin, James Hao-An Chen
  • Ylitalo, Mika Martti

Abstract

A foldable computing device comprises a first frame rotatably coupled to a second frame. The second frame comprises a push-to-open mechanism comprising an actuator and a power switch located for actuation by the actuator. A detection mechanism detects a displaced position of the actuator that corresponds to releasing the foldable computing device from a closed configuration. Actuation of the power switch is detected and used with detection of the displaced position of the actuator to control an operating state of the computing device.

IPC Classes  ?

  • G06F 1/16 - Constructional details or arrangements

18.

DEEP FUSION OF KERNEL EXECUTION

      
Application Number 17966587
Status Pending
Filing Date 2022-10-14
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Zhu, Haishan
  • Shah, Preyas Janak
  • Mitra, Tiyasa
  • Chung, Eric S.

Abstract

Embodiments of the present disclosure include techniques for machine language processing. In one embodiment, the present disclosure includes configuring functional modules on a machine learning processor to execute a plurality of machine learning (ML) operations during a plurality of time segments. During the time segments, a first portion of the ML operations execute serially and at least one other ML operation executes during at least a majority of the time of each of the time segments. Serial ML operations may be processed simultaneously with the at least one other ML operation.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06N 20/00 - Machine learning

19.

CAMERA SYSTEMS FOR OPERATING IN MULTIPLE OPTICAL CHANNELS

      
Application Number 18047453
Status Pending
Filing Date 2022-10-18
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Bamji, Cyrus Soli
  • Akkaya, Onur Can
  • Ortiz Egea, Sergio

Abstract

Indirect time-of-flight camera systems for operating in multiple optical channels using active modulated light and accompanying methods of operation are provided. In one aspect, the indirect time-of-flight camera system includes first and second modulatable laser sources outputting light of different wavelengths for illuminating a target environment. The camera system further includes a wavelength-selective reflective element designed to reflect the light of a first wavelength and to transmit the light of a second wavelength. The camera system further includes a controller comprising instructions executable to control the camera system to, in a first time period, activate the first modulatable laser source and deactivate the second modulatable laser source, and in a second time period, deactivate the first modulatable laser source and activate the second modulatable laser source. The camera system further includes a photosensor for receiving the light outputted by the first and second modulatable laser sources.

IPC Classes  ?

  • G01S 17/894 - 3D imaging with simultaneous measurement of time-of-flight at a 2D array of receiver pixels, e.g. time-of-flight cameras or flash lidar
  • G02F 1/31 - Digital deflection devices

20.

SYSTEMS AND METHODS FOR DETERMINING SCORES FOR MESSAGES BASED ON ACTIONS OF MESSAGE RECIPIENTS AND A NETWORK GRAPH

      
Application Number 18392642
Status Pending
Filing Date 2023-12-21
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Cibelli, Maurizio

Abstract

Methods and systems cause display of email messages of a user on a screen of a computing system based on scores associated with the email messages. An email ranking system may have assigned the scores to the email messages. The scores are based on actions that other recipients of the email messages have taken with respect to the email messages. In calculating the scores, the actions of the other recipients may receive different weights based on how closely connected a recipient is to the user and a type of connection the recipient has to the user. A network graph may indicate how closely connected the recipient is to the user and the type of connection the recipient has to the user.

IPC Classes  ?

  • H04L 51/226 - Delivery according to priorities
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
  • H04L 51/224 - Monitoring or handling of messages providing notification on incoming messages, e.g. pushed notifications of received messages
  • H04L 51/42 - Mailbox-related aspects, e.g. synchronisation of mailboxes

21.

TOUCH-SENSITIVE INPUT DEVICE

      
Application Number 18554038
Status Pending
Filing Date 2022-03-25
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Dekel, Shoham
  • Bar-Ness, Assaf

Abstract

Examples are disclosed that relate to applying haptic output to a touch-sensitive input device. One example provides a touch-sensitive input device comprising a body, a haptic feedback mechanism within the body, a sensor subsystem, a logic processor, and a memory. The memory stores instructions executable by the processor to receive from the sensor subsystem sensor data indicating locations along the body of a plurality of contact points between a user hand and the body, based at least in part on the sensor data, determine a touch profile of the user hand applied to the body, based at least in part on the touch profile of the user hand, determine a selected haptic output to be applied to the body, and cause a drive signal to be transmitted to the haptic feedback mechanism to apply the selected haptic output to the body.

IPC Classes  ?

  • G06F 3/038 - Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 3/0354 - Pointing devices displaced or positioned by the user; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks

22.

TRANSFORMER-BASED TEXT ENCODER FOR PASSAGE RETRIEVAL

      
Application Number 17938173
Status Pending
Filing Date 2022-10-05
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Cheng, Hao
  • Fang, Hao
  • Liu, Xiaodong
  • Gao, Jianfeng

Abstract

A computing system includes a logic subsystem and a storage subsystem holding instructions executable by the logic subsystem to implement a transformer-based text encoder. The transformer-based text encoder includes a plurality of transformer blocks previously-trained to apply encoding operations to computer-readable text representations of input text strings, the computer-readable text representations including computer-readable question representations of input text questions, and computer-readable passage representations of input text passages. The plurality of transformer blocks include a shared transformer block trained for both the computer-readable question representations and the computer-readable passage representations and a specialized transformer block including two or more input-specific subnetworks, and a routing function to select an input-specific subnetwork of the two or more input-specific subnetworks for each of the computer-readable text representations.

IPC Classes  ?

23.

User-Controlled Firmware for Hosted Virtual Machines

      
Application Number 17968621
Status Pending
Filing Date 2022-10-18
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Shivaganga Nagaraju, Gangadhara Swamy
  • Chitnis, Pushkar Vijay
  • Zhang, Bo
  • Nad Rudra Gowda, Amar

Abstract

A computer implemented method includes receiving first firmware information at a hosting environment identifying that a user has selected user-controlled firmware for user virtual machines to be hosted on the hosting environment. A copy of the user-controlled firmware is obtained and a user virtual machine is deployed that includes the user-controlled firmware. The user-controlled firmware is locked against changes by the hosting environment absent receiving permission from the user.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 8/65 - Updates

24.

RESOURCE PROVISIONING

      
Application Number 18161679
Status Pending
Filing Date 2023-01-30
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Sen, Rathijit
  • Interlandi, Matteo
  • Cao, Jiashen

Abstract

A system provisioning resources of a processing unit. The system predicts a performance impact on a workload attributable to a performance constraint of the processing unit for the workload according to a resource model, wherein the workload includes a query and the resource model characterizes attainable compute bandwidth, attainable memory bandwidth, and arithmetic intensity based on peak compute bandwidth and peak memory bandwidth of the processing unit. The system determines a resource allocation of the processing unit, based on the predicted performance impact and instructs the processing unit to allocate the resources for processing the workload based on the determined resource allocation.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

25.

VISUALIZATION OF APPLICATION CAPABILITIES

      
Application Number 18076240
Status Pending
Filing Date 2022-12-06
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Dhatchina Moorthy, Madhan Kumar
  • Spaidal, Christopher Bradley
  • Lesnoy, Dmitry

Abstract

A systematic mechanism for visualizing functions or capabilities that an application has. One or more user experience objects are generated corresponding to an application. An application definition is obtained for that application, and then multiple user experience templates are identified based on that application definition. Information from the application definition is then used to populate at least one of the user experience templates to generate at least one object experience object. The user may then review visualizations of the user experience objects to determine the general capabilities of the application, and thereby determine whether to install or open the application, and how best to use the application.

IPC Classes  ?

26.

ENRICHING EXPOSED CREDENTIAL SEARCH RESULTS TO MAKE THEM ACTIONABLE

      
Application Number 17967113
Status Pending
Filing Date 2022-10-17
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Fanning, Michael Christopher
  • Mukherjee, Suvam
  • Czerwonka, Jacek Andrzej
  • Faucon, Christopher Michael Henry
  • Okada Nakamura, Eddy Toshiyuki
  • Gonzalez, Danielle Nicole
  • Couraud, Nicolas Yves
  • Maclellan, Alison Lynne

Abstract

Techniques for (i) using contextual information associated with an exposed credential to identify a resource that could be accessed using the exposed credential, (ii) identifying a responsible entity of that resource, and (iii) alerting the responsible entity about the exposed credential are disclosed. A credential is determined to be in an exposed state. The exposed credential, if used, could potentially provide an actor access to a resource, despite the fact that the actor should not have access to the resource. The exposed credential is analyzed to determine a context. Based on that context, the resource is identified. A responsible entity associated with the resource is identified. An alert is then sent to that entity.

IPC Classes  ?

27.

MITIGATING VAPOR LOSS IN A TWO-PHASE IMMERSION COOLING SYSTEM

      
Application Number 18396153
Status Pending
Filing Date 2023-12-26
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Keehn, Nicholas Andrew
  • Manousakis, Ioannis
  • Saunders, Winston Allen
  • Alissa, Husam Atallah
  • Peterson, Eric Clarence

Abstract

Techniques for mitigating loss of vaporized working fluid in a two-phase immersion cooling system may be implemented using one or more supplemental condensers that facilitate condensation of vaporized working fluid when the immersion tank is open, and one or more vapor collection points that are in fluid communication with at least one supplemental condenser. One or more fluid displacement devices may be configured to create suction pressure at the one or more vapor collection points. One or more vents may be positioned in the door. The one or more vents may be configured to permit movement of air from outside the immersion tank into an interior portion of the immersion tank without permitting loss of vaporized working fluid. A directional blowing device may be configured to blow a gaseous substance against a computing device in a downward direction as the computing device is being pulled upward out of the immersion tank.

IPC Classes  ?

  • H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating

28.

NON-PARAMETRIC METHODS OF RESOURCE ALLOCATION

      
Application Number 17932967
Status Pending
Filing Date 2022-09-16
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Hamze, Firas

Abstract

A general methodology is presented for optimizing a value at risk (VaR) associated with an allocation of objects (i.e., a strategy) having variable performance and loss characteristics. For purposes of illustration, investment strategies prescribing a portfolio of items from a set of candidates with unknown and generally correlated joint losses are discussed. The framework is based on approximating the VaR using nonparametric estimates of the portfolio loss density and, using mathematical insights, an efficient approach to computing the VaR gradient with respect to the strategy. The approach also allows inclusion of constraints on the strategy (e.g. a maximum fraction per item) and allows the VaR optimization problem to be solved using optimization techniques such as sequential quadratic programming.

