Microsoft Corporation

United States of America

Back to Profile

1-100 of 63,048 for Microsoft Corporation and 27 subsidiaries Sort by
Query
Aggregations
IP Type
        Patent 59,775
        Trademark 3,273
Jurisdiction
        United States 40,456
        World 20,172
        Canada 1,862
        Europe 558
Owner / Subsidiary
Microsoft Technology Licensing, LLC 51,439
[Owner] Microsoft Corporation 10,954
LinkedIn Corporation 218
Skype 136
Microsoft Mobile Oy 123
See more
Date
New (last 4 weeks) 349
2024 April (MTD) 281
2024 March 229
2024 February 195
2024 January 227
See more
IPC Class
G06F 17/30 - Information retrieval; Database structures therefor 5,328
H04L 29/06 - Communication control; Communication processing characterised by a protocol 4,092
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 3,097
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs 2,967
G06F 9/44 - Arrangements for executing specific programs 2,877
See more
NICE Class
09 - Scientific and electric apparatus and instruments 2,479
42 - Scientific, technological and industrial services, research and design 1,372
41 - Education, entertainment, sporting and cultural services 876
38 - Telecommunications services 500
35 - Advertising and business services 459
See more
Status
Pending 3,769
Registered / In Force 59,279
  1     2     3     ...     100        Next Page

1.

SECURING DISPLAYED DATA ON COMPUTING DEVICES

      
Application Number 18402709
Status Pending
Filing Date 2024-01-02
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Khanna, Varun

Abstract

Techniques for securing displayed data on computing devices are disclosed. One example technique includes upon determining that the computing device is unlocked, capturing and analyzing an image in a field of view of the camera of the computing device to determine whether the image includes a human face. In response to determining that the image includes a human face, the technique includes determining facial attributes of the human face in the image via facial recognition and whether the human face is that of an authorized user of the computing device. In response to determining that the human face is not one of an authorized user of the computing device, the technique includes converting user data on the computing device from an original language to a new language to output on a display of the computing device, thereby securing the displayed user data even when the computing device is unlocked.

IPC Classes  ?

  • G06F 21/32 - User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions

2.

SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS

      
Application Number 18109057
Status Pending
Filing Date 2023-02-13
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Karabulut, Emre
  • Pillilli, Bharat S.
  • Bisheh Niasar, Mojtaba

Abstract

Generally discussed herein are devices, systems, and methods for secure cryptographic masking. A method can include generating a first random number, determining a result of the first random number modulo a prime number resulting in a second random number, subtracting the second random number from the prime number resulting in a first subtraction result, adding a private key value to the first subtraction result resulting in a first split, and responsive to determining the private key value is less than the random number, providing the first split and the second random number as splits of the private key.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

3.

ANALOG MAC AWARE DNN IMPROVEMENT

      
Application Number 18400749
Status Pending
Filing Date 2023-12-29
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Kirshenboim, Gilad
  • Sahar, Ran
  • Burger, Douglas C.
  • Refael Kalim, Yehonathan

Abstract

Methods, systems and computer program products are provided for improving performance (e.g., reducing power consumption) of a hardware accelerator (e.g., neural processor) comprising hybrid or analog multiply and accumulate (MAC) processing elements (PEs). Selective variation of the precision of an array of MAC PEs may reduce power consumption of a neural processor. Power may be conserved by dynamically controlling the precision of analog to digital (ADC) output bits for one or more MAC PEs. Dynamic control of ADC output bit precision may be based on precision information determined during training and/or post-training (e.g., quantization) of an artificial intelligence (AI) neural network (NN) model implemented by the neural processor. Precision information may include a range of dynamic precision for each of a plurality of nodes of a computation graph for the AI NN model.

IPC Classes  ?

  • G06F 1/3234 - Power saving characterised by the action undertaken
  • G06F 7/544 - Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using unspecified devices for evaluating functions by calculation
  • G06F 13/10 - Program control for peripheral devices
  • G06N 3/02 - Neural networks

4.

HARDWARE ACCELERATION FOR FUNCTION PROCESSING

      
Application Number 18404705
Status Pending
Filing Date 2024-01-04
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Tandon, Prateek
  • Corell, Brian Jacob

Abstract

A function processing service may receive a request to execute source code. The source code may include instructions to perform a function. The function processing service may determine whether at least one hardware acceleration condition has been satisfied for the function. If at least one hardware acceleration condition has been satisfied, the instructions in the source code may be translated into hardware-specific code corresponding to a hardware circuit. The hardware circuit may be configured based on the hardware-specific code, and the hardware circuit may perform the function. The function processing service may then provide the result obtained from the hardware circuit to the requesting entity.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline, look ahead
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 13/362 - Handling requests for interconnection or transfer for access to common bus or bus system with centralised access control

5.

Access decision management system for digital resources

      
Application Number 17971200
Status Pending
Filing Date 2022-10-20
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Doyle, Darren
  • Farrell, Terry

Abstract

A data processing system implements receiving an access request from the client device of a content requestor to access a content item for which access to the content item is managed by a content access management platform and obtaining access control information. The access control information comprising information associated with a content owner associated with the content item, information associated with the content requestor, and information associated with the content item. The system further implements analyzing the access control information using a first machine learning model trained to analyze the access control information and to output an access determination score, the access determination score representing a level of certainty that the content requestor should be granted access to the content item, determining an automatic access decision to grant or deny the access request based on the access determination score, and notifying the content requestor whether the access request has granted or denied based on the automatic access decision.

IPC Classes  ?

6.

FAST AND EFFICIENT TEXT ONLY ADAPTATION FOR FACTORIZED NEURAL TRANSDUCER

      
Application Number 17983660
Status Pending
Filing Date 2022-11-09
First Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Zhao, Rui
  • Xue, Jian
  • Parthasarathy, Sarangarajan
  • Li, Jinyu

Abstract

Systems and methods are provided for accessing a factorized neural transducer comprising a first set of layers for predicting blank tokens and a second set of layers for predicting vocabulary tokens, the second set of layers comprising a language model that includes a vocabulary predictor which is a separate predictor from the blank predictor, wherein a vocabulary predictor output from the vocabulary predictor and the encoder output are used for predicting a vocabulary token. The second set of layers is selectively modified to facilitate an improvement in an accuracy of the factorized neural transducer in performing automatic speech recognition, the selectively modifying comprising applying a particular modification to the second set of layers while refraining from applying the particular modification to the first set of layers.

IPC Classes  ?

  • G10L 15/16 - Speech classification or search using artificial neural networks
  • G10L 15/06 - Creation of reference templates; Training of speech recognition systems, e.g. adaptation to the characteristics of the speaker's voice
  • G10L 15/197 - Probabilistic grammars, e.g. word n-grams
  • G10L 15/22 - Procedures used during a speech recognition process, e.g. man-machine dialog

7.

DEVELOPMENT-TIME CONFIGURATION CHANGE RECOMMENDATION USING DEPLOYMENT TEMPLATES

      
Application Number 17973416
Status Pending
Filing Date 2022-10-24
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Beg, Mirza Shadab
  • Nasir, Faisal
  • Gray, Damon
  • Shaheen, Eman Helmy Morsy
  • Beneson, Robert
  • Mallick, Nevedita

Abstract

Techniques are described herein that are capable of providing a development-time configuration change recommendation using deployment templates. During development of a software program, a proposed configuration of the software program is identified. A reference configuration defined by a reference template is determined based on a similarity between the proposed configuration and the reference configuration. A determination is made that the proposed configuration has an attribute having a first value corresponding to a first cost. A determination is made that the reference configuration has the attribute having a second value corresponding to a second cost. During the development of the software program, an action is performed, including causing a recommendation to be provided via a user interface, based at least on the second cost being less than the first cost. The recommendation recommends changing the attribute of the proposed configuration to have the second value in lieu of the first value.

IPC Classes  ?

8.

ENTITY SELECTION AND RANKING USING DISTRIBUTION SAMPLING

      
Application Number 18048428
Status Pending
Filing Date 2022-10-19
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Fang, Liyan
  • Hatch, Andrew O.
  • Liang, Keqing
  • Wei, Yafei
  • Saha, Ankan

Abstract

Embodiments of the disclosed technologies include generating a reward score for an entity. A rate distribution is determined using the reward score and a number of times the entity has been selected for ranking. A sampled rate value is generated by sampling the rate distribution. A probability score is generated for a pair of the entity and a user based on the sampled rate value. A probability distribution is determined using the probability score. A sampled probability value is generated by sampling the probability distribution. A machine learning model is trained using the sampled probability value.

IPC Classes  ?

9.

SYSTEMS AND METHODS FOR ROUTING DATA PACKET IN A UNIFIED WIDE AREA NETWORK

      
Application Number 18101291
Status Pending
Filing Date 2023-01-25
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Mattes, Paul David
  • Krishnaswamy, Umesh
  • Abeln, John Michael
  • Kothari, Sonal
  • C. Bissonnette, Paul-Andre
  • Reddy, Pappula Prabhakar
  • Raj, Himanshu

Abstract

A method and a network for routing data packet in a unified wide area network (WAN) is provided. The method includes encapsulating a data packet by an ingress aggregation router and forwarding the encapsulated data packet to an ingress backbone router. The encapsulated data packet includes a first label. The ingress backbone router selects an optimized traffic engineered tunnel and replaces the first label with the optimized traffic engineered tunnel and forwards the encapsulated data packet along the optimized traffic engineered tunnel.

IPC Classes  ?

  • H04L 47/125 - Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
  • H04L 45/00 - Routing or path finding of packets in data switching networks
  • H04L 45/50 - Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]

10.

COMPUTING DEVICE COMPONENT ATTACHMENT

      
Application Number 18048637
Status Pending
Filing Date 2022-10-20
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Lee, Jaejin
  • Kim, Donghwi

Abstract

A computing device configured to removably attach a component comprises a housing comprising first and second device electromagnets. A wireless charging transmitting antenna is between the electromagnets. Instructions are executable by a processor to synchronize a first device current through the first device electromagnet with a first component current through a first component electromagnet of the component to attract the electromagnets, and to synchronize a second device current through the second device electromagnet with a second component current through a second component electromagnet of the component to attract the electromagnets.

IPC Classes  ?

  • H02J 50/00 - Circuit arrangements or systems for wireless supply or distribution of electric power
  • G06F 1/16 - Constructional details or arrangements
  • H01F 7/02 - Permanent magnets
  • H01F 7/06 - Electromagnets; Actuators including electromagnets
  • H02J 7/00 - Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
  • H02J 50/10 - Circuit arrangements or systems for wireless supply or distribution of electric power using inductive coupling
  • H02J 50/20 - Circuit arrangements or systems for wireless supply or distribution of electric power using microwaves or radio frequency waves
  • H02J 50/90 - Circuit arrangements or systems for wireless supply or distribution of electric power involving detection or optimisation of position, e.g. alignment

11.

DATA VISIBILITY FOR NESTED TRANSACTIONS IN DISTRIBUTED SYSTEMS

      
Application Number 18400870
Status Pending
Filing Date 2023-12-29
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Singh, Sarvesh
  • Halverson, Alan Dale
  • Lingam, Sandeep
  • Rangarajan, Srikumar

Abstract

Methods for data visibility in nested transactions in distributed systems are performed by systems and devices. Distributed executions of queries are performed in processing systems according to isolation level protocols with unique nested transaction identifiers for data management and versioning across one or more data sets, one or more compute pools, etc., within a logical server via a single transaction manager that oversees the isolation semantics and data versioning. A distributed query processor of the systems and devices performs nested transaction versioning for distributed tasks by generating nested transaction identifiers, encoded in data rows, which are used to enforce correct data visibility. Data visibility is restricted to previously committed data from distributed transactions and tasks, and is blocked for distributed transactions and tasks that run concurrently. Local commits for completed transactions and tasks are used to minimize transaction manager interactions, and instant rollbacks are enabled for aborted transactions and tasks.

IPC Classes  ?

  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • G06F 9/46 - Multiprogramming arrangements
  • G06F 16/901 - Indexing; Data structures therefor; Storage structures

12.

Multi-Layer Kernel with Varied Privilege

      
Application Number 17970858
Status Pending
Filing Date 2022-10-20
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Shivaganga Nagaraju, Gangadhara Swamy
  • Chitnis, Pushkar Vijay
  • Cui, Weidong
  • Zhou, Ziqiao

Abstract

A computer implemented method includes loading a first kernel layer having a first privilege level onto a hosting environment. A second kernel layer having a second privilege level different from the first privilege level is also loaded onto the hosting environment. The first kernel layer is isolated from the second kernel layer and access to a hosting environment memory protection table is controlled via the first kernel layer.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

13.