IPC Classes  ?

  • G06Q 50/06 - Electricity, gas or water supply
  • G06F 17/18 - Complex mathematical operations for evaluating statistical data
  • G06Q 10/06 - Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling

29.

SYSTEMS AND METHODS FOR IMPROVING FUNCTIONALITY AND REMOTE MANAGEMENT OF COMPUTING RESOURCES DEPLOYED IN A CONTROLLED HIERARCHICAL NETWORK

      
Application Number 17966547
Status Pending
Filing Date 2022-10-14
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Addaguduru, Chandra Mouli
  • Garimella, Phalgun
  • Dhruva, Krupesh Satishkumar
  • Karumanchi, Narasimha Rao

Abstract

The present disclosure relates to utilizing a hierarchical network communication system to efficiently manage and monitor a controlled hierarchical network. In particular, the hierarchical network communication system utilizes gateway services embedded among various architecture levels of a controlled hierarchical network to facilitate secure communications between levels of the hierarchical network as well as with an authorized external computing device or computing system. In various instances, the gateway service includes various components and elements that facilitate inter-network level communication as well as remote management, including monitoring, configuring, and upgrading components and resources at each level of the controlled hierarchical network. Indeed, the hierarchical network communication system facilitates the remote management of a controlled hierarchical network while upholding the strict security and communication protocols required for networks adhering to the Purdue Reference Architecture Model, ISA-95 standards, and ISA-99 standards.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/044 - Network management architectures or arrangements comprising hierarchical management structures

30.

Workload-Aware Hardware Architecture Recommendations

      
Application Number 17965681
Status Pending
Filing Date 2022-10-13
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Phanishayee, Amar
  • Mahajan, Divya
  • Kulkarni, Janardhan
  • Castro, Miguel
  • Adnan, Muhammad

Abstract

The description relates to accelerator architectures for deep learning models. One example can obtain a deep learning training script associated with a deep learning model and extract an operator graph from the training script. The example can split the operator graph into first and second portions of a heterogeneous pipeline and tune a first accelerator core for the first portion of the heterogeneous pipeline and a second accelerator core for the second portion of the heterogeneous pipeline. The example can also generate a hardware architecture that includes the first accelerator core and the second accelerator core arranged to collectively accomplish the deep learning model.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06N 3/08 - Learning methods

31.

TRANSPARENTLY PROVIDING VIRTUALIZATION FEATURES TO UNENLIGHTENED GUEST OPERATING SYSTEMS

      
Application Number 18145247
Status Pending
Filing Date 2022-12-22
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Lin, Jin
  • Hepkin, David Alan
  • Ebersol, Michael Bishop
  • Kurjanowicz, Matthew David
  • Bhandari, Aditya
  • Mainetti, Attilio
  • Parish, Amy Anthony

Abstract

Transparently providing a virtualization feature to an unenlightened guest operating system (OS). A guest partition, corresponding to a virtual machine, is divided into a first guest privilege context and a second guest privilege context. A compatibility component executes within the first guest privilege context, while a guest OS executes within the second guest privilege context. The compatibility component is configured to intercept input/output (I/O) operations associated with the guest operating OS. Based on the compatibility component intercepting an I/O operation associated with the guest OS, the compatibility component processes the I/O operation using a virtualization feature that is unsupported by the guest OS. Examples of the virtualization feature include accelerated access to a hardware device and virtual machine guest confidentiality.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

32.

ACTIVITY BASED SORTING IN COLLABORATIVE APPLICATIONS

      
Application Number 18538653
Status Pending
Filing Date 2023-12-13
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Stephens, David Adam
  • Chism, Shane Michael
  • Kile, Jr., Nathan Darrel
  • Allison, Angela Kaye
  • Zarzar, Dan
  • Milvaney, Douglas Lane
  • Sharma, Manoj

Abstract

Aspects of the present disclosure relate to systems and methods for sorting one or more files hosted by a collaborative application. In one aspect, one or more activity signals associated with one or more files hosted by the collaborative application may be received from a substrate. An activity-based sort order may be determined using at least a combination of the one or more activity signals. The activity-based sort order may be applied to sort the one or more files hosted by the collaborative application for display in a user interface to an activity object of the collaborative application.

IPC Classes  ?

  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/04847 - Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
  • G06F 16/176 - Support for shared access to files; File sharing support

33.

SELECTIVELY AND INTELLIGENTLY DISPLAYING AUTHENTICATION NOTIFICATIONS TO PROTECT USERS

      
Application Number 18146766
Status Pending
Filing Date 2022-12-27
First Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Bandyopadhyay, Poulomi
  • Luthra, Rajat
  • Walker, Lee Francis
  • Edwards, Zachary Michael
  • Trent, Colin

Abstract

Authentication request notifications are selectively suppressed, reducing notification fatigue and susceptibility to social engineering attacks. Authentication request notifications may be suppressed by not presenting a push notification on the user's phone. The authentication request may still be accessed and approved by manually opening the authenticator app. Notifications may be suppressed based on an estimation that the person attempting to login is not who they say they are. This estimation may be based on applying heuristics and/or machine learning models to the context of the login attempt, such as the IP address that originated the login request, time of day, recent user actions, patterns of previous logins, etc. One heuristic determines that the user has repeatedly ignored notifications caused by a particular IP address. Machine learning models generate a risk score from the login context, and notifications may be suppressed if the risk score exceeds a threshold.

IPC Classes  ?

34.

PROGRAM ACCELERATORS WITH MULTIDIMENSIONAL NESTED COMMAND STRUCTURES

      
Application Number 17966637
Status Pending
Filing Date 2022-10-14
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Zhu, Haishan
  • Chung, Eric S.

Abstract

Embodiments of the present disclosure include techniques for machine language processing. In one embodiment, the present disclosure include commands with data structures comprising fields describing multi-dimensional data and fields describing synchronization. Large volumes of data may be processed and automatically synchronized by execution of a single command.

IPC Classes  ?

35.

SYSTEMS AND METHODS FOR DATACENTER THERMAL MANAGEMENT

      
Application Number 18277513
Status Pending
Filing Date 2022-02-16
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Manousakis, Ioannis
  • De Assis, Rodrigo Lemos
  • Gauthier, David Thomas
  • Warrier, Ii, Brijesh

Abstract

A method of responding to a thermal management capacity reduction in a datacenter includes obtaining (236) process allocations assigned to a plurality of electronic devices in the datacenter and determining (238) a process priority list based on the process allocations assigned to the plurality of electronic devices. The method further includes monitoring (240) at least one cooling sensor configured to measure a thermal management capacity of a cooling system of the plurality of electronic devices and, in response to detecting a reduction in thermal management capacity, reducing (242) power delivery to at least one electronic device of the plurality of electronic devices based at least partially on the process priority list.

IPC Classes  ?

36.

IMPLEMENTING A TARGET BLOCK COMMAND ON AN UNSTRUCTURED DATA STORAGE NODE

      
Application Number 17965525
Status Pending
Filing Date 2022-10-13
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Desai, Shantanu
  • Dammalapati, Kantha Rao

Abstract

The present disclosure relates to systems, methods, and computer-readable media for extending functionality of unstructured data storage function (UDSF) nodes in supporting features and functionality of services and applications that are accessible via a core network. The systems described herein include a UDSF node having a UDSF data management system that enables network functions to interact with and modify data resources separately maintained by the UDSF node(s). A network function may selectively target discrete sets of blocks of data on records to access without accessing entire records and without issuing redundance application programming interface (API) calls to the USDF node(s). the UDSF node may be implemented in a core network to enhance network functions in fifth generation (5G) and beyond communication environments.

IPC Classes  ?

  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
  • G06F 3/06 - Digital input from, or digital output to, record carriers

37.

DEVICES, SYSTEMS, AND METHODS FOR A COOLING SYSTEM

      
Application Number 17968619
Status Pending
Filing Date 2022-10-18
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Dong, Fang
  • Jin, Meng
  • Mehta, Jigar
  • Babang, Mayila
  • Treves, Michele Alberto Scipione
  • Peterson, Martha Geoghegan
  • Xu, Linjie
  • Gupta, Naval
  • Cho, Hyunjung

Abstract

A cooling system may include a tank filled with a first cooling fluid. The cooling system may include a container including a chamber, the chamber receiving a heat-generating component, the container being sealed, the container being at least partially submerged in the first cooling fluid in the tank, the container including a second cooling fluid.

IPC Classes  ?

  • H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating
  • G06F 1/20 - Cooling means

38.

Embedding-based retrieval techniques for feeds

      
Application Number 17974220
Grant Number 11960550
Status In Force
Filing Date 2022-10-26
First Publication Date 2024-04-16
Grant Date 2024-04-16
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Faust, Francisco José Claude
  • Mohamed, Ali
  • Raveendran, Nisheedh
  • Sikka, Namit
  • Dangi, Siddharth
  • Tiwana, Birjodh Singh
  • Peck, Adam Robert

Abstract

Described herein is a technique to facilitate filtering during candidate retrieval stage performed by an information retrieval system that utilizes embedding models. An aNN indexing structure is created for each end-user, and in some instances, each activity type. This allows a single request for candidate content items to invoke a single process to obtain content items that satisfy the filtering criteria (e.g., in this case, the in-network requirement) from the separate per-end-user indexes.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/951 - Indexing; Web crawling techniques

39.

End-to-end service creation, management, and orchestration in mobile networks

      
Application Number 18071837
Grant Number 11962460
Status In Force
Filing Date 2022-11-30
First Publication Date 2024-04-16
Grant Date 2024-04-16
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Draznin, Sagiv
  • Goyal, Pankaj
  • Ananthakrishnan, Karthik

Abstract

An end-to-end service delivery system provides customers representing mobile network and enterprise operators with an online repository for services that are created from virtual network functions, and which are available from multiple service creators and operable across infrastructure underlying the customer's software-defined networking-based mobile network including diverse private, public, and hybrid cloud platforms. The network functions delivery system provides a user interface (UI) exposing a catalog of differentiated services of varying types. When the customer selects a service from the catalog, the service delivery system uses an installation engine to deploy the selected service on the customer's mobile network. The system provides a lifecycle management and orchestration engine that orchestrates the deployed service on an end-to-end basis across domains and network platforms. The service delivery system troubleshoots the service installation if deployment problems arise and notifies the customer of issues through the UI to provide recommendations and solutions.

IPC Classes  ?

  • H04L 41/0806 - Configuration setting for initial configuration or provisioning, e.g. plug-and-play
  • H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
  • H04L 41/14 - Network analysis or design
  • H04L 41/40 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
  • H04L 43/55 - Testing of service level quality, e.g. simulating service usage

40.

Neural network categorization accuracy with categorical graph neural networks

      
Application Number 17981822
Grant Number 11960573
Status In Force
Filing Date 2022-11-07
First Publication Date 2024-04-16
Grant Date 2024-04-16
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Du, Tianchuan
  • Chang, Keng-Hao
  • Zhang, Ruofei
  • Liu, Paul

Abstract

Neural network-based categorization can be improved by incorporating graph neural networks that operate on a graph representing the taxonomy of the categories into which a given input is to be categorized by the neural network based-categorization. The output of a graph neural network, operating on a graph representing the taxonomy of categories, can be combined with the output of a neural network operating upon the input to be categorized, such as through an interaction of multidimensional output data, such as a dot product of output vectors. In such a manner, information conveying the explicit relationships between categories, as defined by the taxonomy, can be incorporated into the categorization. To recapture information, incorporate new information, or reemphasize information a second neural network can also operate upon the input to be categorized, with the output of such a second neural network being merged with the output of the interaction.

IPC Classes  ?

  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06F 17/16 - Matrix or vector computation
  • G06F 18/20 - Analysing
  • G06F 18/241 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
  • G06F 18/25 - Fusion techniques
  • G06F 40/30 - Semantic analysis
  • G06N 3/045 - Combinations of networks
  • G06N 3/084 - Backpropagation, e.g. using gradient descent
  • G06N 5/046 - Forward inferencing; Production systems
  • G06N 20/10 - Machine learning using kernel methods, e.g. support vector machines [SVM]
  • G06N 20/20 - Ensemble learning

41.

Leveraging inferred context to improve suggested messages

      
Application Number 18178254
Grant Number 11962546
Status In Force
Filing Date 2023-03-03
First Publication Date 2024-04-16
Grant Date 2024-04-16
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Hattangady, Poonam Ganesh
  • Grimshaw, Susan Marie
  • Borysenko, Michael Ivan

Abstract

Systems and methods for using a generative artificial intelligence (AI) model to generate a suggested draft reply to a selected message. A message generation system and method are described that use inferred context to improve the suggested draft reply message for the user. Various message data and additional context are obtained and included in a prompt provided to the AI model to improve suggested content. In some examples, the message data and additional context include a message thread history and previously sent messages, profile information of the sender and recipient(s) of the selected message, known relationship information between the sender and the user, etc. For instance, the user's preferred communication style and talking points can be inferred based on the profile data, relationship data, and the user's past communications with similar participants and used to tailor the suggested draft reply to the user.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G06F 40/166 - Editing, e.g. inserting or deleting
  • G06F 40/284 - Lexical analysis, e.g. tokenisation or collocates
  • G06F 40/40 - Processing or translation of natural language
  • H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
  • G06F 40/205 - Parsing

42.

Detecting abusive collaborative activity using a graph neural network

      
Application Number 18072754
Grant Number 11962661
Status In Force
Filing Date 2022-12-01
First Publication Date 2024-04-16
Grant Date 2024-04-16
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Oak, Rajvardhan Virendra
  • Khanna, Karan
  • Dave, Vacha Rajendra

Abstract

A technique uses a graph neural network (GNN) to determine whether a particular entity under consideration is engaging in abusive network-related activity over a computing network in collaboration with other entities. In some applications, the particular entity is part of a bot attack aimed at fraudulently engaging with advertisements. The technique trains the GNN by performing machine learning on a training set that includes a plurality of nodes, edges, and node labels. In forming the training set, the technique associates a feature set with each node in the training set that describes the network activity exhibited by that node's entity. The technique then connects each pair of nodes in the training set with an edge if the feature sets of the pair satisfy a prescribed test for similarity. The technique assigns labels to at least some nodes to convey whether the nodes are associated abusive network-related activity.

IPC Classes  ?

  • H04L 67/50 - Network services
  • G06F 18/2413 - Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches based on distances to training or reference patterns
  • G06N 3/08 - Learning methods

43.

Generating service-to-service dependency map from DNS and fleet management system logs

      
Application Number 18066527
Grant Number 11962565
Status In Force
Filing Date 2022-12-15
First Publication Date 2024-04-16
Grant Date 2024-04-16
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Pathak, Abhishek
  • Gandhi, Sorabh Kumar
  • Wittenberg, Craig Henry
  • Hao, Ming
  • Galwankar, Rohit Sanjay
  • Tejwani, Vivek Sanjeev

Abstract

A computing system is provided, including a processor and memory storing instructions that cause the processor to execute a domain name service (DNS) log analyzer configured to identify a container identifier associated with a DNS request and a destination IP address associated with a DNS response to the DNS request, using one or more DNS logs, a fleet management system record analyzer configured to identify a first service associated with the container identifier and a second service associated with the destination IP address, using one or more fleet management system logs, and a dependency map generator configured to generate a service-to-service dependency map between the identified first service and the identified second service.

IPC Classes  ?

  • H04L 12/46 - Interconnection of networks
  • H04L 61/3015 - Name registration, generation or assignment
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]
  • H04L 61/5007 - Internet protocol [IP] addresses

44.

FRAMEWORK FOR INTERACTION AND CREATION OF AN OBJECT FOR A 3D EXPERIENCE IN AN ACCESSIBILITY ENVIRONMENT

      
Application Number 18193373
Status Pending
Filing Date 2023-03-30
First Publication Date 2024-04-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Humphrey, Brett D.
  • De Souza, Lucas Martins
  • Zhang, Yaying
  • Macdonnell, Daryan Josche
  • Dorsey, Emily Jane
  • Tice, Evan

Abstract

The techniques disclosed herein enable systems to translate three-dimensional experiences into user accessible experiences to improve accessibility for users with disabilities. Namely, the discussed system enables users with disabilities to create and personalize objects for use in the three-dimensional experience. This is accomplished by translating and grouping components from a three-dimensional space to form an intuitive and logical hierarchy. The grouped components are then organized into an accessible user interface which a user with disabilities can navigate using simplified inputs and assistive technologies. In this way, users with disabilities can be empowered to personalize their user experience and understand a three-dimensional space in a layered, well-defined format.

IPC Classes  ?

  • G06T 19/20 - Editing of 3D images, e.g. changing shapes or colours, aligning objects or positioning parts
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • H04S 7/00 - Indicating arrangements; Control arrangements, e.g. balance control

45.

INTEROPERABILITY FOR TRANSLATING AND TRAVERSING 3D EXPERIENCES IN AN ACCESSIBILITY ENVIRONMENT

      
Application Number 18193430
Status Pending
Filing Date 2023-03-30
First Publication Date 2024-04-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Humphrey, Brett D.
  • Ng, Kian Chai
  • Gable, Thomas Matthew
  • Charnoff, Amichai
  • Grayson, Martin
  • Marques, Rita Faia
  • Morrison, Cecily Peregrine Borgatti
  • Balasubramanian, Harshadha

Abstract

The techniques disclosed herein enable systems to translate three-dimensional experiences into user accessible experiences to improve accessibility for users with disabilities. This is accomplished by extracting components from a three-dimensional environment such as user avatars and furniture. The components are organized into component groups based on shared attributes. The component groups are subsequently organized into a flow hierarchy. The flow hierarchy is then presented to the user in an accessibility environment that enables interoperability with various accessibility tools such as screen readers, simplified keyboard inputs, and the like. Selecting a component group, and subsequently, a component through the accessibility environment accordingly invokes functionality within the three-dimensional environment. In this way, users with disabilities are empowered to fully interact with three-dimensional experiences.

IPC Classes  ?

  • G06F 3/04815 - Interaction with a metaphor-based environment or interaction object displayed as three-dimensional, e.g. changing the user viewpoint with respect to the environment or object
  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

46.

PROVIDING RECENT EVENT INFORMATION FOR WEB SEARCH QUERIES

      
Application Number 18263265
Status Pending
Filing Date 2022-01-13
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Agarwal, Manoj Kumar
  • Ronnie, Gandhi Rajeshkumar

Abstract

An electronic device may identify one or more search queries occurring frequently in a query log during a temporal period and maintain, for each of the one or more search queries, a frequency count of the search query occurring in the query log. The device may identify, a plurality of uniform resource locators (URLs) and match, one or more URLs of the plurality of URLs based on text of the URLs. The device may generate a news event profile for each search query and add each of the matching URLs into a respective news event profile. The device may receive a query from a user and identify, a matching news event profile. The device causes URLs of the matching news event profile and one or more related search queries from the first group of search queries to be presented to the user.

IPC Classes  ?

  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]

47.

TRACKING THREE-DIMENSIONAL GEOMETRIC SHAPES

      
Application Number 18311476
Status Pending
Filing Date 2023-05-03
First Publication Date 2024-04-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Allen, Lingzhi L.
  • Pauli, Wolfgang M.

Abstract

A set of geometric shapes to be applied by a machine learning model to objects identified in image data is defined. A learning rate of the machine learning model is updated in response to external events. The machine learning model is used to estimate spatial parameters for each of the objects identified in the image data. The spatial parameters are estimated by fitting the objects to the set of geometric shapes. Updates to the spatial parameters are temporally integrated. A spatial estimate of the objects identified in the image data is generated.

IPC Classes  ?

  • G06T 7/60 - Analysis of geometric attributes
  • G06N 3/084 - Backpropagation, e.g. using gradient descent

48.

CASCADED VIDEO ANALYTICS FOR EDGE COMPUTING

      
Application Number 18537291
Status Pending
Filing Date 2023-12-12
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Ananthanarayanan, Ganesh
  • Shu, Yuanchao
  • Noghabi, Shadi
  • Bahl, Paramvir
  • Cox, Landon
  • Crown, Alexander

Abstract

This document relates to performing live video stream analytics on edge devices. One example determines resources available to the system, and a video analytics configuration is selected that distributes work between edge devices and cloud devices in a cascading manner, where edge device processing is prioritized over cloud processing in order to conserve resources. This example can dynamically modify the allocation of processing depending on changing conditions, such as network availability.

IPC Classes  ?

  • G06F 16/71 - Indexing; Data structures therefor; Storage structures
  • G06F 16/738 - Presentation of query results
  • G06F 16/783 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
  • G06V 20/40 - Scenes; Scene-specific elements in video content

49.