Three-Dimensional Object Detection

      
Application Number 18274679
Status Pending
Filing Date 2022-02-08
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Zhang, Zheng
  • Hu, Han
  • Cao, Yue
  • Tong, Xin
  • Liu, Ze

Abstract

According to implementations of the subject matter described herein, a solution is proposed for three-dimensional (3D) object detection. In this solution, feature representations of a plurality of points are extracted from point cloud data related to a 3D object. Initial feature representations of a set of candidate 3D objects are determined based on the feature representations of the plurality of points. Based on the feature representations of the plurality of points and the initial feature representations of the set of candidate 3D objects, a detection result for the 3D object is generated by determining self-correlations between the set of candidate 3D objects and cross-correlations between the plurality of points and the set of candidate 3D objects. In this way, without grouping points into candidate 3D objects, the 3D object in a 3D scene can be localized and recognized based on the self-correlations and cross-correlations.

IPC Classes  ?

  • G06T 7/73 - Determining position or orientation of objects or cameras using feature-based methods
  • G06T 7/62 - Analysis of geometric attributes of area, perimeter, diameter or volume
  • G06T 7/90 - Determination of colour characteristics
  • G06T 17/00 - 3D modelling for computer graphics
  • G06V 10/44 - Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components
  • G06V 20/64 - Three-dimensional objects

14.

DISTRIBUTED WORKLOAD REASSIGNMENT FOLLOWING COMMUNICATION FAILURE

      
Application Number 18402400
Status Pending
Filing Date 2024-01-02
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Kruse, David
  • Zhu, Qibo
  • Dion, David
  • Petter, Vladimir
  • Koppolu, Lokesh Srinivas

Abstract

A generation identifier is employed with various systems and methods in order to identify situations where a workload has been reassigned to a new node and where a workload is still being processed by an old node during a failure between nodes. A master node may assign a workload to a worker node. The worker node sends a request to access target data. The request may be associated with a generation identifier and workload identifier that identifies the node and workload. At some point, a failure occurs between the master node and worker node. The master node reassigns the workload to another worker node. The new worker node accesses the target data with a different generation identifier, indicating to the storage system that the workload has been reassigned. The old worker node receives an indication from the storage system that the workload has been reassigned and stops processing the workload.

IPC Classes  ?

  • H04L 43/00 - Arrangements for monitoring or testing data switching networks
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/52 - Program synchronisation; Mutual exclusion, e.g. by means of semaphores
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 16/176 - Support for shared access to files; File sharing support
  • G06F 16/182 - Distributed file systems
  • H04L 67/1001 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
  • H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
  • H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection

15.

SYSTEMS AND METHODS FOR RETIRING IN MULTI-STREAM DATA MOVEMENT

      
Application Number 17971523
Status Pending
Filing Date 2022-10-20
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Luo, Yi
  • Xi, Jinwen
  • Zuo, Xuan
  • Zhu, Haishan
  • Chung, Eric Sen

Abstract

A hardware retire circuit includes: one or more input queues, each queue corresponding to an input stream of tasks and being configured to store input task identifiers corresponding to tasks of the input stream; and processing logic configured to: receive a completed task event; determine whether a completed task queue identifier and a completed task identifier of the completed task event match an input task identifier of an input task at a head of an input queue having an input queue identifier corresponding to the completed task queue identifier; and in response to determining a match, pop the task at the head of the input queue and output a task retirement event corresponding to the input task.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline, look ahead

16.

INTERACTIVE CONCEPT EDITING IN COMPUTER-HUMAN INTERACTIVE LEARNING

      
Application Number 18527104
Status Pending
Filing Date 2023-12-01
First Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Simard, Patrice Y.
  • Grangier, David G.
  • Bottou, Leon
  • Amershi, Saleema A.

Abstract

A collection of data that is extremely large can be difficult to search and/or analyze. Relevance may be dramatically improved by automatically classifying queries and web pages in useful categories, and using these classification scores as relevance features. A thorough approach may require building a large number of classifiers, corresponding to the various types of information, activities, and products. Creation of classifiers and schematizers is provided on large data sets. Exercising the classifiers and schematizers on hundreds of millions of items may expose value that is inherent to the data by adding usable meta-data. Some aspects include active labeling exploration, automatic regularization and cold start, scaling with the number of items and the number of classifiers, active featuring, and segmentation and schematization.

IPC Classes  ?

  • G06F 40/242 - Dictionaries
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 16/951 - Indexing; Web crawling techniques
  • G06F 40/30 - Semantic analysis
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks
  • G06N 20/00 - Machine learning
  • H04L 1/00 - Arrangements for detecting or preventing errors in the information received

17.

METADATA ENHANCEMENT FOR PACKET CAPTURE USING VXLAN ENCAPSULATION

      
Application Number 17970484
Status Pending
Filing Date 2022-10-19
First Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Khetani, Darshil Jashvant
  • Barakat, Hassan Ali Hussein
  • Al-Damluji, Salem Amin

Abstract

Techniques are disclosed for capturing network traffic in a computing environment comprising a plurality of computing devices. Data packets to be captured are encapsulated within a Virtual Extensible Local Area Network (VXLAN) session. A reserved bit in a header of the encapsulated packet is set to indicate the encapsulated packet includes metadata pertaining to the data traffic to be captured.

IPC Classes  ?

18.

MEASURING PROBABILITY OF INFLUENCE USING MULTI-DIMENSIONAL STATISTICS ON DEEP LEARNING EMBEDDINGS

      
Application Number 18049598
Status Pending
Filing Date 2022-10-24
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Tveit, Amund
  • Solonko, Kateryna
  • Hranj, Zoran
  • Werpachowski, Aleksander
  • Werpachowski, Roman
  • Bonyadi, Mohammadreza
  • Iyer, Arun Shankar

Abstract

The disclosure herein describes a system for measuring probability of influence in digital communications to determine if communication content originated in a person's own prior knowledge or new information more recently obtained from interaction with communications of others. An estimated probability a new communication by a first user comes from the same distribution as prior communications of the first user are generated using multidimensional statistics on embeddings representing the communications. A second estimated probability that the new communication comes from the same distribution as communication(s) of a second user that were accessible to the first user are generated. If the second probability is greater than the first probability, the new communication is more likely influenced by exposure of the first user to the second user's communications rather than the first user's own historical knowledge. An influence attribution recommendation is generated, including an influence attribution or other recommended action.

IPC Classes  ?

19.

SUPERPOSITION-BASED CONTENT SERVING

      
Application Number 17972408
Status Pending
Filing Date 2022-10-23
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Cai, Tao
  • Hwang, Albert
  • Zhang, Jianlong
  • Khan, Muhammad Hassan

Abstract

Embodiments of the disclosed technologies receive a request including a user identifier and metadata associated with a slot available at a user system, remove the user identifier from the request to produce anonymized request data, receive, from a machine learning model, superposition data that correlates with the anonymized request data, send the superposition data for the anonymized request data to a real-time content-to-request matching process, receive, from the real-time content-to-request matching process, an identifier that identifies a content distribution selected based on the superposition data, and initiate the selected content distribution through the network to the slot in response to the request.

IPC Classes  ?

20.

SYSTEMS AND METHODS FOR IMMERSION COOLING WITH SUBCOOLED SPRAY

      
Application Number 18403581
Status Pending
Filing Date 2024-01-03
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Peterson, Eric C.
  • Alissa, Husam Atallah
  • Ramakrishnan, Bharath

Abstract

A thermal management system for cooling electronics includes an immersion tank, a working fluid in the immersion tank, a heat exchanger, a first fluid conduit, and a second fluid conduit. The heat exchanger is configured to transfer thermal energy from the working fluid to ambient air to cool the working fluid. The first fluid conduit provides fluid communication from the immersion tank to the heat exchanger, and the second fluid conduit provides fluid communication from the heat exchanger to a spray nozzle to spray working fluid into the immersion tank.

IPC Classes  ?

  • H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating

21.

Processing of Queries using a Consolidated Matching Architecture

      
Application Number 17966812
Status Pending
Filing Date 2022-10-15
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Jiao, Jian
  • Manavoglu, Eren

Abstract

A query-processing technique includes an operation of matching the input query against a plurality of candidate target items, to produce a set of candidate query-item pairings. The matching is applicable to different classes of matching, but is performed by a computer processing architecture that uses a class-agnostic instance of query-processing logic and a class-agnostic target item index. After the matching operation, the technique assigns a matching class to each candidate query-item pairing in the set of candidate query-item pairings, to produce a set of classified pairings. The technique ultimately serves a particular output item to an end user, where the particular output item is chosen based on the results of the matching and assigning. Some implementations of the technique include a filtering operation whereby the candidate-item pairings are filtered to conform to a specified selection strategy or strategies. This filtering operation supplements or replaces the assigning operation.

IPC Classes  ?

  • G06Q 30/02 - Marketing; Price estimation or determination; Fundraising
  • G06F 16/951 - Indexing; Web crawling techniques

22.

TRANSPORT LAYER SECURITY COMPUTER DEVICES AND METHODS

      
Application Number 18066383
Status Pending
Filing Date 2022-12-15
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Vaswani, Kapil
  • Jayashankar, Siddharth
  • Delignat-Lavaud, Antoine
  • Fournet, Cedric Alain Marie Christophe

Abstract

A computer device instantiates a first Transport Layer Security (TLS) endpoint having access to a trusted execution environment (TEE) of the processor; generates in the TEE in an endpoint-specific public-private key pair bound to the first TLS endpoint; generates of attestation data verifying that the endpoint-specific public-private key pair was generated in the TEE and is bound to the first TLS endpoint; and signs the attestation data in the TEE using a TEE private key securely embedded in the processor. The device generates a TEE signature using an endpoint-specific private key of an endpoint-specific public-private key pair; and indicates of the attestation data, an endpoint-specific public key of the endpoint-specific public public-private key pair and the TEE signature to a second TLS endpoint within a TLS handshake message exchange between the first TLS endpoint and the second TLS endpoint.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

23.

METADATA ENHANCEMENT FOR PACKET CAPTURE USING VXLAN ENCAPSULATION

      
Application Number US2023031926
Publication Number 2024/085961
Status In Force
Filing Date 2023-09-02
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Khetani, Darshil Jashvant
  • Barakat, Hassan Ali Hussein
  • Al-Damluji, Salem Amin

Abstract

Techniques are disclosed for capturing network traffic in a computing environment comprising a plurality of computing devices. Data packets to be captured are encapsulated within a Virtual Extensible Local Area Network (VXLAN) session. A reserved bit in a header of the encapsulated packet is set to indicate the encapsulated packet includes metadata pertaining to the data traffic to be captured.

IPC Classes  ?

  • H04L 43/022 - Capturing of monitoring data by sampling
  • H04L 43/20 - Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV

24.

SYSTEMS AND METHODS FOR RETIRING IN MULTI-STREAM DATA MOVEMENT

      
Application Number US2023031928
Publication Number 2024/085963
Status In Force
Filing Date 2023-09-02
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Luo, Yi
  • Xi, Jinwen
  • Zuo, Xuan
  • Zhu, Haishan
  • Chung, Eric Sen

Abstract

A hardware retire circuit includes: one or more input queues, each queue corresponding to an input stream of tasks and being configured to store input task identifiers corresponding to tasks of the input stream; and processing logic configured to: receive a completed task event; determine whether a completed task queue identifier and a completed task identifier of the completed task event match an input task identifier of an input task at a head of an input queue having an input queue identifier corresponding to the completed task queue identifier; and in response to determining a match, pop the task at the head of the input queue and output a task retirement event corresponding to the input task.

IPC Classes  ?

25.

TRANSPORT LAYER SECURITY COMPUTER DEVICES AND METHODS

      
Application Number US2023031927
Publication Number 2024/085962
Status In Force
Filing Date 2023-09-02
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Vaswani, Kapil
  • Jayashankar, Siddharth
  • Delignat-Lavaud, Antoine
  • Fournet, Cedric Alain Marie Christophe

Abstract

A computer device instantiates a first Transport Layer Security (TLS) endpoint having access to a trusted execution environment (TEE) of the processor; generates in the TEE in an endpoint-specific public-private key pair bound to the first TLS endpoint; generates of attestation data verifying that the endpoint-specific public-private key pair was generated in the TEE and is bound to the first TLS endpoint; and signs the attestation data in the TEE using a TEE private key securely embedded in the processor. The device generates a TEE signature using an endpoint-specific private key of an endpoint-specific public-private key pair; and indicates of the attestation data, an endpoint-specific public key of the endpoint-specific public public-private key pair and the TEE signature to a second TLS endpoint within a TLS handshake message exchange between the first TLS endpoint and the second TLS endpoint.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

26.