Smooth and Jump-Free Rapid Target Acquisition

      
Application Number 18545501
Status Pending
Filing Date 2023-12-19
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Price, Raymond Kirk
  • Bleyer, Michael
  • Edmonds, Christopher Douglas

Abstract

Techniques for correcting an overlay misalignment between an external camera image and a system camera image are disclosed. A first system camera image and a first external camera image are acquired. A first visual alignment is performed between those two images to produce an overlaid image. Some of the content in the overlaid image is surrounded by a bounding element. A position of the bounding element is modified based on movements of the system camera and/or the external camera. In response to performing a second visual alignment using new images, an update vector is computed. Relative movement between the two cameras is determined. Based on the movement and based on the update vector, the bounding element is progressively transitioned to a corrected position in the overlaid image. A speed by which the bounding element is progressively transitioned is proportional to the amount of movement.

IPC Classes  ?

  • G06T 7/33 - Determination of transform parameters for the alignment of images, i.e. image registration using feature-based methods
  • G02B 27/01 - Head-up displays
  • G06T 7/11 - Region-based segmentation
  • G06T 7/174 - Segmentation; Edge detection involving the use of two or more images

50.

PHYSICAL LAYOUTS OF MAJORANA-BASED QUBITS FOR IMPLEMENTATIONS OF PENTAGONAL TILINGS

      
Application Number 17896258
Status Pending
Filing Date 2022-08-26
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Bonderson, Parsa
  • Aasen, David Alexander
  • Knapp, Christina Paulsen

Abstract

Physical layouts of Majorana-based qubits for implementations of pentagonal tilings are described. An example quantum device comprises a set of tetrons for enabling Majorana-based qubits. The set of tetrons is arranged in a lattice to allow pentagonal tilings associated with the set of tetrons. The vertices of the pentagonal tilings relate to the qubits and single qubit operations, and the edges of the pentagonal tilings (connecting different vertices) relate to 2-qubit operations acting on a pair of qubits connected by a given edge. As an example, the 1-qubit Pauli measurements relate to the operations performed on the vertices associated with the pentagonal tilings and the 2-qubit measurements relate to the operations performed along the edges of the pentagonal tilings.

IPC Classes  ?

  • G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control
  • G06N 10/70 - Quantum error correction, detection or prevention, e.g. surface codes or magic state distillation

51.

USE OF CUSTOMER ENGAGEMENT DATA TO IDENTIFY AND CORRECT SOFTWARE PRODUCT DEFICIENCIES

      
Application Number 17960574
Status Pending
Filing Date 2022-10-05
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Buhariwala, Karl
  • Agarwal, Adity
  • Narayanan, Ganga
  • Nallabothula, Kiran

Abstract

A method for automatically identifying a root cause of customer dissatisfaction with a software product and creating feedback items to improve the software product includes collecting engagement data pertaining to interactions between a customer and a flow of visual elements presented by the software product and detecting a trigger event indicating that the customer is dissatisfied with the software product. In response to the trigger event and based at least in part on the engagement data, a potential deficiency of the software product is automatically identified and a repair ticket is generated for a development team. The repair ticket identifies the potential deficiency of the software product.

IPC Classes  ?

52.

SCHEDULE SEND SUGGESTION IN AN APPLICATION CHAT

      
Application Number 18081288
Status Pending
Filing Date 2022-12-14
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Zhang, Jiaoyan
  • Guo, Wendy
  • Taing, John Hay
  • Batta, Vineet
  • Isakov, Yury
  • Tam, Simon Chun Ho
  • Nino Tapia, Jennifer Andrea
  • Wall, Matthew David
  • Lynch, Sean Michael
  • Natanov, Milena
  • Constance, Angelina

Abstract

The present disclosure relates to methods and systems for automatically providing a suggestion to delay sending a message that is being composed by a user to send to a chat participant using a chat feature of an application. The suggestion is sent in response to determining that one or more trigger conditions occurred. The suggestion includes a scheduled time to send the message. The methods and systems send the delayed message at the scheduled time.

IPC Classes  ?

  • H04L 51/04 - Real-time or near real-time messaging, e.g. instant messaging [IM]
  • H04L 51/42 - Mailbox-related aspects, e.g. synchronisation of mailboxes

53.

SYSTEMS AND METHODS FOR ENCODING AN INTERACTIVE SOFTWARE VIDEO STREAM

      
Application Number 17962773
Status Pending
Filing Date 2022-10-10
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Mosier, Scott David

Abstract

A method of encoding video streams includes, at an encoding device, receiving a first video stream frame from a first server device at the encoding device at a first receipt time; receiving a second video stream frame from a second server device at the encoding device at a second receipt time; encoding the first video stream frame with the encoding device; determining a delay duration based at least partially on a first encoding duration of the first video stream frame and the second receipt time; and transmitting a delay instruction based at least partially on the delay duration to the second server device.

IPC Classes  ?

  • H04N 19/42 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals - characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation
  • H04N 19/136 - Incoming video signal characteristics or properties
  • H04N 19/172 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object the region being a picture, frame or field
  • H04N 19/40 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video transcoding, i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream

54.

SYSTEM FOR DETECTING LATERAL MOVEMENT COMPUTING ATTACKS

      
Application Number 18081641
Status Pending
Filing Date 2022-12-14
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Rotstein, Tomer
  • Shany, Eran

Abstract

A method may include receiving from a first computing device, metadata that includes a suspected malicious activity indicator and a device identifier associated with the indicator; receiving, from a second computing device, log activity data; matching the device identifier included in the metadata to a device identifier in the log activity data; and based on the matching, transmitting an alert identifying the second computing device as a source of the suspected malicious activity.

IPC Classes  ?

55.

CYBERSECURITY INSIDER RISK MANAGEMENT

      
Application Number 17990667
Status Pending
Filing Date 2022-11-19
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Miyake, Erin K.
  • Tm, Sudarson
  • Mccann, Robert
  • Siddiqui, Maria
  • Mishra, Ashish
  • Mir, Talhah Munawar
  • Mittal, Sakshi
  • Kalajdjieski, Jovan
  • Ruvalcaba, Diego

Abstract

Some embodiments help manage cybersecurity insider risk. An authorized user influence pillar value is based on an influence signal representing the user's actual or potential influence in a computing environment. An authorized user access pillar value is based on an access signal representing the user's actual or potential access to resources. An impact risk value is calculated as a weighted combination of the pillar values. In response, an embodiment automatically adjusts a cybersecurity characteristic, such as a security risk score, security group membership, threat detection mechanism, or alert threshold. In some cases, impact risk is also based on a cumulative potential exfiltration anomaly access signal. In some cases, impact risk is based on one or more values which represent user public visibility, user social network influence, brand damage risk, resource mission criticality, access request response speed or success rate, or a known cybersecurity attack.

IPC Classes  ?

56.

Tomography of unitary matrix using quantum computing device

      
Application Number 17934322
Status Pending
Filing Date 2022-09-22
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Haah, Jeongwan
  • Kothari, Robin Ashok
  • O'Donnell, Ryan William
  • Tang, Ewin Nicolas

Abstract

A computing system including a quantum computing device and a classical computing device. The computing system computes an estimated unitary matrix over a plurality of iterations that each include, at a processor, computing a current-iteration exponent, a current-iteration error parameter, and a conjugate transpose of a current-iteration estimate of the unitary matrix. Each iteration further includes transmitting the current-iteration exponent, the current-iteration error parameter, and the conjugate transpose to the quantum computing device. At the quantum computing device, each iteration further includes computing a process tomography result and outputting the process tomography result to the classical computing device. At the processor, each iteration further includes computing a distance measure between the current-iteration estimate and the process tomography result, and, when the distance measure is below a predefined constant, updating the current-iteration estimate. The computing system outputs, as the estimated unitary matrix, the updated current-iteration estimate computed in a final iteration.

IPC Classes  ?

  • G06F 17/16 - Matrix or vector computation
  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers

57.

BLIND SUBPOENA PROTECTION

      
Application Number 17938711
Status Pending
Filing Date 2022-10-07
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Venkatesan, Ramarathnam
  • Chandran, Nishanth
  • Antonopoulos, Panagiotis
  • Setty, Srinath T.V.
  • Cherian, Basil
  • Carroll, Jr., Daniel John
  • Barnwell, Jason Sydney

Abstract

Embodiments described herein enable at least one of a plurality of entities to access data protected by a security policy in response to validating respective digital access requests from the entities. The respective digital access requests are received, each comprising a proof. For each request, an encrypted secret share is obtained from a respective ledger database. Each request is validated based at least on the respective encrypted secret share and the proof, without decrypting the respective encrypted secret share. In response to validating all of the requests, a verification that an access criteria of a security policy is met is made. If so, at least one of the entities is provided with access to data protected by the security policy. In an aspect, embodiments enable a blind subpoena to be performed. In another aspect, embodiments enable the at least one entity to access the data for an isolated purpose.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

58.

INTEGRATED LASER AND MODULATOR SYSTEMS

      
Application Number 17960679
Status Pending
Filing Date 2022-10-05
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Zhang, Yifei
  • Barter, Thomas Hamish

Abstract

A display system includes an integrated laser and modulator device and a display assembly. The integrated laser and modulator device includes a laser component configured to facilitate light emission responsive to applied current and a modulator component configured to selectively modulate light responsive to applied signal. The modulator component is integrally coupled to the laser component via a bridging structure that intervenes between the laser component and the modulator component. At least a portion of the bridging structure facilitates power reflectivity into a laser cavity of the laser component. The bridging structure facilitates transmission of light emitted by the laser component into the modulator component for modulation by the modulator component to provide modulated light. The display assembly is configured to direct the modulated light provided by the integrated laser and modulator device to illuminate pixels to form an image.

IPC Classes  ?

  • H01S 5/026 - Monolithically integrated components, e.g. waveguides, monitoring photo-detectors or drivers
  • F21V 8/00 - Use of light guides, e.g. fibre optic devices, in lighting devices or systems
  • G02B 27/01 - Head-up displays
  • G02F 1/17 - Devices or arrangements for the control of the intensity, colour, phase, polarisation or direction of light arriving from an independent light source, e.g. switching, gating or modulating; Non-linear optics for the control of the intensity, phase, polarisation or colour based on variable-absorption elements not provided for in groups
  • G09G 3/02 - Control arrangements or circuits, of interest only in connection with visual indicators other than cathode-ray tubes by tracing or scanning a light beam on a screen
  • H01S 5/00 - Semiconductor lasers
  • H01S 5/042 - Electrical excitation

59.

SEARCH SYSTEM THAT PROVIDES SEARCH RESULTS AND GENERATED CONTENT

      
Application Number 17963993
Status Pending
Filing Date 2022-10-11
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Sacheti, Arun Kumar
  • Yang, Nevin
  • Merchant, Meenaz Aliraza
  • Govindarajen, Parthasarathy
  • Devries, Jeff R.
  • Fischel, Jason Blake

Abstract

A computing system is described, where the computing system includes a processor and memory storing instructions that, when executed by the processor, cause the processor to perform several acts. The acts include receiving a query from an application executing on a client computing device that is in network communication with the computing system. The acts also include searching a computer-readable index of items based upon the query, identifying an item based upon the searching of the computer-readable index, transmitting the query to a computer-implemented model, and obtaining content generated by the computer-implemented model, where the computer-implemented model generated the content based upon the query. The acts further include returning at least one of the item or the content to the client computing device for presentment by way of the application executing on the client computing device.

IPC Classes  ?

60.

SYSTEM AND METHOD OF GENERATING DIGITAL INK NOTES

      
Application Number 17962256
Status Pending
Filing Date 2022-10-07
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Primadona, Fnu
  • Mopati, Sivaramakrishna
  • Silvis, Jason Glenn

Abstract

A method of and system for automatically generating an ink note object is carried out by detecting receipt of a digital ink input on a user interface (UI) screen, the UI screen being displayed by an application and being associated with at least one of a document, a page or an event. Once digital ink input is detected, the digital ink input is captured. Additionally, contextual data associated with the digital ink input is collected, the contextual data being related to at least one of the document, the page, the event, and a user providing the digital ink input. An ink note object is then generated and stored for the digital ink input, the ink note object including the captured digital ink input and the contextual data, and the ink note object being an entity that is separate from the document, the page and the even.

IPC Classes  ?

  • G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
  • G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

61.

INFERRING AND CONTEXTUALIZING A STRANGER ON AN ENTERPRISE PLATFORM

      
Application Number 18067010
Status Pending
Filing Date 2022-12-15
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Bonyadi, Mohammadreza
  • Fosse, Eivind Berg
  • Putilin, Sergey
  • Sommerfelt, Espen Trautmann
  • Schiehlen, Ute Katja
  • Solonko, Kateryna
  • Saetrom, Ola
  • Helvik, Torbjørn
  • Paruch, Malgorzata

Abstract

Systems and methods for inferring and contextualizing a stranger on an enterprise platform are provided. The method includes generating a familiarity score between a user and an individual. Based on the generated familiarity score, the individual is determined to be a stranger to the user and a contextualized summary of the stranger is generated. The generated contextualized summary of the stranger is presented to the user in response to an upcoming interaction between the user and the stranger or a detected interaction between the user and the stranger.

IPC Classes  ?

  • G06Q 50/00 - Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
  • G06N 5/04 - Inference or reasoning models

62.

MACHINE LEARNING FOR IDENTIFYING IDLE SESSIONS

      
Application Number 17962078
Status Pending
Filing Date 2022-10-07
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Gambhir, Prerana Dharmesh
  • Pari-Monasch, Sharena Meena
  • Nguyen, Khoa Dang
  • Shi, Yiming
  • Dong, Yongchang

Abstract

Systems and methods for identifying and evicting idle sessions include training a machine learning model as a session classifying model to learn rules for classifying active sessions between clients and the cloud-based service. The session classifying model is trained to receive a plurality of parameters pertaining to the document associated with an active session as input and to apply the rules to the plurality of parameters to determine a classification for the active session and to provide an output indicative of the classification for the active session. The session classifying model is then utilized in the cloud-based service to classify the active sessions. The active sessions classified as idle sessions may then be evicted from the cloud-based service.

IPC Classes  ?

  • H04L 67/143 - Termination or inactivation of sessions, e.g. event-controlled end of session
  • H04L 67/54 - Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users

63.

CLOUD REMOVAL BY ILLUMINATION NORMALIZATION AND INTERPOLATION WEIGHTED BY CLOUD PROBABILITIES

      
Application Number 18181183
Status Pending
Filing Date 2023-03-09
First Publication Date 2024-04-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Olsen, Peder Andreas
  • De Moura Estevao Filho, Roberto
  • Nunes, Leonardo De Oliveira

Abstract

Clouds in a satellite image are replaced with a prediction of what was occluded by those clouds. The cloudy portion of the image is interpolated from a series of satellite images taken over time, some of which are cloud-free in the target image's cloudy portion. In some configurations, clouds are removed taking into account each pixel's availability—a measure of certainty that a pixel is cloud-free. Furthermore, these images may have been taken under different amounts of illumination, making it difficult to determine whether a difference between two images is due to a change in illumination or a change to the location. The effect of illumination on each image is removed before interpolating the cloudy portion of the image. In some configurations, removing the effect of illumination also takes into account pixel availability.

IPC Classes  ?

  • G06V 10/60 - Extraction of image or video features relating to illumination properties, e.g. using a reflectance or lighting model
  • G06T 7/90 - Determination of colour characteristics
  • G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
  • G06V 10/26 - Segmentation of patterns in the image field; Cutting or merging of image elements to establish the pattern region, e.g. clustering-based techniques; Detection of occlusion
  • G06V 10/56 - Extraction of image or video features relating to colour
  • G06V 10/74 - Image or video pattern matching; Proximity measures in feature spaces
  • G06V 20/13 - Satellite images

64.

EVALUATING QUANTUM COMPUTING CIRCUITS IN VIEW OF THE RESOURCE COSTS OF A QUANTUM ALGORITHM

      
Application Number 18356634
Status Pending
Filing Date 2023-07-21
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Haener, Thomas
  • Roetteler, Martin H.
  • Svore, Krysta M.

Abstract

Methods for evaluating quantum computing circuits in view of the resource costs of a quantum algorithm are described. A processor-implemented method for performing an evaluation of a polynomial corresponding to an input is provided. The method includes determining a polynomial interpolation for a set of sub-intervals corresponding to the input. The method further includes constructing a quantum circuit for performing, in parallel, polynomial evaluation corresponding to each of the set of sub-intervals.

IPC Classes  ?

  • G06N 10/20 - Models of quantum computing, e.g. quantum circuits or universal quantum computers
  • G06F 17/11 - Complex mathematical operations for solving equations
  • G06N 10/60 - Quantum algorithms, e.g. based on quantum optimisation, or quantum Fourier or Hadamard transforms

65.

MULTIPLE DATAPOINT FORMATS IN SPREADSHEETS

      
Application Number 18391091
Status Pending
Filing Date 2023-12-20
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Liddell, Derek

Abstract

Systems, methods, and software are disclosed herein that allow multiple values to be stored and referenced individually in a spreadsheet or table cell. In an implementation, an application identifies a format of a cell in a spreadsheet with a format having multiple data points. The application receives multiple values corresponding to the multiple data points and stores each value of the multiple values in the cell as a separately referenceable value with respect to each other value of the multiple values. In some implementations, formulas in other cells or sub-routines can reference an individual one of the values in the cell.

IPC Classes  ?

  • G06F 40/18 - Editing, e.g. inserting or deleting using ruled lines of spreadsheets
  • H04L 67/04 - Protocols specially adapted for terminal portability

66.

FAILURE RECOVERY RECOMMENDATIONS FOR CLI COMMANDS

      
Application Number 18525828
Status Pending
Filing Date 2023-11-30
First Publication Date 2024-04-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC. (USA)
Inventor
  • O'Toole, Christopher
  • Zilouchian Moghaddam, Roshanak

Abstract

A failure recommendation system for a command line interface (CLI) uses machine learning to predict the most likely command to correct an unsuccessful or failed attempt to perform an intended operation using the CLI. The failure recommendation system is based on a conditional probability model trained on failure-success pairs of commands from CLI telemetry data to learn the most likely command to remediate a failure. The conditional probability model predicts the most likely command based on a failure type and the failed command. The failure type is identified through a failure type classifier and is used to select the most likely command to remediate a failure from the different events that may lead to a failure.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine
  • G06F 18/214 - Generating training patterns; Bootstrap methods, e.g. bagging or boosting
  • G06N 20/00 - Machine learning

67.

FEATURE DEPLOYMENT READINESS PREDICTION

      
Application Number 18529639
Status Pending
Filing Date 2023-12-05
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Yang, Connie Qin
  • Rosoff, Matthew Scott
  • Adapa, Nithin
  • Ringer, Logan
  • Lim, Steve Ku
  • Chai, Xiaoyu

Abstract

Systems and methods directed to generating a predicted quality metric are provided. Telemetry data may be received from a from a first group of devices executing first software. A quality metric for the first software may be generated based on the first telemetry data. Telemetry data from a second group of devices may be received, where the second group of devices is different from the first group of devices. Covariates impacting the quality metric based on features included in the first telemetry data and the second telemetry data may be identified, and a coarsened exact matching process may be performed utilizing the identified covariates to generate a predicted quality metric for the first software based on the second group of devices.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/30 - Monitoring
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine
  • G06F 18/243 - Classification techniques relating to the number of classes

68.

MATRIX BASED BOT IMPLEMENTATION

      
Application Number 18540493
Status Pending
Filing Date 2023-12-14
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Korhonen, Jokko

Abstract

In some examples, matrix based bot implementation may include obtaining, for a plurality of bots that are used to respond to a query, a matrix that includes entries including a plurality of scenarios, a plurality of questions corresponding to the plurality of scenarios, and a plurality of responses. Each response may correspond to a specified question. A plurality of scripts may be generated based on an analysis of the matrix. Each script may include at least one question followed by at least one response, and further followed by at least one scenario. For each script, a closest pre-existing script may be identified based on a comparison of the script to pre-existing scripts. For each script, a modification to the matrix may be generated based on a difference in the script from the closest pre-existing script. The bots may be utilized to respond to the query based on the modified matrix.

IPC Classes  ?

69.

DOCUMENT RE-FINDING SYSTEM

      
Application Number 18541216
Status Pending
Filing Date 2023-12-15
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Ramos, Gonzalo A.
  • Suh, Jin A.
  • Ng, Shiqian Rachel
  • Meek, Christopher Alan
  • Park, Haekyu

Abstract

A document re-finding system generates embeddings for concept clips provided by a user, the concept clips defining a concept for searching for content of interest to the user in a plurality of documents previously seen by the user. The re-finding system determines semantic relationships between the concept and document clips, related to respective document among the plurality of documents, based on the concept embedding and embeddings generated for the document clips. A graphical user interface depicting the semantic relationships is rendered to the user and is operable to enable re-finding a document, among the plurality of documents, having the content of interest to the user.