COMPUTING DEVICE COMPONENT ATTACHMENT

      
Application Number US2023031935
Publication Number 2024/085965
Status In Force
Filing Date 2023-09-03
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Lee, Jaejin
  • Kim, Donghwi

Abstract

A computing device configured to removably attach a component comprises a housing comprising first and second device electromagnets. A wireless charging transmitting antenna is between the electromagnets. Instructions are executable by a processor to synchronize a first device current through the first device electromagnet with a first component current through a first component electromagnet of the component to attract the electromagnets, and to synchronize a second device current through the second device electromagnet with a second component current through a second component electromagnet of the component to attract the electromagnets.

IPC Classes  ?

  • H02J 50/00 - Circuit arrangements or systems for wireless supply or distribution of electric power
  • H02J 50/90 - Circuit arrangements or systems for wireless supply or distribution of electric power involving detection or optimisation of position, e.g. alignment

27.

DYNAMICALLY UPDATING FIRMWARE PROFILE CONFIGURATIONS ON COMPUTING DEVICES

      
Application Number US2023031934
Publication Number 2024/085964
Status In Force
Filing Date 2023-09-03
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Xie, Daini
  • Chen, Wen-Ho
  • Chou, Yuwen

Abstract

The present disclosure relates to utilizing a firmware configuration system to efficiently update a firmware profile configuration of computing devices (e.g., host devices in a datacenter). For example, the firmware configuration system facilitates updating the firmware profile configuration, such as for a Unified Extensible Firmware Interface (UEFI) profile and/or a Basic Input/Output System (BIOS), without needing to develop, deploy, and install a new BIOS. More specifically, the firmware configuration system updates (e.g., via a baseband management controller) firmware profile configurations by modifying a profile configuration table in flash memory (i.e., on an SPI flash-based chip) of a BIOS with a firmware profile configuration update patch and without affecting other parts of the BIOS.

IPC Classes  ?

  • G06F 8/654 - Updates using techniques specially adapted for alterable solid state memories, e.g. for EEPROM or flash memories
  • G06F 9/4401 - Bootstrapping
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

28.

SIMPLIFIED MASKING FOR SIGNED CRYPTOGRAPHY OPERATIONS

      
Application Number US2023031937
Publication Number 2024/085967
Status In Force
Filing Date 2023-09-03
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Karabulut, Emre
  • Pillilli, Bharat S.
  • Bisheh Niasar, Mojtaba

Abstract

Generally discussed herein are devices, systems, and methods for secure cryptographic masking. A method can include generating a first random number, determining a result of the first random number modulo a prime number resulting in a second random number, subtracting the second random number from the prime number resulting in a first subtraction result, adding a private key value to the first subtraction result resulting in a first split, and responsive to determining the private key value is less than the random number, providing the first split and the second random number as splits of the private key.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

29.

ACCESS DECISION MANAGEMENT SYSTEM FOR DIGITAL RESOURCES

      
Application Number US2023031936
Publication Number 2024/085966
Status In Force
Filing Date 2023-09-03
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Doyle, Darren
  • Farrell, Terry

Abstract

A data processing system implements receiving an access request from the client device to access a content item for which access to the content item is managed by a content access management platform and obtaining access control information. The access control information comprising information associated with a content owner associated with the content item, information associated with the content requestor, and information associated with the content item. The system further implements analyzing the access control information using a machine learning model trained to analyze the access control information and to output an access determination score representing a level of certainty that the content requestor should be granted access to the content item, determining an automatic access decision to grant or deny the access request based on the access determination score, and notifying the content requestor whether the access request has granted or denied based on the automatic access decision.

IPC Classes  ?

30.

FAST AND EFFICIENT TEXT ONLY ADAPTATION FOR FACTORIZED NEURAL TRANSDUCER

      
Application Number US2023031795
Publication Number 2024/085954
Status In Force
Filing Date 2023-09-01
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Zhao, Rui
  • Xue, Jian
  • Parthasarathy, Sarangarajan
  • Li, Jinyu

Abstract

Systems and methods are provided for accessing a factorized neural transducer comprising a first set of layers for predicting blank tokens and a second set of layers for predicting vocabulary tokens, the second set of layers comprising a language model that includes a vocabulary predictor which is a separate predictor from the blank predictor, wherein a vocabulary predictor output from the vocabulary predictor and the encoder output are used for predicting a vocabulary token. The second set of layers is selectively modified to facilitate an improvement in an accuracy of the factorized neural transducer in performing automatic speech recognition, the selectively modifying comprising applying a particular modification to the second set of layers while refraining from applying the particular modification to the first set of layers.

IPC Classes  ?

  • G10L 15/16 - Speech classification or search using artificial neural networks
  • G10L 15/065 - Adaptation
  • G10L 15/183 - Speech classification or search using natural language modelling using context dependencies, e.g. language models
  • G10L 15/197 - Probabilistic grammars, e.g. word n-grams
  • G06N 3/045 - Combinations of networks

31.

TEMPORAL AND SPATIAL COHERENCE IN RAY TRACING

      
Application Number US2023033332
Publication Number 2024/085991
Status In Force
Filing Date 2023-09-21
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Fuller, Martin Jon Irwin

Abstract

A ray trace operation includes tracing a ray from an origin point in accordance with a ray path into a virtual environment (where the virtual environment comprises one or more virtual objects defined by one or more object components) and determining an intersected object component of the one or more object components that the ray intersects with. Determining the intersected object component comprises accessing (i) ray trace temporal coherence data based upon a preceding ray trace operation that temporally precedes the ray trace operation or (ii) ray trace spatial coherence data based upon a spatially proximate ray trace operation.

IPC Classes  ?

32.

MODEL CAPABILITY EXTRACTION

      
Application Number US2023033331
Publication Number 2024/085990
Status In Force
Filing Date 2023-09-21
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Zorn, Benjamin Goth
  • Negreanu, Carina Suzana
  • Toronto, Neil Blunt
  • Slininger, Brian Paul
  • Gordon, Andrew Donald
  • Sarkar, Advait
  • Nouri, Elnaz
  • Le, Vu Minh
  • Poelitz, Christian Leopold Bejamin
  • Barke, Shraddha Govind
  • Ragavan, Sruti Srinivasa

Abstract

The indirect querying of models to determine capabilities possessed by the model. Such indirect queries take the form of model input that potentially includes a natural language input user data. Such model input is structured such that the output of the model is either not natural language at all, or else is natural language that is not semantically responsive to the natural language input. Nevertheless, the output is evaluated to estimate or determine the capability possessed by the model. Thus, models may be more fully utilized to their better potential.

IPC Classes  ?

33.

CAMERA SYSTEMS FOR OPERATING IN MULTIPLE OPTICAL CHANNELS

      
Application Number US2023032448
Publication Number 2024/085976
Status In Force
Filing Date 2023-09-11
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Bamji, Cyrus Soli
  • Akkaya, Onur Can
  • Ortiz Egea, Sergio

Abstract

Indirect time-of-flight camera systems for operating in multiple optical channels using active modulated light and accompanying methods of operation are provided. In one aspect, the indirect time-of-flight camera system includes first and second modulatable laser sources outputting light of different wavelengths for illuminating a target environment. The camera system further includes a wavelength-selective reflective element designed to reflect the light of a first wavelength and to transmit the light of a second wavelength. The camera system further includes a controller comprising instructions executable to control the camera system to, in a first time period, activate the first modulatable laser source and deactivate the second modulatable laser source, and in a second time period, deactivate the first modulatable laser source and activate the second modulatable laser source. The camera system further includes a photosensor for receiving the light outputted by the first and second modulatable laser sources.

IPC Classes  ?

  • G01S 7/481 - Constructional features, e.g. arrangements of optical elements
  • G01S 17/894 - 3D imaging with simultaneous measurement of time-of-flight at a 2D array of receiver pixels, e.g. time-of-flight cameras or flash lidar
  • G01S 17/36 - Systems determining position data of a target for measuring distance only using transmission of continuous waves, whether amplitude-, frequency-, or phase-modulated, or unmodulated with phase comparison between the received signal and the contemporaneously transmitted signal

34.

SYSTEMS AND METHODS FOR ROUTING DATA PACKET IN A UNIFIED WIDE AREA NETWORK

      
Application Number US2023033319
Publication Number 2024/085988
Status In Force
Filing Date 2023-09-21
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Mattes, Paul David
  • Krishnaswamy, Umesh
  • Abeln, John Michael
  • Kothari, Sonal
  • C. Bissonnette, Paul-Andre
  • Reddy, Pappula Prabhakar
  • Raj, Himanshu

Abstract

A method and a network for routing data packet in a unified wide area network (WAN) is provided. The method includes encapsulating a data packet by an ingress aggregation router and forwarding the encapsulated data packet to an ingress backbone router. The encapsulated data packet includes a first label. The ingress backbone router selects an optimized traffic engineered tunnel and replaces the first label with the optimized traffic engineered tunnel and forwards the encapsulated data packet along the optimized traffic engineered tunnel.

IPC Classes  ?

  • H04L 12/46 - Interconnection of networks
  • H04L 45/02 - Topology update or discovery
  • H04L 45/50 - Routing or path finding of packets in data switching networks using label swapping, e.g. multi-protocol label switch [MPLS]
  • H04L 45/645 - Splitting route computation layer and forwarding layer, e.g. routing according to path computational element [PCE] or based on OpenFlow functionality
  • H04L 45/80 - Ingress point selection by the source endpoint, e.g. selection of ISP or POP

35.

JOINT ACOUSTIC ECHO CANCELLATION (AEC) AND PERSONALIZED NOISE SUPPRESSION (PNS)

      
Application Number US2023033316
Publication Number 2024/085986
Status In Force
Filing Date 2023-09-21
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Eskimez, Sefik Emre
  • Yoshioka, Takuya
  • Wang, Huaming
  • Ju, Alex Chenzhi
  • Tang, Min
  • Pärnamaa, Tanel

Abstract

A data processing system implements receiving a far-end signal associated with a first computing device participating in an online communication session and receiving a near-end signal associated with a second computing device participating in the online communication session. The near-end signal includes speech of a target speaker, a first interfering speaker, and an echo signal. The system further implements providing the far-end signal, the near-end signal, and an indication of the target speaker as an input to a machine learning model. The machine learning model trained to analyze the far-end signal and the near-end signal to perform personalized noise suppression (PNS) to remove speech from one or more interfering speakers and acoustic echo cancellation (AEC) to remove echoes. The model is trained to output an audio signal comprising speech of the target speaker. The system obtains the audio signal comprising the speech of the target speaker from the model.

IPC Classes  ?

36.

HINGED DEVICE

      
Application Number CN2022125873
Publication Number 2024/082128
Status In Force
Filing Date 2022-10-18
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Lau, Tung Yuen
  • Yaremenko, Denys V.
  • Zhang, Jingjiang
  • Hu, Zike
  • Park, Daniel C.
  • Witt, Eric
  • Caplow-Munro, Devin
  • Tomky, Brett

Abstract

The description relates to hinged devices, such as hinged computing devices. One example can include a first portion secured to a first hinge arm that is configured to rotate around a first hinge axis and a second portion secured to a second hinge arm that is configured to rotate around a second hinge axis. A timing shuttle can be positioned on a central shaft that is located between the first hinge axis and the second hinge axis and is configured to control a frictional torque experienced by the first and second hinge arms depending upon orientation of the first and second hinge arms and to synchronize rotation of the first and second hinge arms around the first and second hinge axes.

IPC Classes  ?

  • G06F 1/16 - Constructional details or arrangements
  • H04M 1/02 - Constructional features of telephone sets

37.

ENRICHING EXPOSED CREDENTIAL SEARCH RESULTS TO MAKE THEM ACTIONABLE

      
Application Number US2023031803
Publication Number 2024/085956
Status In Force
Filing Date 2023-09-01
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Fanning, Michael Christopher
  • Mukherjee, Suvam
  • Czerwonka, Jacek Andrzej
  • Faucon, Christopher Michael Henry
  • Okada Nakamura, Eddy Toshiyuki
  • Gonzalez, Danielle Nicole
  • Couraud, Nicolas Yves
  • Maclellan, Alison Lynne

Abstract

Techniques for (i) using contextual information associated with an exposed credential to identify a resource that could be accessed using the exposed credential, (ii) identifying a responsible entity of that resource, and (iii) alerting the responsible entity about the exposed credential are disclosed. A credential is determined to be in an exposed state. The exposed credential, if used, could potentially provide an actor access to a resource, despite the fact that the actor should not have access to the resource. The exposed credential is analyzed to determine a context. Based on that context, the resource is identified. A responsible entity associated with the resource is identified. An alert is then sent to that entity.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

38.