IPC Classes  ?

  • G06F 16/9535 - Search customisation based on user profiles and personalisation
  • G06F 16/9538 - Presentation of query results

70.

SUPERVISED LEARNING SYSTEM FOR IDENTITY COMPROMISE RISK COMPUTATION

      
Application Number 18543897
Status Pending
Filing Date 2023-12-18
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Abdelaziz, Sayed Hassan
  • Puertas Calvo, Maria
  • Cristofor, Laurentiu Bogdan
  • Luthra, Rajat

Abstract

Systems are provided for improving computer security systems that are based on user risk scores. These systems can be used to improve both the accuracy and usability of the user risk scores by applying multiple tiers of machine learning to different the user risk profile components used to generate the user risk scores and in such a manner as to dynamically generate and modify the corresponding user risk scores.

IPC Classes  ?

71.

METHOD AND SYSTEM FOR EXTENDING QUERY PROCESSING WITH DIFFERENTIABLE OPERATORS

      
Application Number 17963809
Status Pending
Filing Date 2022-10-11
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Interlandi, Matteo
  • Gandhi, Apurva Sandeep
  • Asada, Yuki
  • Gemawat, Advitya
  • Fu, Victor Renjie
  • Zhang, Lihao
  • Sen, Rathijit
  • Banda, Dalitso Hansini

Abstract

Example aspects include techniques for query processing over deep neural network runtimes. These techniques include receiving a query including a query operator and a trainable user defined function (UDF). In addition, the techniques include determining a query representation based on the query, and determining, for performing the query in a neural network runtime, an initial neural network program based on the query representation, the initial neural network program including a differentiable operators corresponding to the query operator. and executing the neural network program in the neural network runtime over the neural network data structure to generate a query result. Further, the techniques include training the initial neural network program via the neural network runtime to determine a trained neural network program, and executing the trained neural network program in the neural network runtime to generate inference information.

IPC Classes  ?

72.

DEEP APERTURE

      
Application Number 17960741
Status Pending
Filing Date 2022-10-05
First Publication Date 2024-04-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Cutler, Benjamin Franklin
  • Yang, Weiwei
  • Fowers, Spencer

Abstract

The techniques disclosed herein enable a realistic, inclusive sense of physical presence for videoconference participants that is comparable to in-person communication. Multiple users are simultaneously provided with an immersive experience without the need for head-mounted displays or other wearable technology. Specifically, a real-time three-dimensional model of a scene at the remote end of the videoconference is received. At the same time, the location and perspective of each local participant is determined. Each local participant is then individually provided with a spatially correct stereoscopic view of the model. The sense of physical presence is created by changing what each local participant sees in response to a change in their perspective. The sense of physical presence is enhanced by enabling direct eye contact, clear communication of emotional state and other non-verbal cues, and a shared visual experience and audio ambience across locations.

IPC Classes  ?

  • G06T 7/70 - Determining position or orientation of objects or cameras
  • G06F 40/58 - Use of machine translation, e.g. for multi-lingual retrieval, for server-side translation for client devices or for real-time translation
  • H04N 7/15 - Conference systems

73.

SIMULATED CHORAL AUDIO CHATTER

      
Application Number 17938889
Status Pending
Filing Date 2022-10-07
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Tang, John C.
  • Buxton, William Arthur Stewart
  • Rintel, Edward Sean Lloyd
  • Miller, Amos
  • Wilson, Andrew D.
  • Junuzovic, Sasa

Abstract

Systems, methods, and computer-readable storage devices are disclosed for simulated choral audio chatter in communication systems. One method including: receiving audio data from each of a plurality of users participating in a first group of a plurality of groups for an event using a communication system; generating first simulated choral audio chatter based on the audio data received from each of the plurality of users in the first group; and providing the generated first simulated choral audio data to at least one user of a plurality of users of the event.

IPC Classes  ?

  • H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference

74.

RAINBOW REDUCTION FOR WAVEGUIDE DISPLAYS

      
Application Number 17961451
Status Pending
Filing Date 2022-10-06
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Zhang, Yifei
  • Poon, Yarn Chee
  • Watson, Mathew David

Abstract

A rainbow artifact mitigation system includes an angular dependent filter configured to receive light and to transmit light according to one or more angular transmission functions. The one or more angular transmission functions define light transmission as a function of incident angle for the angular dependent filter, The angular dependent filter is configured to at least partially mitigate transmission of light for at least some incident angles above 40°. The angular dependent filter comprises a plurality of nanostructures, and the nanostructures of the plurality of nanostructures are arranged in an array with one or more sub-wavelength periods. The one or more angular transmission functions comprise at least two different angular transmission functions for different regions of the angular dependent filter.

IPC Classes  ?

75.

TRANSFER LEARNING FOR SENIORITY MODELING LABEL SHORTAGE

      
Application Number 17962364
Status Pending
Filing Date 2022-10-07
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Zhang, Zheng
  • Niu, Sufeng
  • Zhou, Di
  • Bollinger, Jacob

Abstract

Techniques for using transfer learning to address label data shortage in seniority modeling for an online service are disclosed herein. In some embodiments, a computer-implemented method comprises training an initialized neural network using training examples comprising profile data and labels for the profile data, where each label comprises a standardized position title, and the training of the initialized neural network forms a pre-trained neural network. Next, the computer system may train the pre-trained neural network using training examples comprising profile data and labels for the profile data, where the labels comprise a position seniority, and the training of the pre-trained neural network forms a fine-tuned neural network. The computer system may then compute the position seniority for a user based on profile data of the user using the fine-tuned neural network, and use the position seniority of the user in an application of an online service.

IPC Classes  ?

76.

ACCESS CONTROL USING MEDIATED LOCATION, ATTRIBUTE, POLICY, AND PURPOSE VERIFICATION

      
Application Number 18045335
Status Pending
Filing Date 2022-10-10
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Venkatesan, Ramarathnam
  • Chandran, Nishanth
  • Ananthanarayanan, Ganesh
  • Antonopoulos, Panagiotis
  • Setty, Srinath T.V.
  • Carroll, Jr., Daniel John
  • Muthabatulla, Kiran
  • Shu, Yuanchao
  • Mehrotra, Sanjeev

Abstract

An access control system is disclosed for controlling access to a resource. A request is received by a location attribute policy (LAP) server to access an encrypted resource. The LAP server accesses a resource policy that identifies requirements for granting access to the encrypted resource, such as a list of attributes of the requestor that are required and a dynamic attribute requirement of the requestor. The LAP server receives a cryptographic proof from the computing device that the requestor possesses the attributes and validates the proof based at least on information obtained from a trusted ledger. Once the proof is validated, the LAP server provides a shared secret associated with the dynamic attribute requirement to a decryption algorithm. The decryption algorithm uses the dynamic attribute shared secret in combination with one or more attribute shared secrets from the requestor to generate a decryption key for the encrypted resource.

IPC Classes  ?

77.

GENERATION OF EMPHASIS IMAGE WITH EMPHASIS BOUNDARY

      
Application Number 17960603
Status Pending
Filing Date 2022-10-05
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Chishti, Salman Muin Kayser

Abstract

The automated generation of an emphasis image (such as a cropped image) that is based on an input image. The input image is fed to a machine-learned model that is trained to label portions of images. That machine-learned model then outputs an identification of multiple portions of images, along with potentially labels of each of those identified portions. The label identifies a property of the corresponding identified portion. As an example, one portion might be labelled as irrelevant, another might be labelled as a name, another might be labelled as a comment, and so forth. That output is accessed and the generated label is used to determine an emphasis bounding box. The emphasis bounding box is then applied to the input image to generate an emphasis image. As an example, the emphasis image may be a cropped image of the input image.

IPC Classes  ?

  • G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
  • G06T 5/00 - Image enhancement or restoration
  • G06T 7/11 - Region-based segmentation
  • G06T 7/13 - Edge detection
  • G06V 10/70 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning
  • G06V 20/70 - Labelling scene content, e.g. deriving syntactic or semantic representations

78.

PRIVACY-PRESERVING RULES-BASED TARGETING USING MACHINE LEARNING

      
Application Number 17960618
Status Pending
Filing Date 2022-10-05
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Rama, Kiran

Abstract

Techniques are described herein that are capable of providing privacy-preserving rules-based targeting using machine learning. Ranks are assigned to entities using a machine learning model. Values of each targetable feature associated with the respective entities are ordered. For each targetable feature, the entities are sorted among bins based on the values of the feature associated with the respective entities. For each targetable feature, a bin is selected from the bins that are associated with the feature based on the selected bin including more entities having respective ranks that are within a designated range than each of the other bins that are associated with the feature. A targeting rule is established, indicating a prerequisite for targeting an entity. The prerequisite indicating that the value of each targetable feature associated with the entity is included in a respective interval associated with the selected bin for the feature.

IPC Classes  ?

  • G06Q 30/02 - Marketing; Price estimation or determination; Fundraising

79.

COMPENSATING FOR TOUCH-SCREEN COUPLING THROUGH DISPLAY ELECTRODE

      
Application Number 18546076
Status Pending
Filing Date 2022-02-10
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Barel, Eliyahu
  • Haran, On

Abstract

A touch-screen display device comprises a series of column electrodes and a series of row electrodes, with an electronic display layer arranged behind the series of column electrodes and behind the series of row electrodes. The series of row electrodes crosses the series of column electrodes such that the electrical impedance at each crossing of a row and column electrode is responsive to the proximity of a touch input to that crossing. A row-drive circuit is configured to apply an excitation signal to a selected row electrode and to concurrently apply a compensation signal to one or more other row electrodes, the compensation signal being out of phase with respect to the excitation signal. A column-sense circuit is configured to sense a column signal from the series of column electrodes and to provide a corresponding column output.

IPC Classes  ?

  • G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
  • G06F 3/044 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means by capacitive means

80.

GESTURE-DRIVEN PIVOT TABLE CONFIGURATIONS

      
Application Number 18045275
Status Pending
Filing Date 2022-10-10
First Publication Date 2024-04-11
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Simonyi, Charles
  • Osorio Cardona, Juan Camilo

Abstract

An enhanced user experience is disclosed herein that provides for gesture-based configuring of pivot tables. In various implementations, a pivot table includes query areas associated with fields of a data table being summarized by the pivot table. Gestures made with respect to an area of the pivot table drive changes in the association of the fields of the data table with the query areas of the pivot table. As user input is received with respect to an area of the pivot table, relevant fields are identified, and new associations are made between the query areas and the fields. The pivot table may then be updated accordingly based on the new associations.

IPC Classes  ?

  • G06F 40/18 - Editing, e.g. inserting or deleting using ruled lines of spreadsheets
  • G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text

81.

Correlation across non-logging components

      
Application Number 17527927
Grant Number RE049914
Status In Force
Filing Date 2021-11-16
First Publication Date 2024-04-09
Grant Date 2024-04-09
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Wright, David Christopher
  • Chatterjee, Arijit
  • Yuan, Qingqing
  • Barli, Praveen Kumar
  • Hiremath, Basaveshwar S.
  • Syed, Nosheen M.
  • Johnson, Autumn Lee

Abstract

Systems are provided for logging transactions in heterogeneous networks that include a combination of one or more instrumented components and one or more non-instrumented components. The instrumented components are configured to generate impersonated log records for the non-instrumented components involved in the transaction processing hand-offs with the instrumented components. The impersonated log records are persisted with other log records that are generated by the instrumented components in a transaction log that is maintained by a central logging system to reflect a complete flow of the transaction processing performed on the object, including the flow through the non-instrumented component(s).

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • G06F 11/22 - Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 17/18 - Complex mathematical operations for evaluating statistical data
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 41/0631 - Management of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation

82.

Pose prediction for remote rendering

      
Application Number 18185432
Grant Number 11954248
Status In Force
Filing Date 2023-03-17
First Publication Date 2024-04-09
Grant Date 2024-04-09
Owner Microsoft Technology Licensing, LLC. (USA)
Inventor
  • Reeh, Matthias Felix
  • Voss-Wolff, Christian
  • Turner, Alex Christopher

Abstract

A display pose of a client computing device is computed in a hybrid manner using both the client computing device and a server. Using the client computing device, an initial pose of the client computing device at an initial time is computed. A prospective pose at a target time is predicted using the client computing device. The prospective pose is sent along with auxiliary data from the client computing device to the server and a display pose of the client computing device at a display time is computed. The display pose is computed using the prospective pose and the auxiliary data.

IPC Classes  ?

  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer

83.

Dynamically controlled participation allocations for communication sessions

      
Application Number 17994151
Grant Number 11956286
Status In Force
Filing Date 2022-11-25
First Publication Date 2024-04-09
Grant Date 2024-04-09
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Hassan, Amer Aref
  • Drammeh, Philip Ibo Ibrahima
  • Sekaran, Mahendra

Abstract

A system provides dynamically controlled participation allocations for communication sessions. A system can create a queue for participants of a communication session, such as an online meeting. The queue can be generated for a communication session having an intended format that allows participants to individually speak in succession, such as a Question and Answer (Q&A) session. The system manages a user interface (UI) of the communication session displaying a timer that changes dynamically for each participant indicating a total time for his or her questions or comments based on an amount of time left for the meeting to end. The system displays, augments, and associates a timer for each participant indicating a total time for his or her questions or comments, which is based on an amount of time left for the meeting to end, number of users providing a “hand raise” input, and history of participation for each participant.

IPC Classes  ?

  • H04L 65/1093 - In-session procedures by removing participants
  • H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference

84.

TERMINATION OF SIDECAR CONTAINERS

      
Application Number 18074423
Status Pending
Filing Date 2022-12-02
First Publication Date 2024-04-04
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Chernobrivenko, Sergey
  • Hockey, Alex John

Abstract

In various examples there is a method performed by a controller in Kubernetes cluster. The method comprises: identifying a job to be completed by the cluster, from a plurality of jobs. In response to identifying a job to be completed by the cluster, determining at least one sidecar container associated with the job. In response to identifying a job to be completed by the cluster, determining that the job has been completed by querying a Kubernetes control plane of the cluster. In response to determining that the job has been completed, triggering termination of the sidecar container.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 18/2321 - Non-hierarchical techniques using statistics or function optimisation, e.g. modelling of probability density functions

85.

Low-Cost, High-Security Solutions for Digital Signature Algorithm

      
Application Number 18077043
Status Pending
Filing Date 2022-12-07
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Karabulut, Emre
  • Pillilli, Bharat S.
  • Bisheh Niasar, Mojtaba

Abstract

Generally discussed herein are devices, systems, and methods for digital signature generation security. A method can include generating, by a first device, a first random number, in generating a signature for a communication, masking, using the first random number, only a private key, a hash of the communication, or a combination thereof, and providing the signature with the communication to a second device.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

86.

DETERMINATIONS OF MODIFICATIONS IN OBJECTS HAVING NESTED CHILD OBJECTS

      
Application Number 18486704
Status Pending
Filing Date 2023-10-13
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Pradhan, Sudhansu Sekhar

Abstract

According to examples, an apparatus may include a processor and a memory on which is stored instructions that may cause the processor to determine that information has been inputted into an object, the object including a child object nested within the object. The instructions may also cause the processor to generate a child-object hash value based on contents of the child object, generate a hash value for the object based on contents of the object, the contents of the object including the child-object hash value, and determine whether the generated hash value differs from a stored hash value, the stored hash value corresponding to contents of the object without the inputted information. The instructions may also cause the processor to, based on a determination that the generated hash value differs from the stored hash value, save the object including the child object nested within the object.

IPC Classes  ?

  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
  • G06F 3/04842 - Selection of displayed objects or displayed text elements
  • G06F 16/215 - Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/23 - Updating
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

87.

END-TO-END SECURE COMMUNICATIONS FOR PRIVILEGED 5G NETWORK TRAFFIC

      
Application Number 18500302
Status Pending
Filing Date 2023-11-02
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Bahl, Paramvir
  • Singh, Rachee

Abstract

Software-defined networking and network function virtualization constructs are leveraged across diverse portions of 5G network infrastructure including radio access network, mobile core, and wide area network to enable a security property to be implemented for a network slice from end-to-end to provide for strong logical and/or physical isolation of slice traffic from other network traffic. One or more network slice controllers are implemented in the 5G network that are interoperable as separate elements, or under centralized control, to enable the underlying diverse network infrastructure to be abstracted and virtualized so that infrastructure properties can be mapped across infrastructure types for the end-to-end slice. Network resources may be dynamically allocated based on real-time traffic demands to instantiate the end-to-end network slices on a customized basis to meet particular quality of service parameters for various traffic types, including privileged traffic that may be prioritized when resources become scarce and network congestion occurs.

IPC Classes  ?

  • H04W 28/02 - Traffic management, e.g. flow control or congestion control
  • H04J 14/02 - Wavelength-division multiplex systems
  • H04L 5/00 - Arrangements affording multiple use of the transmission path
  • H04W 12/08 - Access security
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 28/24 - Negotiating SLA [Service Level Agreement]; Negotiating QoS [Quality of Service]

88.

SYSTEMS AND METHODS FOR ADDING PERSISTENCE TO SINGLE PHOTON AVALANCHE DIODE IMAGERY

      
Application Number 18532882
Status Pending
Filing Date 2023-12-07
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Price, Raymond Kirk
  • Bleyer, Micahel
  • Edmonds, Christopher Douglas

Abstract

A system for adding persistence to SPAD imagery is configurable to capture, using a SPAD array, a plurality of image frames. The system is configurable to capture, using an IMU, pose data associated with the plurality of image frames. The pose data includes at least respective pose data associated with each of the plurality of image frames. The system is configurable to determine a persistence term based on the pose data. The system is also configurable to generate a composite image based on the plurality of image frames, the respective pose data associated with each of the plurality of image frames, and the persistence term. The persistence term defines a contribution of each of the plurality of image frames to the composite image.

IPC Classes  ?

  • G09F 9/33 - Indicating arrangements for variable information in which the information is built-up on a support by selection or combination of individual elements in which the desired character or characters are formed by combining individual elements being semiconductor devices, e.g. diodes
  • G06T 7/207 - Analysis of motion for motion estimation over a hierarchy of resolutions
  • G06T 7/70 - Determining position or orientation of objects or cameras
  • G06V 10/25 - Determination of region of interest [ROI] or a volume of interest [VOI]
  • G06V 10/75 - Image or video pattern matching; Proximity measures in feature spaces using context analysis; Selection of dictionaries
  • H01L 31/107 - Devices sensitive to infrared, visible or ultraviolet radiation characterised by only one potential barrier or surface barrier the potential barrier working in avalanche mode, e.g. avalanche photodiode

89.

TUNING LARGE DATA INFRASTRUCTURES

      
Application Number 18534559
Status Pending
Filing Date 2023-12-08
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Zhu, Yiwen
  • Krishnan, Subramaniam Venkatraman
  • Karanasos, Konstantinos
  • Curino, Carlo
  • Tarte, Isha
  • Darbha, Sudhir

Abstract

An automated tuning service is used to automatically tune, or modify, the operational parameters of a large-scale cloud infrastructure. The tuning service performs automated and fully data/model-driven configuration based from learning various real-time performance of the cloud infrastructure. Such performance is identified through monitoring various telemetric data of the cloud infrastructure. The tuning service leverages a mix of domain knowledge and principled data-science to capture the essence of our cluster dynamic behavior in a collection of descriptive machine learning (ML) models. The ML models power automated optimization procedures for parameter tuning, and inform administrators in most tactical and strategical engineering/capacity decisions (such as hardware and datacenter design, software investments, etc.). Rich “observational” models (models collected without modifying the system) are combined with judicious use of “fighting” (testing in production), allowing the tuning service to automatically configure operational parameters of a large cloud infrastructure for a broad range of applications.

IPC Classes  ?

  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 16/17 - File systems; File servers - Details of further file system functions
  • G06F 16/182 - Distributed file systems
  • G06F 16/188 - Virtual file systems
  • G06N 20/00 - Machine learning

90.

CHEMICAL SYNTHESIS RECIPE EXTRACTION FOR LIFE CYCLE INVENTORY

      
Application Number 17937001
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Frost, Kali Diane
  • Nguyen, Bichlien Hoang
  • Smith, Jake Allen
  • Xia, Yingce
  • Xie, Shufang
  • Adams, Griffin
  • Zhu, Shang

Abstract

Examples are disclosed that relate to using natural language processing (NLP) to determine a recipe for a chemical synthesis described in a text to create a life cycle inventory (LCI). One example provides a method comprising receiving an input of a text from a publication comprising a description of a chemical product, and analyzing the text using NLP to determine a recipe for the chemical synthesis, the recipe comprising and action and action metadata, the action metadata comprising a reactant. The method further discloses obtaining LCI information for the reactant, determining an energy utilized for the action, and creating an estimate of an environmental impact for the product.