TRANSPOSING MATRICES BASED ON A MULTI-LEVEL CROSSBAR

      
Application Number US2023031809
Publication Number 2024/085960
Status In Force
Filing Date 2023-09-01
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Choi, Jinhang
  • Zhu, Haishan
  • Luo, Yi
  • Chung, Eric S.

Abstract

Embodiments of the present disclosure include systems and methods for transposing matrices based on a multi-level crossbar. A system may include a memory configured to store a matrix comprising a plurality of elements arranged in a set of rows and a set of columns. A system may include an input buffer configured to retrieve a subset of a plurality of elements from the memory. Each element in the subset of the plurality of elements is retrieved from a different column in the matrix. A system may include a multi-level crossbar configured to perform a transpose operation on the subset of the plurality of elements. A system may include an output buffer configured to receive the transposed subset of the plurality of elements and store, in the memory, each element in the transposed subset of the plurality of elements in a different column in the matrix.

IPC Classes  ?

  • G06F 7/78 - Arrangements for rearranging, permuting or selecting data according to predetermined rules, independently of the content of the data for changing the order of data flow, e.g. matrix transposition or LIFO buffers; Overflow or underflow handling therefor

39.

TRANSPOSING MATRICES BASED ON A MULTI-LEVEL CROSSBAR

      
Application Number 17970517
Status Pending
Filing Date 2022-10-19
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Choi, Jinhang
  • Zhu, Haishan
  • Luo, Yi
  • Chung, Eric S.

Abstract

Embodiments of the present disclosure include systems and methods for transposing matrices based on a multi-level crossbar. A system may include a memory configured to store a matrix comprising a plurality of elements arranged in a set of rows and a set of columns. A system may include an input buffer configured to retrieve a subset of a plurality of elements from the memory. Each element in the subset of the plurality of elements is retrieved from a different column in the matrix. A system may include a multi-level crossbar configured to perform a transpose operation on the subset of the plurality of elements. A system may include an output buffer configured to receive the transposed subset of the plurality of elements and store, in the memory, each element in the transposed subset of the plurality of elements in a different column in the matrix.

IPC Classes  ?

  • G06F 3/06 - Digital input from, or digital output to, record carriers

40.

DYNAMICALLY UPDATING FIRMWARE PROFILE CONFIGURATIONS ON COMPUTING DEVICES

      
Application Number 17971405
Status Pending
Filing Date 2022-10-20
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Xie, Daini
  • Chen, Wen-Ho
  • Chou, Yuwen

Abstract

The present disclosure relates to utilizing a firmware configuration system to efficiently update a firmware profile configuration of computing devices (e.g., host devices in a datacenter). For example, the firmware configuration system facilitates updating the firmware profile configuration, such as for a Unified Extensible Firmware Interface (UEFI) profile and/or a Basic Input/Output System (BIOS), without needing to develop, deploy, and install a new BIOS. More specifically, the firmware configuration system updates (e.g., via a baseband management controller) firmware profile configurations by modifying a profile configuration table in flash memory (i.e., on an SPI flash-based chip) of a BIOS with a firmware profile configuration update patch and without affecting other parts of the BIOS.

IPC Classes  ?

41.

BUILDING ANNOTATED MODELS BASED ON EYES-OFF DATA

      
Application Number 17972548
Status Pending
Filing Date 2022-10-23
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Levitan, David Benjamin
  • Sim, Robert Alexander
  • Mcanallen, Julia S.
  • Inan, Huseyin Atahan
  • Kumar, Girish
  • Yue, Xiang

Abstract

Systems and methods are directed to building annotated models based on eyes-off data. Specifically, a synthetic data generation model is trained and used to further train a target model. The synthetic data generation model is trained within an eyes-off environment using an anonymity technique on confidential data. The synthetic data generation model is then used to create synthetic data that closely represents the confidential data but without any specific details that can be linked back to the confidential data. The synthetic data is then annotated and used to train the target model within an eyes-on environment. Subsequently, the target model is deployed back within the eyes-off environment to classify the confidential data.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06N 20/00 - Machine learning

42.

OPTIMIZING INTELLIGENT THRESHOLD ENGINES IN MACHINE LEARNING OPERATIONS SYSTEMS

      
Application Number 18046489
Status Pending
Filing Date 2022-10-13
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Boue, Laurent
  • Rama, Kiran

Abstract

A sample of data, including a risk factor, is selected by a machine learning (ML) model of an extreme value theory (EVT) mechanism. A threshold is determined by the ML model based on the risk factor, an outlier score is generated for the sample, and the outlier score is compared to the threshold. The sample is identified as anomalous based on the generated outlier score being greater than the threshold. A schema comprising results of an investigation into the sample and the risk factor is updated based on the received schema.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

43.

ENTITY SELECTION AND RANKING USING DISTRIBUTION SAMPLING

      
Application Number 18048410
Status Pending
Filing Date 2022-10-19
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Wei, Yafei
  • Hatch, Andrew O.
  • Liang, Keqing
  • Fang, Liyan
  • Saha, Ankan

Abstract

Embodiments of the disclosed technologies include generating a reward score for an entity. A rate distribution is determined using the reward score. A sampled rate value is generated by sampling the rate distribution. A probability score is generated for a pair of the entity and a user using the sampled rate value. A probability distribution is determined using the probability score. A sampled probability value is generated by sampling the probability distribution. A machine learning model is trained using the sampled probability value.

IPC Classes  ?

  • G06N 20/00 - Machine learning
  • G06K 9/62 - Methods or arrangements for recognition using electronic means

44.

DETECTING AND MITIGATING SIDE CHANNEL ATTACKS WITH RAZOR-FLOPS

      
Application Number 17973471
Status Pending
Filing Date 2022-10-24
First Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Pillilli, Bharat S.
  • Kelly, Bryan David
  • Soni, Vishal

Abstract

The techniques disclosed herein are directed to devices, circuits, systems, and techniques to mitigate the impact of side-channel attacks on a cryptography function in a target system. The Razor flip-flops are inserted into critical paths of the cryptography function of the target system, including at rest blocks such as key vaults and data vaults, and also including registers and/or pipelines used for calculations within the cryptography functions. Errors detected by the Razor flip-flops are processed by error detection logic in the cryptographic function, which continues the calculations until completion. The generated key and data value pairs resulting from detected errors are discarded, silently ignored without disrupting the calculation process. The schemes disclosed herein mitigate the impact of side-channel attacks with a digital logic based implementation, with reduced complexity and reduced cost.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • G01R 31/3181 - Functional testing
  • H04L 9/08 - Key distribution

45.

SOURCE CODE PATCH GENERATION WITH RETRIEVAL-AUGMENTED TRANSFORMER

      
Application Number 17966572
Status Pending
Filing Date 2022-10-14
First Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC. (USA)
Inventor
  • Bakshi, Amandeep Singh
  • Shi, Xin
  • Sundaresan, Neelakantan
  • Svyatkovskiy, Alexey

Abstract

A source code patch generation system uses the context of a buggy source code snippet of a source code program and a hint to predict a source code segment that repairs the buggy source code snippet. The hint is a source code segment that is semantically-similar to the buggy source code snippet where the similarity is based on a context of the buggy source code snippet. An autoregressive deep learning model uses the context of the buggy source code snippet and the hint to predict the most likely source code segment to repair the buggy source code snippet.

IPC Classes  ?

46.

MODEL CAPABILITY EXTRACTION

      
Application Number 17969922
Status Pending
Filing Date 2022-10-19
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Zorn, Benjamin Goth
  • Negreanu, Carina Suzana
  • Toronto, Neil Blunt
  • Slininger, Brian Paul
  • Gordon, Andrew Donald
  • Sarkar, Advait
  • Nouri, Elnaz
  • Le, Vu Minh
  • Poelitz, Christian Leopold Bejamin
  • Barke, Shraddha Govind
  • Ragavan, Sruti Srinivasa

Abstract

The indirect querying of models to determine capabilities possessed by the model. Such indirect queries take the form of model input that potentially includes a natural language input user data. Such model input is structured such that the output of the model is either not natural language at all, or else is natural language that is not semantically responsive to the natural language input. Nevertheless, the output is evaluated to estimate or determine the capability possessed by the model. Thus, models may be more fully utilized to their better potential.

IPC Classes  ?

47.

PRIVACY AWARE SOURCE CODE

      
Application Number 18048953
Status Pending
Filing Date 2022-10-23
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Remseth, Bjorn Gunnar
  • Chen, Haiyue
  • Reißmann, Nico
  • Skogvold, Arve Aleksander Nymo

Abstract

Systems and methods for protecting privacy-relevant data from unauthorized disclosure in source code of an application. For instance, the present disclosure provides a plurality of technical features including: a privacy-relevant data analyzer that analyzes source code, detects privacy-relevant data in the source code, and generates a report of instances of detected privacy-relevant data. In some examples, the privacy-relevant data analyzer scans through source code to detect annotations that denote if fields, records, or combinations thereof include privacy-relevant data. The privacy-relevant data analyzer further generates and provides a report of detected privacy issues associated with sensitive data included in source code so that the issues can be resolved to ensure that privacy is not breached.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

48.

GENERATING AND PROCESSING CHARGING DATA RECORDS BASED ON PREDICTED RECORD LENGTH

      
Application Number 18306060
Status Pending
Filing Date 2023-04-23
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Verma, Devesh
  • Vijayan, Krishnakumar
  • Arakere Basavaraj, Kumar
  • Nair, Girish R.
  • Barabell, Arthur J.
  • Pulicherla, Venki Reddy
  • Sinha, Abhishek Kumar
  • Kumar, Basant
  • Ghosh, Pikan

Abstract

The present disclosure generally relates to systems, methods, and computer-readable media for managing the generation and processing of charging data records (CDRs) in a telecommunication environment (e.g., a fourth generation (4G) a fifth generation (5G), or future generation mobile network). The systems described herein involve predicting lengths of CDRs prior to encoding and providing the CDRs to a charging gateway function to ensure that the CDRs do not exceed a maximum allowable length that the charging gateway function is capable of processing while also reducing the total number of CDR packages that are encoded and transmitted. Indeed, the systems described herein can predict the length of the CDRs incrementally as charging containers are added, thus limiting the number of CDRs that are generated and processed.

IPC Classes  ?

  • H04M 15/00 - Arrangements for metering, time-control or time-indication
  • H04W 4/24 - Accounting or billing

49.

TEMPORAL AND SPATIAL COHERENCE IN RAY TRACING

      
Application Number 18083390
Status Pending
Filing Date 2022-12-16
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Fuller, Martin Jon Irwin

Abstract

A ray trace operation includes tracing a ray from an origin point in accordance with a ray path into a virtual environment (where the virtual environment comprises one or more virtual objects defined by one or more object components) and determining an intersected object component of the one or more object components that the ray intersects with. Determining the intersected object component comprises accessing (i) ray trace temporal coherence data based upon a preceding ray trace operation that temporally precedes the ray trace operation or (ii) ray trace spatial coherence data based upon a spatially proximate ray trace operation.

IPC Classes  ?

50.

TECHNIQUES FOR ADAPTIVELY ALLOCATING RESOURCES IN A CLOUD-COMPUTING ENVIRONMENT

      
Application Number 18544984
Status Pending
Filing Date 2023-12-19
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Radunovic, Bozidar
  • Mehrotra, Sanjeev
  • Zhang, Yongguang
  • Bahl, Paramvir
  • Foukas, Xenofon

Abstract

Described are examples for monitoring performance metrics of one or more workloads in a cloud-computing environment and reallocating compute resources based on the monitoring. Reallocating compute resources can include migrating workloads among nodes or other resources in the cloud-computing environment, reallocating hardware accelerator resources, adjusting transmit power for virtual radio access network (vRAN) workloads, and/or the like.

IPC Classes  ?

  • H04W 28/16 - Central resource management; Negotiation of resources or communication parameters, e.g. negotiating bandwidth or QoS [Quality of Service]
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06N 20/00 - Machine learning
  • H04W 24/10 - Scheduling measurement reports
  • H04W 28/02 - Traffic management, e.g. flow control or congestion control
  • H04W 72/21 - Control channels or signalling for resource management in the uplink direction of a wireless link, i.e. towards the network
  • H04W 72/23 - Control channels or signalling for resource management in the downlink direction of a wireless link, i.e. towards a terminal

51.