IPC Classes  ?

  • G16C 20/10 - Analysis or design of chemical reactions, syntheses or processes
  • G16C 20/70 - Machine learning, data mining or chemometrics

91.

VOICE BIOMETRICS FOR ANONYMOUS IDENTIFICATION AND PERSONALIZATION

      
Application Number 17937351
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner
  • MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
  • MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Rohatgi, Abhishek
  • Dalmasso, Emanuele
  • Samtani, Dinesh
  • Olvera, Eduardo

Abstract

Example solutions for voice biometrics for anonymous identification and personalization capture an audio signal containing voice signal from a speaker. A plurality of unlabeled voiceprints are stored that are each associated with an anonymous label. The speaker's voice signal is recognized as matching one of the unlabeled voiceprints, enabling identification of the associated anonymous label. Historical information associated with the identified anonymous label is used to generate an alert specific to the speaker. Example practical applications include leveraging a customer relations management (CRM) interaction record to provide a personalized experience to the speaker and providing a warning to a user that the speaker is on a watchlist. These and other practical applications are possible, even though the speaker's identity may be unknown, and the speaker has not enrolled in a voice biometric system. Solutions for generating the unlabeled voiceprints are also disclosed.

IPC Classes  ?

  • G10L 17/06 - Decision making techniques; Pattern matching strategies
  • G10L 17/02 - Preprocessing operations, e.g. segment selection; Pattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal components; Feature selection or extraction
  • G10L 17/22 - Interactive procedures; Man-machine interfaces

92.

DETERMINATION OF AN OUTLIER SCORE USING EXTREME VALUE THEORY (EVT)

      
Application Number 17937767
Status Pending
Filing Date 2022-10-03
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Boue, Laurent
  • Rama, Kiran

Abstract

A subset of data that includes a feature may be selected from a dataset. Parameters from the selected subset of data are determined and an extreme value theory (EVT) algorithm is implemented to determine a probability value for the feature based at least in part on the determined parameters. Based on the determined probability value for the feature, an outlier score is generated for the feature. Based on the outlier score being above a threshold, the subset is identified as anomalous.

IPC Classes  ?

  • G06N 7/00 - Computing arrangements based on specific mathematical models
  • G06K 9/62 - Methods or arrangements for recognition using electronic means

93.

NEURAL GRAPHICAL MODELS FOR GENERIC DATA TYPES

      
Application Number 17949710
Status Pending
Filing Date 2022-09-21
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Shrivastava, Harsh
  • Chajewska, Urszula Stefania

Abstract

The present disclosure relates to methods and systems for providing a neural graphical model. The methods and systems generate a neural view of the neural graphical model for a domain. The input data is generated from the domain and includes generic input data. The input data also includes a combination of different data types of input data. The neural view of the neural graphical model represents the functions of the different features of the domain using a neural network. The functions are learned for the features of the domain using a dependency structure of an input graph for the input data and the neural network. The methods and systems use the neural graphical model to perform inference tasks. The methods and systems also use the neural graphical model to perform sampling tasks.

IPC Classes  ?

94.

LINEAR PROGRAMMING-BASED DYNAMIC BLENDING MODEL

      
Application Number 17952095
Status Pending
Filing Date 2022-09-23
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Liang, Keqing
  • Salomatin, Konstantin
  • El Karoui, Noureddine

Abstract

In an example embodiment, a blending model is presented based on a linear programming approach. The blending model produces a slate of sponsored and non-sponsored pieces of content for display in a graphical user interface, with the ordering and placement of the sponsored and non-sponsored pieces of content selected in order to maximize an objective function. Such an approach can fine tune each piece of content using content-level parameters and holistically examine global constraints and opportunities. It establishes a robust optimization framework that can adapt to content and domain changes without requiring tuning through online experiments.

IPC Classes  ?

  • G06Q 50/00 - Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
  • G06Q 30/02 - Marketing; Price estimation or determination; Fundraising

95.

WEB-BASED WORKLOAD MANAGEMENT WITH ASYNCHRONOUS WORKLOAD EXECUTION AND REAL-TIME USER FEEDBACK

      
Application Number 17955826
Status Pending
Filing Date 2022-09-29
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Martinez Andrade, Andres
  • Penugonda, Kishore Kumar
  • Tong, Yanli
  • Sadasivam, Ganapathi

Abstract

A workload management system includes a workload management tool configured to generate a workload context associated with a workload generated based on interactions of a user with workload initiation controls presented within a user interface (UI) of a client application. The workload context includes instructions for transmitting the workload context from a main browser session to a first background browser session; executing the workload within the first background session; and for configuring a first event handler within the main session to wait for a first event generated within the first background session in association with execution of the workload and, in response to receipt of the first event, transmit the client application an instruction to present workload status information in the user interface.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine

96.

FILE UPLOAD ON DEMAND

      
Application Number 17955954
Status Pending
Filing Date 2022-09-29
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Jones, Brian David
  • Ngan, Kayla Lindsey
  • Spektor, Daron

Abstract

A data processing system implements obtaining, at a file services platform, first mapping information by mapping files, folders, or a combination thereof stored on each of a plurality of client devices associated with a first user. The data processing system further implements synchronizing the first mapping information with the plurality of client devices, receiving a first request for a first file from a first client device of the plurality of client devices, where the first file stored locally on a second client device of the plurality of client devices. The data processing system further implements requesting that the second client device upload an instance of the first file to the file services platform; receiving the instance of the first file from the second client device; and causing the first client device to download the instance of the first file from the file services platform to the first client device.

IPC Classes  ?

  • G06F 16/178 - Techniques for file synchronisation in file systems
  • G06F 16/11 - File system administration, e.g. details of archiving or snapshots
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems

97.

DATA COMMUNICATION CONNECTOR

      
Application Number 17957008
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Harper, Marc
  • Sharma, Apoorva
  • Dhondt, Daniel

Abstract

A first data connector for communicating data with a second data connector includes a data communication interface including adjacent radiofrequency antenna elements, wherein a plurality of the adjacent radiofrequency antenna elements forms a radiofrequency data antenna array and another radiofrequency antenna element of the adjacent radiofrequency antenna elements forms a radiofrequency control channel antenna element, each radiofrequency antenna element of the radiofrequency data antenna array being configured to communicate a subchannel signal of the data to a corresponding radiofrequency data antenna element of a data communication interface of the second data connector bidirectionally. The radiofrequency control channel antenna element is configured to manage data communications through the radiofrequency data antenna array. An attachment interface is positioned on the first data connector and configured to removably attach the first data connector to the second data connector.

IPC Classes  ?

  • H04B 7/24 - Radio transmission systems, i.e. using radiation field for communication between two or more posts
  • H01Q 1/22 - Supports; Mounting means by structural association with other equipment or articles
  • H01Q 21/08 - Arrays of individually energised antenna units similarly polarised and spaced apart the units being spaced along, or adjacent to, a rectilinear path
  • H04B 1/38 - Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving

98.

SYSTEM AND METHOD FOR DETERMINING CRITICAL SEQUENCES OF ACTIONS CAUSING PREDETERMINED EVENTS DURING APPLICATION OPERATIONS

      
Application Number 17957655
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Shah, Mitansh Rakesh
  • Rahmani Hanzaki, Mahdi
  • Roseberry, Wayne Matthias
  • Schick, Guilherme Augusto Kusano

Abstract

A system and method to collect an actions list of action sequences in an application leading to a predetermined resulting event, create pairs of the action sequences, apply a fitting alignment to the action sequence pairs to create fitted action sequence pairs, wherein non-matching data between fitted action sequences of each pair is replaced with gaps to ensure that the first and second fitted action sequences are of equal length and are aligned with one another with the gaps being located at index positions the fitted action sequences corresponding to index positions of non-matching data, and delete data, for each of the fitted action sequence pairs, corresponding to the gaps to create a critical sequence of actions for each of the fitted action sequence pairs representing, respectively, common actions of the fitted action sequences of each of the fitted action sequence pairs leading to the predetermined resulting event.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

99.

Facilitating Interaction among Meeting Participants to Verify Meeting Attendance

      
Application Number 17958096
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Kumar, Mamta Debnath
  • Thapa, Madrina

Abstract

A technique facilitates interaction among meeting participants for a purpose of verifying meeting attendance. The technique includes the operations of: using a programmatic interface to query a data structure to discover first information regarding meetings that a user is scheduled to attend; using the programmatic interface to query the data structure to discover second information regarding participants of a particular meeting; generating a likelihood measure, based on the second information, that specifies a likelihood that the particular meeting will take place; displaying the first information, second information, and a representation of the likelihood measure in a user interface presentation; generating and presenting a graphical control that invites the user to take a computer-implemented action pertaining to the particular meeting; and, in response to activation of the graphical control, performing the computer-implemented action. In some cases, the action involves sending an electronic message to at least one meeting participant.

IPC Classes  ?

  • H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference
  • G06Q 10/10 - Office automation; Time management

100.

PROVIDING HOST MEDIA PROCESSING FUNCTIONALITY TO A GUEST OPERATING SYSTEM

      
Application Number 17958106
Status Pending
Filing Date 2022-09-30
First Publication Date 2024-04-04
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Polinger, Anton Victor
  • Stankiewicz, Marcin
  • Pathirana, Isuru Chamara
  • Rajeev, Kumar
  • Sharma, Isha
  • Evans, Glenn Frederick
  • Wozniak, Matthew R.

Abstract

The techniques disclosed herein enable a guest operating system (OS) to access and use a media processing component configured on a host OS. The guest OS provides, via an API, a request to create an instance of the media processing component (e.g., a codec, an encryption/decryption component, a DRM component). In association with the request, the guest OS allocates space in memory for media data that is to be processed by the instance of the media processing component configured on the host OS. The guest OS stores the input media data in the allocated memory and provides, via the API, reference(s) to locations of the allocated memory. The reference(s) to the locations of the allocated memory enable the host OS to retrieve the input media data and process the input media data using the instance of the media processing component configured on the host OS.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  1     2     3     ...     100        Next Page