Joint Acoustic Echo Cancellation (AEC) and Personalized Noise Suppression (PNS)

      
Application Number 18172017
Status Pending
Filing Date 2023-02-21
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Eskimez, Sefik Emre
  • Yoshioka, Takuya
  • Wang, Huaming
  • Ju, Alex Chenzhi
  • Tang, Min
  • Pärnamaa, Tanel

Abstract

A data processing system implements receiving a far-end signal associated with a first computing device participating in an online communication session and receiving a near-end signal associated with a second computing device participating in the online communication session. The near-end signal includes speech of a target speaker, a first interfering speaker, and an echo signal. The system further implements providing the far-end signal, the near-end signal, and an indication of the target speaker as an input to a machine learning model. The machine learning model trained to analyze the far-end signal and the near-end signal to perform personalized noise suppression (PNS) to remove speech from one or more interfering speakers and acoustic echo cancellation (AEC) to remove echoes. The model is trained to output an audio signal comprising speech of the target speaker. The system obtains the audio signal comprising the speech of the target speaker from the model.

IPC Classes  ?

  • G10L 21/0232 - Processing in the frequency domain
  • G06N 3/0442 - Recurrent networks, e.g. Hopfield networks characterised by memory or gating, e.g. long short-term memory [LSTM] or gated recurrent units [GRU]
  • G10L 17/02 - Preprocessing operations, e.g. segment selection; Pattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal components; Feature selection or extraction
  • G10L 17/04 - Training, enrolment or model building
  • G10L 17/06 - Decision making techniques; Pattern matching strategies
  • G10L 17/18 - Artificial neural networks; Connectionist approaches

52.

TICKET TROUBLESHOOTING SUPPORT SYSTEM

      
Application Number 18547328
Status Pending
Filing Date 2022-02-21
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Kumar, Udayan
  • Namineni, Rakesh Jayadev

Abstract

Systems and methods for providing ticket support using a machine learning model trained using clusters of support tickets that are clustered based on similarity of resolution commands are provided. The system extracts commands used to resolve prior tickets and creates clusters of resolved tickets based on similarity of the commands. For each cluster, problem statements are extracted from the resolved tickets. The system trains a machine learning model with the extracted problem statements to identify a cluster number for each cluster. With a new support ticket, the system extracts a problem statement from the new ticket and identifies a predicted cluster number by applying the trained machine learning mode! to the problem statement from the new ticket. Based on the predicted cluster number, one or more commands used to resolve the prior tickets in the cluster corresponding to the predicted cluster number are accessed and provided to a requesting user.

IPC Classes  ?

  • G06Q 10/10 - Office automation; Time management
  • G06Q 10/20 - Administration of product repair or maintenance

53.

DETECTING SUSPICIOUS DATA ACCESS BY A ROGUE CLOUD RESOURCE

      
Application Number 18146796
Status Pending
Filing Date 2022-12-27
First Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Bogokovsky, Evgeny
  • Pliskin, Ram Haim
  • Karpovsky, Andrey

Abstract

The techniques disclosed herein prevent a rogue resource from being created within a cloud computing environment. For example, a rogue serverless function may be prevented from integrating with a cloud-based database, thereby preventing the serverless function from performing malicious operations such as low-rate data exfiltration. The rogue serverless function is detected before it is installed, heading off the attack completely. In some configurations, a key retrieval request is received. Parameters of the key retrieval request are analyzed for anomalies, and anomalous key retrieval requests are stored in a pool. Then, when a request to create a resource is received, the pool of anomalous key retrieval requests is searched for a match. When a match is found, the resource creation request may be suspended pending a further security review.

IPC Classes  ?

54.

CONSTRUCTING ANSWERS TO QUERIES THROUGH USE OF A DEEP MODEL

      
Application Number 18491874
Status Pending
Filing Date 2023-10-22
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Wu, Xiaojian
  • Chakraborty, Doran
  • Seo, Hyun-Ju
  • Lin, Sina
  • Venkatasubramanian, Gangadharan

Abstract

Various technologies relating to constructing an answer to a query are described herein, wherein the answer is in list form. The answer includes a header and a list element. A deep model receives content of a webpage that is deemed relevant to the query by a search engine and constructs the answer to the webpage upon receipt of the query.

IPC Classes  ?

55.

MODELING THERMAL EFFECTS FOR A LASER SYSTEM

      
Application Number 18401149
Status Pending
Filing Date 2023-12-29
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Chimalapati, Harini
  • Johnson, Christopher Jon
  • Xue, Jingyang

Abstract

The present disclosure relates to systems, methods, and computer readable media for modeling thermal effects within a multi-laser device. For example, systems described herein may include a plurality of laser devices that output energy streams having corresponding operating windows. One or more systems described herein may include a set of accumulators for tracking quantities of energy samples within operating windows and populating a queue representative of the tracked quantities. One or more systems described herein may additionally include filters and a summing module for determining temperature values for operating windows and synchronizing the temperature values with one another to determine an accurate system temperature for the multi-laser device. The features described herein facilitate synchronization of data for corresponding operating windows to provide an accurate determination of system temperature based on a combination of self-heating and crosstalk effects between multiple laser devices.

IPC Classes  ?

  • G02B 27/01 - Head-up displays
  • H01S 3/034 - Optical devices within, or forming part of, the tube, e.g. windows, mirrors
  • H01S 3/04 - Arrangements for thermal management

56.

MOBILE VPN AUTOSTART THROUGH APP-ONLY MANAGEMENT

      
Application Number 18403164
Status Pending
Filing Date 2024-01-03
First Publication Date 2024-04-25
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Oakley, James Matthew Hamilton
  • Jacobson, Neil Adam

Abstract

Techniques for auto-starting a VPN in a MAM environment are disclosed. A MAM-controlled application is launched on a computer system. Policy is queried and a determination is made as to whether to auto-start a VPN application based on the policy. Based on the policy, the VPN application is auto-started, and the VPN application initiates a VPN tunnel that is usable by at least the MAM-controlled application. Network communications transmitted to or from the MAM-controlled application then pass through the VPN tunnel.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]

57.

AUTONOMOUS OPERATION OF EDGE-BASED DEPLOYMENTS

      
Application Number 18402043
Status Pending
Filing Date 2024-01-02
First Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Bose, Rahul
  • Libby, Mark Gordon
  • Muthurajan, Anand
  • Parker, Ronald Mark
  • Brown, Michael Anthony
  • Benson, Leland Douglas

Abstract

Computing resources are managed in a computing network comprising a computing service provider and an edge computing network. The edge computing network receives an indication of a disconnection of communications between the computing service provider and the edge computing network. In response to the indication, the edge computing network initiates an autonomous mode at the edge computing network. The edge computing network is configured to continue providing computing and network services at the edge computing network while the edge computing network is operating in the autonomous mode.

IPC Classes  ?

  • H04L 47/70 - Admission control; Resource allocation
  • H04L 47/78 - Architectures of resource allocation

58.

STRUCTURED ARRANGEMENTS FOR TRACKING CONTENT ITEMS ON A SHARED USER INTERFACE

      
Application Number 18401190
Status Pending
Filing Date 2023-12-29
First Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Lewbel, Hannah Rebecca
  • Sharp, Isabel Sophie
  • Gleisner, Adam Michael
  • Conway, Lindsey
  • Allington, Clea
  • George, Minu
  • Courts, Samantha Robbie
  • Grounds, Margaret Arlene
  • Snyder, Scott H.W.
  • Albahadly, Nassr

Abstract

Technologies are disclosed that enable a computing system to present a structured arrangement for tracking content items on a shared user interface (UI) during a communication session. The structured arrangement is a list that is displayed in a specific region of the shared UI. Inclusion of content items in the list makes it easier for users to locate and interact with those content items throughout the communication session. The ability to create and manipulate the list may be limited to only certain users such as a moderator. Use of this list can promote inclusivity and fairness. For instance, inclusion in the list may prevent content items from being forgotten or ignored. Additionally, the names of users who contributed the content items may be shown in the list thereby providing recognition for those users.

IPC Classes  ?

  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/14 - Digital output to display device

59.

MESSAGE PASSING GRAPH NEURAL NETWORK WITH VECTOR-SCALAR MESSAGE PASSING AND RUN-TIME GEOMETRIC COMPUTATION

      
Application Number CN2022126834
Publication Number 2024/082306
Status In Force
Filing Date 2022-10-21
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Shao, Bin
  • Liu, Tieyan

Abstract

A computing system is provided, which receives a molecular graph at a message passing graph neural network (MPGNN), and produces scalar embeddings representing features of nodes and edges of the graph and vector embeddings representing geometric relationships of the graph. The system processes the scalar embeddings via a vector scalar interactive message passing mechanism of a message passing sub-block of the MPGNN to generate and pass scalar information from the scalar embeddings to an embedding space containing the vector embeddings. The system updates the vector embeddings based on the embedding space containing the scalar information and the vector embeddings. The system updates the scalar embeddings based on run-time geometry calculations of the geometric relationships encoded in the vector embeddings. The system computes an updated molecular graph based on the updated scalar and vector embeddings and outputs a target molecular property value based on the updated molecular graph.

IPC Classes  ?

  • G16C 20/30 - Prediction of properties of chemical compounds, compositions or mixtures
  • G06N 3/02 - Neural networks

60.

STREAMING LONG-FORM SPEECH RECOGNITION

      
Application Number CN2022126111
Publication Number 2024/082167
Status In Force
Filing Date 2022-10-19
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Wu, Yu
  • Li, Jinyu
  • Liu, Shujie
  • Gong, Xun

Abstract

Systems and methods are provided for accessing a factorized neural transducer comprising a first set of layers for predicting blank tokens and a second set of layers for predicting vocabulary tokens. The first set of layers comprises a blank predictor, an encoder, and a joint network and the second set of layers comprising a vocabulary predictor which is a separate predictor from the blank predictor. A context encoder is added to the factorized neural transducer which encodes long-form transcription history for generating a long-form context embedding, such that the factorized neural transducer is further configured to perform long-form automatic speech recognition, at least in part, by using the long-form context embedding to augment a prediction of vocabulary tokens.

IPC Classes  ?

  • G10L 15/16 - Speech classification or search using artificial neural networks

61.

SYNTHETIC CLASSIFICATION DATASETS BY OPTIMAL TRANSPORT INTERPOLATION

      
Application Number US2023033329
Publication Number 2024/085989
Status In Force
Filing Date 2023-09-21
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Alvarez-Melis, David
  • Fan, Jiaojiao
  • Fusi, Nicolo

Abstract

Generally discussed herein are devices, systems, and methods for generating synthetic datasets. A method includes obtaining a first training labelled dataset, obtaining a second training labelled dataset, determining an optimal transport (OT) map from a target labelled dataset to the first training labelled dataset, determining an OT map from the target labelled dataset to the second training labelled dataset, identifying, in a generalized geodesic hull formed by the first and second training labelled datasets in a distribution space and based on the OT maps, a point proximate the target dataset in the distribution space, and producing the synthetic labelled ML dataset by combining, based on distances between probability distribution representations of the first and second labelled training datasets in the distribution space and the point, the first and second labelled training datasets resulting in a labelled synthetic dataset.

IPC Classes  ?

62.

REDUCED VIDEO STREAM RESOURCE USAGE

      
Application Number US2023033317
Publication Number 2024/085987
Status In Force
Filing Date 2023-09-21
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Hao, Yichen
  • Li, Lihang
  • Romano, Anthony C.
  • Sangani, Naiteek
  • Menezes, Ryan S.

Abstract

The description relates to resource aware object detection for encoded video streams that can identify frames of the video stream that include an object of interest, such as a human, without decoding the frames.

IPC Classes  ?

  • H04N 19/105 - Selection of the reference unit for prediction within a chosen coding or prediction mode, e.g. adaptive choice of position and number of pixels used for prediction
  • H04N 19/172 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object the region being a picture, frame or field
  • H04N 19/177 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being a group of pictures [GOP]
  • H04N 19/46 - Embedding additional information in the video signal during the compression process
  • H04N 21/2187 - Live feed
  • H04N 21/234 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs
  • H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
  • H04N 21/83 - Generation or processing of protective or descriptive data associated with content; Content structuring
  • H04N 21/845 - Structuring of content, e.g. decomposing content into time segments

63.

DEVICES, SYSTEMS, AND METHODS FOR A COOLING SYSTEM

      
Application Number US2023031805
Publication Number 2024/085958
Status In Force
Filing Date 2023-09-01
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Dong, Fang
  • Jin, Meng
  • Mehta, Jigar
  • Babang, Mayila
  • Treves, Michele Alberto Scipione
  • Peterson, Martha Geoghegan
  • Xu, Linjie
  • Gupta, Naval
  • Cho, Hyunjung

Abstract

A cooling system may include a tank filled with a first cooling fluid. The cooling system may include a container including a chamber, the chamber receiving a heat-generating component, the container being sealed, the container being at least partially submerged in the first cooling fluid in the tank, the container including a second cooling fluid.

IPC Classes  ?

  • G06F 1/20 - Cooling means
  • H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating

64.

AUTOMATED REMEDIATION OF EXPOSED SECRETS

      
Application Number US2023031804
Publication Number 2024/085957
Status In Force
Filing Date 2023-09-01
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Fanning, Michael, Christopher
  • Couraud, Nicolas, Yves
  • Czerwonka, Jacek, Andrzej
  • Faucon, Christopher, Michael, Henry
  • Yu, Yingting
  • Basseri, Etan, Micah
  • K'Otohoyoh, Floyd, Odiwuor
  • Lichwa, Jacek, Ernest

Abstract

Techniques for identifying an exposed credential that, if used, would provide access to a resource are disclosed. The techniques enable the resource to remain online while (i) a new credential is allocated for the resource, (ii) the resource is transitioned to using the new credential instead of the exposed credential, and (iii) the exposed credential is attempted to be invalidated. A credential is accessed. This credential is suspected of being in an exposed state. The credential is accessible from within an artifact and is determined to be in the exposed state. A new credential is generated. This new credential is designed to replace the exposed credential. An instruction is transmitted to the resource to cause it to transition from using the exposed credential to using the new credential. The exposed credential is then invalidated.

IPC Classes  ?

  • G06F 21/45 - Structures or tools for the administration of authentication
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

65.

GENERATING AND PROCESSING CHARGING DATA RECORDS BASED ON PREDICTED RECORD LENGTH

      
Application Number US2023031807
Publication Number 2024/085959
Status In Force
Filing Date 2023-09-01
Publication Date 2024-04-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Verma, Devesh
  • Vijayan, Krishnakumar
  • Arakere Basavaraj, Kumar
  • Nair, Girish R.
  • Barabell, Arthur J.
  • Pulicherla, Venki Reddy
  • Sinha, Abhishek Kumar
  • Kumar, Basant
  • Ghosh, Pikan

Abstract

The present disclosure generally relates to systems, methods, and computer-readable media for managing the generation and processing of charging data records (CDRs) in a telecommunication environment (e.g., a fourth generation (4G) a fifth generation (5G), or future generation mobile network). The systems described herein involve predicting lengths of CDRs prior to encoding and providing the CDRs to a charging gateway function to ensure that the CDRs do not exceed a maximum allowable length that the charging gateway function is capable of processing while also reducing the total number of CDR packages that are encoded and transmitted. Indeed, the systems described herein can predict the length of the CDRs incrementally as charging containers are added, thus limiting the number of CDRs that are generated and processed.

IPC Classes  ?

66.

Artificial intelligence for intent-based networking

      
Application Number 18330933
Grant Number 11968088
Status In Force
Filing Date 2023-06-07
First Publication Date 2024-04-23
Grant Date 2024-04-23
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Yan, Yu
  • Beckett, Ryan Andrew
  • Bahl, Paramvir

Abstract

Example implementations include a method, apparatus, and computer-readable medium configured for generating a network configuration using a large language model (LLM). The apparatus receives, at an interface between a user and LLM, a natural language intent for a network configuration. The apparatus requests the large language model to update the network configuration to an updated network configuration that satisfies the natural language intent in a declarative network configuration language. The apparatus verifies whether the updated network configuration satisfies a configuration syntax of the declarative network configuration language to detect an error. The apparatus requests the large language model to update the updated network configuration to correct the error. The apparatus deploys the updated network configuration to a user network.

IPC Classes  ?

  • G06F 15/177 - Initialisation or configuration control
  • G06F 40/30 - Semantic analysis
  • G06F 40/40 - Processing or translation of natural language
  • H04L 41/0823 - Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability

67.

Leveraging affinity between content creator and viewer to improve creator retention

      
Application Number 18086138
Grant Number 11968165
Status In Force
Filing Date 2022-12-21
First Publication Date 2024-04-23
Grant Date 2024-04-23
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Lopez Moreno, Ivan
  • Ren, Xuexin
  • Han, Ying
  • Chatterjee, Shaunak
  • Muralidharan, Ajith

Abstract

Methods, systems, and computer programs are presented for selecting notifications based on an affinity score between a content generator and a viewer of the content. One method includes capturing interactions of content generators with notifications, received by the content generators, associated with viewer responses to creator-generated content items. The method further includes training a machine-learning model based on the interactions, and detecting a first set of notifications, for a first content generator, associated with interactions of a set of viewers to first-content generator content. The ML model calculates an affinity score between the first content generator and each viewer, and the set of first notifications are ranked based on the affinity scores of the first content generator and the viewer associated with each notification. A set of second notifications is selected based on the ranked first notifications; and generating notifications are generated, for the first content generator, for the selected set of second notifications.

IPC Classes  ?

  • H04L 12/58 - Message switching systems
  • G06N 20/00 - Machine learning
  • G06Q 50/00 - Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
  • H04L 51/10 - Multimedia information
  • H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services

68.

LOCAL PAGE WRITES VIA PRE-STAGING BUFFERS FOR RESILIENT BUFFER POOL EXTENSIONS

      
Application Number 18534126
Status Pending
Filing Date 2023-12-08
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Ramos, Rogério
  • Golaub, Kareem Aladdin
  • Gottipati, Chaitanya
  • Saenz, Alejandro Hernandez
  • Danday, Raj Kripal

Abstract

Methods for local page writes via pre-staging buffers for resilient buffer pool extensions are performed by computing systems. Compute nodes in database systems insert, update, and query data pages maintained in storage nodes. Data pages cached locally by compute node buffer pools are provided to buffer pool extensions on local disks as pre-copies via staging buffers that store data pages prior to local disk storage. Encryption of data pages occurs at the staging buffers, which allows a less restrictive update latching during the copy process, with page metadata being updated in buffer pool extensions page tables with in-progress states indicating it is not yet written to local disk. When stage buffers are filled, data pages are written to buffer pool extensions and metadata is updated in page tables to indicate available/valid states. Data pages in staging buffers can be read and updated prior to writing to the local disk.

IPC Classes  ?

  • G06F 13/16 - Handling requests for interconnection or transfer for access to memory bus

69.

RESPONSE-TIME-BASED ORDERING OF FINANCIAL MARKET TRADES

      
Application Number 18046806
Status Pending
Filing Date 2022-10-14
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Goyal, Prateesh
  • Marinos, Ilias
  • Chandra, Ranveer
  • Russinovich, Mark Eugene

Abstract

Examples are disclosed that relate to fairly ordering financial market trades received from different market participant computers via a cloud computing network. In one example, a plurality of trades generated by a plurality of market participant computers are received. The trades are generated based at least on a financial market data point received by the plurality of market participant computers. Each trade is tagged with a delivery clock time stamp that tracks time in relation to financial market events that occur at a corresponding market participant computer. The trades are ordered based on the delivery clock time stamps and sent to a central exchange server computer. The central exchange server computer processes the trades.

IPC Classes  ?

  • G06Q 40/04 - Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

70.

Reduced Video Stream Resource Usage

      
Application Number 17968694
Status Pending
Filing Date 2022-10-18
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Hao, Yichen
  • Li, Lihang
  • Romano, Anthony C.
  • Sangani, Naiteek
  • Menezes, Ryan S.

Abstract

The description relates to resource aware object detection for encoded video streams that can identify frames of the video stream that include an object of interest, such as a human, without decoding the frames.

IPC Classes  ?

  • H04N 19/177 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being a group of pictures [GOP]
  • H04N 19/169 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding

71.

AUTOMATED REMEDIATION OF EXPOSED SECRETS

      
Application Number 17967124
Status Pending
Filing Date 2022-10-17
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Fanning, Michael Christopher
  • Couraud, Nicolas Yves
  • Czerwonka, Jacek Andrzej
  • Faucon, Christopher Michael Henry
  • Yu, Yingting
  • Basseri, Etan Micah
  • K'Otohoyoh, Floyd Odiwuor
  • Lichwa, Jacek Ernest

Abstract

Techniques for identifying an exposed credential that, if used, would provide access to a resource are disclosed. The techniques enable the resource to remain online while (i) a new credential is allocated for the resource, (ii) the resource is transitioned to using the new credential instead of the exposed credential, and (iii) the exposed credential is attempted to be invalidated. A credential is accessed. This credential is suspected of being in an exposed state. The credential is accessible from within an artifact and is determined to be in the exposed state. A new credential is generated. This new credential is designed to replace the exposed credential. An instruction is transmitted to the resource to cause it to transition from using the exposed credential to using the new credential. The exposed credential is then invalidated.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures

72.

CODE RADAR

      
Application Number 18168229
Status Pending
Filing Date 2023-02-13
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Ziegler, Albert
  • Wattenberger, Amelia Mein-Rou

Abstract

Using a language model attention matrix to facilitate a “code radar” source code navigation experience that highlights related source code locations. A computer system identifies a first source code location within source code that is displayed at a code editor user interface (UI). From a set of mappings generated based on a language model attention matrix, the computer system identifies a second source code location as being related to the first source code location. Concurrent with presenting the first source code location in the code editor UI, the computer system presents a related source code navigation experience, which includes both (i) presenting the second source code location in the code editor UI, and (ii) presenting a visual indication that the second source code location is related to the first source code location. Some embodiments include generating the set of mappings based on a language model attention matrix.

IPC Classes  ?

73.

IDENTITY ANONYMIZATION WITH CONTROLLED MASKING AND FORMAT PRESERVING ENCRYPTION

      
Application Number 17966490
Status Pending
Filing Date 2022-10-14
First Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Proano, Guillermo Paul

Abstract

Systems are methods are used for facilitating identify anonymization by using controlled masking and encryption of user identifiers, such as UUIDs. A system that manages a UUID converts the UUID into a set of one or more different unique versions of the UUID for one or more corresponding different partner system(s) by removing and replacing masked portions of the UUID and by selectively encrypting the non-masked portions of the UUID. New masked portions added to the new version(s) of the UUID identify different corresponding partner(s) and/or rules to be applied by the different partner(s) when handling the different unique version(s) of the UUID(s). Partner systems that receive the new versions of the UUID identify and utilize the new masked portions to deterministically control decrypting and/or other processing of the new version of the UUID.

IPC Classes  ?

74.

MULTITENANT SHARING ANOMALY CYBERATTACK CAMPAIGN DETECTION

      
Application Number 18530853
Status Pending
Filing Date 2023-12-06
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Garyani, Yaakov
  • Israel, Moshe
  • Neuvirth, Hani Hana
  • Abramovitch, Ely
  • Keren, Amir
  • Burrell, Timothy William

Abstract

Embodiments detect cyberattack campaigns against multiple cloud tenants by analyzing activity data to find sharing anomalies. Data that appears benign in a single tenant's activities may indicate an attack when the same or similar data is also found for additional tenants. Attack detection may depend on activity time frames, on how similar certain activities of different tenants are to one another, on how unusual it is for different tenants to share an activity, and on other factors. Sharing anomaly analysis may utilize hypergeometric probabilities or other statistical measures. Detection avoidance attempts using digital entity randomization are revealed and thwarted. Authorized vendors may be recognized, mooting anomalousness. Although data from multiple tenants is analyzed together for sharing anomalies while monitoring for attacks, tenant confidentiality and privacy are respected through technical and legal mechanisms. Mitigation is performed in response to an attack indication.

IPC Classes  ?

75.

MULTI-MODAL THREE-DIMENSIONAL FACE MODELING AND TRACKING FOR GENERATING EXPRESSIVE AVATARS

      
Application Number 18062239
Status Pending
Filing Date 2022-12-06
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Sawhney, Harpreet Singh
  • Lundell, Benjamin Eliot
  • Shah, Anshul Bhavesh
  • Cristian, Calin
  • Hewitt, Charles Thomas
  • Baltrusaitis, Tadas
  • Radojevic, Mladen
  • Grujcic, Kosta
  • Stojiljkovic, Ivan
  • Mcilroy, Paul Malcolm
  • Olafenwa, John Ishola
  • Jadidian, Jouya
  • Jakubzak, Kenneth Mitchell

Abstract

Examples are disclosed that relate to generating expressive avatars using multi-modal three-dimensional face modeling and tracking. One example includes a computer system comprising a processor coupled to a storage system that stores instructions. Upon execution by the processor, the instructions cause the processor to receive initialization data describing an initial state of a facial model. The instructions further cause the processor to receive a plurality of multi-modal data signals. The instructions further cause the processor to perform a fitting process using the initialization data and the plurality of multi-modal data signals. The instructions further cause the processor to determine a set of parameters based on the fitting process, wherein the determined set of parameters describes an updated state of the facial model.

IPC Classes  ?

  • G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
  • G06T 17/00 - 3D modelling for computer graphics
  • G06V 40/16 - Human faces, e.g. facial parts, sketches or expressions

76.

ROSTER MANAGEMENT ACROSS ORGANIZATIONS

      
Application Number 18396387
Status Pending
Filing Date 2023-12-26
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Mclean, Michael Thomas
  • Conceicao, Ladislau
  • Sanghavi, Priyank Deepak
  • Li, Li
  • Manglani, Jayant Kishorbhai

Abstract

Systems and methods for generating a shared collaborative channel for collaboration are provided. In particular, a computing device may receive a request, from an originating member of an organization, to create the shared collaborative channel, the request including an invitee to be added to the shared collaborative channel. In response to receipt of the request, the computing device may provision a substrate group by creating a container associate with the shared collaborative channel including a substrate database associated with the shared collaborative channel, generate an invitation including a custom link to the shared collaborative channel for the invitee, and determine whether the invitee belongs to an originating collaboration team associated with the originating member based on the substrate database. If the invitee belongs to the originating collaboration team, the computing device may further update the substrate group to add the invitee as a new member of the shared collaborative channel.

IPC Classes  ?

  • G06Q 10/101 - Collaborative creation, e.g. joint development of products or services
  • G06Q 10/10 - Office automation; Time management
  • H04L 9/40 - Network security protocols
  • H04L 12/18 - Arrangements for providing special services to substations for broadcast or conference

77.

SYSTEM AND METHOD FOR SEMANTIC AWARE DATA SCIENCE

      
Application Number 18396972
Status Pending
Filing Date 2023-12-27
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Floratou, Avrilia
  • Mueller, Andreas Christian
  • Banda, Dalitso Hansini
  • Cahoon, Joyce Yu
  • Gruenheid, Anja
  • Godwal, Neha

Abstract

Systems, methods, and devices are described for enabling a user to import a library into a computer program under development. The library includes a data storage interface, one or more semantic objects, and one or more data manipulation or data analysis operations. A user is able to reference code of the library within the computer program under development to generate a dataset from data obtained via the data storage interface and associate the one or more semantic objects with the dataset to generate a semantically-annotated dataset. Systems, methods, and devices enable, based on the importing: the user to invoke a semantic-guided operation of the library that utilizes the semantically-annotated dataset to infer an aspect of a data manipulation or data analysis operation to be performed on the semantically-annotated dataset; or the suggestion of a data manipulation or data analysis operation to the user based on the semantically-annotated dataset.

IPC Classes  ?

78.

CLICK-TO-SCRIPT REFLECTION

      
Application Number 18004447
Status Pending
Filing Date 2021-06-25
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Li, Xiangnan
  • Friedman, Marc Todd
  • Le, Wangchao
  • Zabokritski, Evgueni

Abstract

A click-to-script service enables developers of big-data job scripts to quickly see the underlying script operations from optimized execution plans. Once a big-data job is received, the disclosed examples compile it and generate tokens that are associated with each operation of the big-data job. These tokens include may include the file name of the job, the line number of the operation, and/or an Abstract Syntax Tree (AST) node for the given operations. An original execution plan is optimized into an optimized execution plan, and the tokens for the original operations of the job script are assigned to the optimized operations of the optimized execution plan. The optimized execution plan is graphically displayed in an interactive manner such that users may view the optimized execution plan and click on its optimized operations to find the original operations of the job script.

IPC Classes  ?

79.

BLINKLESS AND MARKERLESS BI-PHASE DISPLAY CALIBRATION

      
Application Number 17964775
Status Pending
Filing Date 2022-10-12
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Kim, Taemin

Abstract

Techniques for separating an image into a forward sweeping image and a backward sweeping image are disclosed. A lookup table maps MEMS projection positions on a display with corresponding pixel positions in an image generated by a camera facing the display. The lookup table is used to associate a first set of pixel positions in the image with a forward scanning sweep of the MEMS system. The lookup table is also used to associate a second set of pixel positions in the image with a backward scanning sweep of the MEMS system. The first and second sets of pixel positions are used to generate the forward sweeping image and the backward sweeping image, respectively. These images can then be used to calibrate the MEMS system to compensate for bi-phase.

IPC Classes  ?

  • H04N 9/31 - Projection devices for colour picture display
  • G02B 26/08 - Optical devices or arrangements for the control of light using movable or deformable optical elements for controlling the direction of light
  • G02B 26/10 - Scanning systems
  • G02B 27/01 - Head-up displays

80.

OVERLAY SCHEME FOR CONTAINER ADDRESSING IN VIRTUAL NETWORKS

      
Application Number 18047345
Status Pending
Filing Date 2022-10-18
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Aggarwal, Neha
  • Aggarwal, Chandan
  • Tewari, Rishabh
  • Kumar, Abhijeet
  • Goel, Sudhir
  • Nuwal, Trilok
  • Long, Matthew Francis
  • Baker, Evan Alexander
  • Ramachandran, Aanand
  • Upadhyay, Alok

Abstract

A virtual network provider system supports a virtual network including virtual machines that are each assigned to an underlay address of an underlay addressing scheme. The virtual network provider system further includes multiple routing domains each defined to include a different subset of the virtual machines. Each of the routing domains is assigned to a range of overlay addresses of an overlay addressing scheme. For each routing domain, the assigned range of overlay addresses is allocated among the subset of the virtual machines in the routing domain. The system further includes a virtual network host configured to use addresses of the overlay addressing scheme to selectively route messages between endpoints on select pairs of the virtual machines assigned to a same routing domain of the plurality of routing domains.

IPC Classes  ?

  • H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
  • H04L 45/74 - Address processing for routing
  • H04L 45/76 - Routing in software-defined topologies, e.g. routing between virtual machines

81.

QUALITY ESTIMATION MODEL FOR PACKET LOSS CONCEALMENT

      
Application Number 18079342
Status Pending
Filing Date 2022-12-12
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Diener, Carl Lorenz

Abstract

This document relates to training and employing a quality estimation model. One example includes a method or technique that can be performed on a computing device. The method or technique can include providing degraded audio signals to one or more packet loss concealment models, and obtaining enhanced audio signals output by the one or more packet loss concealment models. The method or technique can also include obtaining quality labels for the enhanced audio signals and training a quality estimation model to estimate audio signal quality based at least on the enhanced audio signals and the quality labels.

IPC Classes  ?

  • G10L 25/60 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for comparison or discrimination for measuring the quality of voice signals
  • G10L 19/005 - Correction of errors induced by the transmission channel, if related to the coding algorithm
  • G10L 25/30 - Speech or voice analysis techniques not restricted to a single one of groups characterised by the analysis technique using neural networks
  • G10L 25/69 - Speech or voice analysis techniques not restricted to a single one of groups specially adapted for particular use for evaluating synthetic or decoded voice signals

82.

IDENTIFYING AND CONSENTING TO PERMISSIONS FOR WORKFLOW AND CODE EXECUTION

      
Application Number 18395825
Status Pending
Filing Date 2023-12-26
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Vaishnav, Sunay
  • Hade, Merwan Vishnu
  • Siciliano, Stephen Christopher
  • Nissimoff, David
  • Anubhav, Fnu

Abstract

The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.

IPC Classes  ?

  • G06F 21/31 - User authentication
  • G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/60 - Protecting data

83.

TRACKING IN-GAME EVENTS AND GENERATING EVENT REPORTS ACROSS MULTIPLE GAMING APPLICATIONS

      
Application Number 18391250
Status Pending
Filing Date 2023-12-20
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Kennett, Daniel Gilbert
  • Rabold, Mark Edward

Abstract

The present disclosure relates to systems, methods, and computer-readable media for identifying a variety of events that occur within a gaming session and generating event reports based on the identified events. For example, a gaming service (e.g., a cloud gaming server) can leverage content analysis and event recognizer services on a cloud computing system to detect one or more in-game events based on gaming content (e.g., video content, audio content, controller inputs) that is delivered to a client system. Systems described herein can train and implement event recognizers trained to track various in-game events across multiple gaming applications. Based on the tracked events, the systems described herein can generate event reports for events, individual users, and groups of users of the cloud computing system.

IPC Classes  ?

  • A63F 13/77 - Game security or game management aspects involving data related to game devices or game servers, e.g. configuration data, software version or amount of memory
  • A63F 13/75 - Enforcing rules, e.g. detecting foul play or generating lists of cheating players

84.

DEVICE PUSH-TO-OPEN DETECTION AND POWER CONTROL

      
Application Number 18046411
Status Pending
Filing Date 2022-10-13
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Jensen, Michael Dale
  • Lin, James Hao-An Chen
  • Ylitalo, Mika Martti

Abstract

A foldable computing device comprises a first frame rotatably coupled to a second frame. The second frame comprises a push-to-open mechanism comprising an actuator and a power switch located for actuation by the actuator. A detection mechanism detects a displaced position of the actuator that corresponds to releasing the foldable computing device from a closed configuration. Actuation of the power switch is detected and used with detection of the displaced position of the actuator to control an operating state of the computing device.

IPC Classes  ?

  • G06F 1/16 - Constructional details or arrangements

85.

DEEP FUSION OF KERNEL EXECUTION

      
Application Number 17966587
Status Pending
Filing Date 2022-10-14
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Zhu, Haishan
  • Shah, Preyas Janak
  • Mitra, Tiyasa
  • Chung, Eric S.

Abstract

Embodiments of the present disclosure include techniques for machine language processing. In one embodiment, the present disclosure includes configuring functional modules on a machine learning processor to execute a plurality of machine learning (ML) operations during a plurality of time segments. During the time segments, a first portion of the ML operations execute serially and at least one other ML operation executes during at least a majority of the time of each of the time segments. Serial ML operations may be processed simultaneously with the at least one other ML operation.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06N 20/00 - Machine learning

86.

CAMERA SYSTEMS FOR OPERATING IN MULTIPLE OPTICAL CHANNELS

      
Application Number 18047453
Status Pending
Filing Date 2022-10-18
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Bamji, Cyrus Soli
  • Akkaya, Onur Can
  • Ortiz Egea, Sergio

Abstract

Indirect time-of-flight camera systems for operating in multiple optical channels using active modulated light and accompanying methods of operation are provided. In one aspect, the indirect time-of-flight camera system includes first and second modulatable laser sources outputting light of different wavelengths for illuminating a target environment. The camera system further includes a wavelength-selective reflective element designed to reflect the light of a first wavelength and to transmit the light of a second wavelength. The camera system further includes a controller comprising instructions executable to control the camera system to, in a first time period, activate the first modulatable laser source and deactivate the second modulatable laser source, and in a second time period, deactivate the first modulatable laser source and activate the second modulatable laser source. The camera system further includes a photosensor for receiving the light outputted by the first and second modulatable laser sources.

IPC Classes  ?

  • G01S 17/894 - 3D imaging with simultaneous measurement of time-of-flight at a 2D array of receiver pixels, e.g. time-of-flight cameras or flash lidar
  • G02F 1/31 - Digital deflection devices

87.

SYSTEMS AND METHODS FOR DETERMINING SCORES FOR MESSAGES BASED ON ACTIONS OF MESSAGE RECIPIENTS AND A NETWORK GRAPH

      
Application Number 18392642
Status Pending
Filing Date 2023-12-21
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor Cibelli, Maurizio

Abstract

Methods and systems cause display of email messages of a user on a screen of a computing system based on scores associated with the email messages. An email ranking system may have assigned the scores to the email messages. The scores are based on actions that other recipients of the email messages have taken with respect to the email messages. In calculating the scores, the actions of the other recipients may receive different weights based on how closely connected a recipient is to the user and a type of connection the recipient has to the user. A network graph may indicate how closely connected the recipient is to the user and the type of connection the recipient has to the user.

IPC Classes  ?

  • H04L 51/226 - Delivery according to priorities
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/216 - Handling conversation history, e.g. grouping of messages in sessions or threads
  • H04L 51/224 - Monitoring or handling of messages providing notification on incoming messages, e.g. pushed notifications of received messages
  • H04L 51/42 - Mailbox-related aspects, e.g. synchronisation of mailboxes

88.

TOUCH-SENSITIVE INPUT DEVICE

      
Application Number 18554038
Status Pending
Filing Date 2022-03-25
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Dekel, Shoham
  • Bar-Ness, Assaf

Abstract

Examples are disclosed that relate to applying haptic output to a touch-sensitive input device. One example provides a touch-sensitive input device comprising a body, a haptic feedback mechanism within the body, a sensor subsystem, a logic processor, and a memory. The memory stores instructions executable by the processor to receive from the sensor subsystem sensor data indicating locations along the body of a plurality of contact points between a user hand and the body, based at least in part on the sensor data, determine a touch profile of the user hand applied to the body, based at least in part on the touch profile of the user hand, determine a selected haptic output to be applied to the body, and cause a drive signal to be transmitted to the haptic feedback mechanism to apply the selected haptic output to the body.

IPC Classes  ?

  • G06F 3/038 - Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 3/0354 - Pointing devices displaced or positioned by the user; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks

89.

TRANSFORMER-BASED TEXT ENCODER FOR PASSAGE RETRIEVAL

      
Application Number 17938173
Status Pending
Filing Date 2022-10-05
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Cheng, Hao
  • Fang, Hao
  • Liu, Xiaodong
  • Gao, Jianfeng

Abstract

A computing system includes a logic subsystem and a storage subsystem holding instructions executable by the logic subsystem to implement a transformer-based text encoder. The transformer-based text encoder includes a plurality of transformer blocks previously-trained to apply encoding operations to computer-readable text representations of input text strings, the computer-readable text representations including computer-readable question representations of input text questions, and computer-readable passage representations of input text passages. The plurality of transformer blocks include a shared transformer block trained for both the computer-readable question representations and the computer-readable passage representations and a specialized transformer block including two or more input-specific subnetworks, and a routing function to select an input-specific subnetwork of the two or more input-specific subnetworks for each of the computer-readable text representations.

IPC Classes  ?

90.

User-Controlled Firmware for Hosted Virtual Machines

      
Application Number 17968621
Status Pending
Filing Date 2022-10-18
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Shivaganga Nagaraju, Gangadhara Swamy
  • Chitnis, Pushkar Vijay
  • Zhang, Bo
  • Nad Rudra Gowda, Amar

Abstract

A computer implemented method includes receiving first firmware information at a hosting environment identifying that a user has selected user-controlled firmware for user virtual machines to be hosted on the hosting environment. A copy of the user-controlled firmware is obtained and a user virtual machine is deployed that includes the user-controlled firmware. The user-controlled firmware is locked against changes by the hosting environment absent receiving permission from the user.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 8/65 - Updates

91.

RESOURCE PROVISIONING

      
Application Number 18161679
Status Pending
Filing Date 2023-01-30
First Publication Date 2024-04-18
Owner Microsoft Technology Licensing, LLC (USA)
Inventor
  • Sen, Rathijit
  • Interlandi, Matteo
  • Cao, Jiashen

Abstract

A system provisioning resources of a processing unit. The system predicts a performance impact on a workload attributable to a performance constraint of the processing unit for the workload according to a resource model, wherein the workload includes a query and the resource model characterizes attainable compute bandwidth, attainable memory bandwidth, and arithmetic intensity based on peak compute bandwidth and peak memory bandwidth of the processing unit. The system determines a resource allocation of the processing unit, based on the predicted performance impact and instructs the processing unit to allocate the resources for processing the workload based on the determined resource allocation.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

92.

MULTI-MODAL THREE-DIMENSIONAL FACE MODELING AND TRACKING FOR GENERATING EXPRESSIVE AVATARS

      
Application Number US2023027748
Publication Number 2024/081052
Status In Force
Filing Date 2023-07-14
Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Sawhney, Harpreet Singh
  • Lundell, Benjamin Eliot
  • Shah, Anshul Bhavesh
  • Cristian, Calin
  • Hewitt, Charles Thomas
  • Baltrusaitis, Tadas
  • Radojevic, Mladen
  • Grujcic, Kosta
  • Stojiljkovic, Ivan
  • Mcilroy, Paul Malcolm
  • Olafenwa, John Ishola
  • Jadidian, Jouya
  • Jakubzak, Kenneth Mitchell

Abstract

Examples are disclosed that relate to generating expressive avatars using multi-modal three-dimensional face modeling and tracking. One example includes a computer system comprising a processor coupled to a storage system that stores instructions. Upon execution by the processor, the instructions cause the processor to receive initialization data describing an initial state of a facial model. The instructions further cause the processor to receive a plurality of multi-modal data signals. The instructions further cause the processor to perform a fitting process using the initialization data and the plurality of multi-modal data signals. The instructions further cause the processor to determine a set of parameters based on the fitting process, wherein the determined set of parameters describes an updated state of the facial model.

IPC Classes  ?

  • G06T 13/40 - 3D [Three Dimensional] animation of characters, e.g. humans, animals or virtual beings
  • G06T 7/00 - Image analysis
  • G06T 19/20 - Editing of 3D images, e.g. changing shapes or colours, aligning objects or positioning parts

93.

BLINKLESS AND MARKERLESS BI-PHASE DISPLAY CALIBRATION

      
Application Number US2023031481
Publication Number 2024/081068
Status In Force
Filing Date 2023-08-30
Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Kim, Taemin

Abstract

Techniques for separating an image into a forward sweeping image and a backward sweeping image are disclosed. A lookup table maps MEMS projection positions on a display with corresponding pixel positions in an image generated by a camera facing the display. The lookup table is used to associate a first set of pixel positions in the image with a forward scanning sweep of the MEMS system. The lookup table is also used to associate a second set of pixel positions in the image with a backward scanning sweep of the MEMS system. The first and second sets of pixel positions are used to generate the forward sweeping image and the backward sweeping image, respectively. These images can then be used to calibrate the MEMS system to compensate for bi-phase.

IPC Classes  ?

  • G02B 26/08 - Optical devices or arrangements for the control of light using movable or deformable optical elements for controlling the direction of light
  • G02B 26/10 - Scanning systems
  • G02B 27/01 - Head-up displays

94.

IMPLEMENTING A TARGET BLOCK COMMAND ON AN UNSTRUCTURED DATA STORAGE NODE

      
Application Number US2023031775
Publication Number 2024/081070
Status In Force
Filing Date 2023-08-31
Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Desai, Shantanu
  • Dammalapati, Kantha Rao

Abstract

The present disclosure relates to systems, methods, and computer-readable media for extending functionality of unstructured data storage function (UDSF) nodes in supporting features and functionality of services and applications that are accessible via a core network. The systems described herein include a UDSF node having a UDSF data management system that enables network functions to interact with and modify data resources separately maintained by the UDSF node(s). A network function may selectively target discrete sets of blocks of data on records to access without accessing entire records and without issuing redundance application programming interface (API) calls to the USDF node(s). the UDSF node may be implemented in a core network to enhance network functions in fifth generation (5G) and beyond communication environments.

IPC Classes  ?

95.

RESOURCE PROVISIONING

      
Application Number US2023031781
Publication Number 2024/081071
Status In Force
Filing Date 2023-08-31
Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Sen, Rathijit
  • Interlandi, Matteo
  • Cao, Jiashen

Abstract

A system provisioning resources of a processing unit. The system predicts a performance impact on a workload attributable to a performance constraint of the processing unit for the workload according to a resource model, wherein the workload includes a query and the resource model characterizes attainable compute bandwidth, attainable memory bandwidth, and arithmetic intensity based on peak compute bandwidth and peak memory bandwidth of the processing unit. The system determines a resource allocation of the processing unit, based on the predicted performance impact and instructs the processing unit to allocate the resources for processing the workload based on the determined resource allocation.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

96.

TRANSPARENTLY PROVIDING VIRTUALIZATION FEATURES TO UNENLIGHTENED GUEST OPERATING SYSTEMS

      
Application Number US2023031783
Publication Number 2024/081072
Status In Force
Filing Date 2023-08-31
Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Lin, Jin
  • Hepkin, David Alan
  • Ebersol, Michael Bishop
  • Kurjanowicz, Matthew David
  • Bhandari, Aditya
  • Mainetti, Attilio
  • Parish, Amy Anthony

Abstract

Transparently providing a virtualization feature to an unenlightened guest operating system (OS). A guest partition, corresponding to a virtual machine, is divided into a first guest privilege context and a second guest privilege context. A compatibility component executes within the first guest privilege context, while a guest OS executes within the second guest privilege context. The compatibility component is configured to intercept input/output (I/O) operations associated with the guest operating OS. Based on the compatibility component intercepting an I/O operation associated with the guest OS, the compatibility component processes the I/O operation using a virtualization feature that is unsupported by the guest OS. Examples of the virtualization feature include accelerated access to a hardware device and virtual machine guest confidentiality.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

97.

VISUALIZATION OF APPLICATION CAPABILITIES

      
Application Number US2023031784
Publication Number 2024/081073
Status In Force
Filing Date 2023-08-31
Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Dhatchina Moorthy, Madhan Kumar
  • Spaidal, Christopher Bradley
  • Lesnoy, Dmitry

Abstract

A systematic mechanism for visualizing functions or capabilities that an application has. One or more user experience objects are generated corresponding to an application. An application definition is obtained for that application, and then multiple user experience templates are identified based on that application definition. Information from the application definition is then used to populate at least one of the user experience templates to generate at least one object experience object. The user may then review visualizations of the user experience objects to determine the general capabilities of the application, and thereby determine whether to install or open the application, and how best to use the application.

IPC Classes  ?

  • G06F 8/38 - Creation or generation of source code for implementing user interfaces
  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 8/61 - Installation

98.

SOURCE CODE PATCH GENERATION WITH RETRIEVAL-AUGMENTED TRANSFORMER

      
Application Number US2023031787
Publication Number 2024/081075
Status In Force
Filing Date 2023-08-31
Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Bakshi, Amandeep Singh
  • Shi, Xin
  • Sundaresan, Neelakantan
  • Svyatkovskiy, Alexey

Abstract

A source code patch generation system uses the context of a buggy source code snippet of a source code program and a hint to predict a source code segment that repairs the buggy source code snippet. The hint is a source code segment that is semantically-similar to the buggy source code snippet where the similarity is based on a context of the buggy source code snippet. An autoregressive deep learning model uses the context of the buggy source code snippet and the hint to predict the most likely source code segment to repair the buggy source code snippet.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 8/36 - Software reuse
  • G06F 8/71 - Version control ; Configuration management
  • G06F 8/75 - Structural analysis for program understanding
  • G06N 3/02 - Neural networks

99.

SELECTIVELY AND INTELLIGENTLY DISPLAYING AUTHENTICATION NOTIFICATIONS TO PROTECT USERS

      
Application Number US2023032808
Publication Number 2024/081095
Status In Force
Filing Date 2023-09-15
Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Bandyopadhyay, Poulomi
  • Luthra, Rajat
  • Walker, Lee Francis
  • Edwards, Zachary Michael
  • Trent, Colin

Abstract

Authentication request notifications are selectively suppressed, reducing notification fatigue and susceptibility to social engineering attacks. Authentication request notifications may be suppressed by not presenting a push notification on the user's phone. The authentication request may still be accessed and approved by manually opening the authenticator app. Notifications may be suppressed based on an estimation that the person attempting to login is not who they say they are. This estimation may be based on applying heuristics and/or machine learning models to the context of the login attempt, such as the IP address that originated the login request, time of day, recent user actions, patterns of previous logins, etc. One heuristic determines that the user has repeatedly ignored notifications caused by a particular IP address. Machine learning models generate a risk score from the login context, and notifications may be suppressed if the risk score exceeds a threshold.

IPC Classes  ?

100.

IDENTITY ANONYMIZATION WITH CONTROLLED MASKING AND FORMAT PRESERVING ENCRYPTION

      
Application Number US2023032809
Publication Number 2024/081096
Status In Force
Filing Date 2023-09-15
Publication Date 2024-04-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Proano, Guillermo Paul

Abstract

Systems are methods are used for facilitating identify anonymization by using controlled masking and encryption of user identifiers, such as UUIDs. A system that manages a UUID converts the UUID into a set of one or more different unique versions of the UUID for one or more corresponding different partner system(s) by removing and replacing masked portions of the UUID and by selectively encrypting the non-masked portions of the UUID. New masked portions added to the new version(s) of the UUID identify different corresponding partner(s) and/or rules to be applied by the different partner(s) when handling the different unique version(s) of the UUID(s). Partner systems that receive the new versions of the UUID identify and utilize the new masked portions to deterministically control decrypting and/or other processing of the new version of the UUID.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/40 - Network security protocols
  1     2     3     ...     100        Next Page