Microsoft Technology Licensing, LLC

United States of America

Back to Profile

1-100 of 791 for Microsoft Technology Licensing, LLC Sort by
Query
Patent
Canada - CIPO
Aggregations Reset Report
Date
2023 12
2022 12
2021 24
2020 32
2019 22
See more
IPC Class
G06F 3/14 - Digital output to display device 51
G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer 49
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs 34
G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means 20
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system 20
See more
Status
Pending 157
Registered / In Force 634
Found results for  patents
  1     2     3     ...     8        Next Page

1.

NETWORK COMMUNICATION USING PROOF OF PRESENCE

      
Document Number 03234873
Status Pending
Filing Date 2022-10-26
Open to Public Date 2023-05-19
Owner MICROSOFT TECHNOLOGY LICENSING, LLC. (USA)
Inventor
  • Patel, Ankur
  • Murdoch, Brandon
  • Rastogi, Preeti
  • Kasselman, Pieter Retief
  • Thomas, William Louis

Abstract

Technology that permits two computing systems to communicate with each other with high confidence that a particular entity is present at the other computing system. As an example, when a first computing system communicates with a second computing system, the first computing system may regularly verify that a particular entity is present at the second computing system. The first computing system is actually in control of a proof capture component on the second computing system. The first computing system causes the second computing system to automatically generate proof of presence, the proof evidencing that the particular entity is present at the second computing system. The first computing system also causes the second computing system to include the generated presence proof when communicating from the second computing system to the first computing system.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

2.

DYNAMIC LOADING FOR A SWITCHING POWER SUPPLY

      
Document Number 03229386
Status Pending
Filing Date 2022-07-25
Open to Public Date 2023-04-06
Owner MICROSOFT TECHNOLOGY LICENSING, LLC. (USA)
Inventor
  • Fong, Chee Kiong
  • Shew, Geoffrey Jason
  • Tin, Suet Fong
  • Volkman, Michael R.

Abstract

A power supply unit provides power to a common output node. The power supply unit includes a first power conversion block electrically coupled to convert the electrical power input to a first output power supply share supplied to the common output node. The first power conversion block is configured to decrease output voltage from the first power conversion block based on output current from the first power conversion block reaching a rated current level. A second power conversion block is electrically coupled to convert the electrical power input to a second output power supply share supplied to the common output node. The second power conversion block is configured with a predesignated open circuit voltage setting and is further configured to contribute the second output power supply share to the common output node based on the output voltage at the common output node decreasing to the predesignated electrical voltage setting.

IPC Classes  ?

  • G06F 1/26 - Power supply means, e.g. regulation thereof

3.

ACCESSORY DEVICE COMMUNICATION UTILIZING HOST-SYNCHRONIZED TRANSMISSION

      
Document Number 03229454
Status Pending
Filing Date 2022-08-24
Open to Public Date 2023-03-30
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Lea, Perry Victor
  • Chintalapudi, Krishna Kant
  • Ranta, Steven William
  • Narlanka, Gopala Srihari
  • Adermann, Stanley William

Abstract

A host device includes a processor, a wireless communication device in data communication with the processor, and a hardware storage device in data communication with the processor. The hardware storage device has instructions stored thereon that, when executed by the processor, cause the host device to establish a wireless data channel with an accessory device and assign the wireless data channel to a resource unit with a bandwidth less than 20 MHz. The instructions further cause the host device to send a trigger signal to the accessory device and receive state data from the accessory device in response to the trigger signal.

IPC Classes  ?

  • A63F 13/235 - Input arrangements for video game devices for interfacing with the game device, e.g. specific interfaces between game controller and console using a wireless connection, e.g. infrared or piconet
  • A63F 13/327 - Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers using local area network [LAN] connections using wireless networks, e.g. Wi-Fi or piconet

4.

MAJORANA-BASED QUBITS IN 3D TOPOLOGICAL INSULATOR FLAKES

      
Document Number 03227978
Status Pending
Filing Date 2022-08-12
Open to Public Date 2023-03-09
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Pikulin, Dmitry
  • Lutchyn, Roman

Abstract

Embodiments of the present disclosure includes qubit architectures and qubit elements of a quantum processor. A superconductor region (106) overlaps a three-dimensional topological insulator layer. A vortex region (102) extends through the superconductor region to the three-dimensional topological insulator layer. A peripheral portion (108) of the vortex region is located on an edge (110) of the superconductor region.

IPC Classes  ?

  • G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control

5.

SEMICONDUCTOR-SUPERCONDUCTOR HYBRID DEVICE HAVING A TUNNEL BARRIER

      
Document Number 03229718
Status Pending
Filing Date 2021-09-01
Open to Public Date 2023-03-09
Owner MICROSOFT TECHNOLOGY LICENSING LLC (USA)
Inventor
  • Wang, Jiyin
  • Levajac, Vukan
  • Lemang, Mathilde Flore
  • Kouwenhoven, Leonardus Petrus

Abstract

The disclosed device (400) based on a semiconductor-superconductor hybrid structure comprises a semiconductor component (410), a superconductor component (420) comprising a layer of aluminium, a tunnel barrier (425) of native aluminium oxide layer, and at least one conductive lead (430). The conductive lead is arranged such that the superconductor component shields the semiconductor component from the conductive lead, and the tunnel barrier is arranged between the superconductor component and the at least one conductive lead. Also provided are methods for fabricating and operating the device.

6.

GATING A SEMICONDUCTOR LAYER INTO A QUANTUM SPIN HALL INSULATOR STATE

      
Document Number 03227167
Status Pending
Filing Date 2022-06-23
Open to Public Date 2023-02-09
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Pikulin, Dmitry
  • Winkler, Georg Wolfgang
  • Rechcinski, Rafal Maciej
  • Gresch, Dominik Andre

Abstract

Examples described in this disclosure relate to gating a semiconductor layer into a quantum spin Hall insulator state. Certain examples further relate to using quantum spin Hall insulators as topological quantum qubits. Quantum spin Hall systems may rely upon the quantum spin Hall effect by causing a state of a matter to change from a certain phase to an inverted bandgap phase. In one example, the present disclosure relates to a device including a semiconductor layer (102) comprising an active material. The device further includes a gate (110, 112) coupled to the semiconductor layer, where the semiconductor layer is operable in a quantum spin Hall insulator state by using electrons and holes from the active material in response to an application of an electric field to the semiconductor layer via the gate.

7.

SEMICONDUCTOR-SUPERCONDUCTOR HYBRID DEVICE HAVING SIDE JUNCTIONS

      
Document Number 03227228
Status Pending
Filing Date 2021-08-06
Open to Public Date 2023-02-09
Owner MICROSOFT TECHNOLOGY LICENSING LLC (USA)
Inventor
  • Winkler, Georg Wolfgang
  • Gamble Iv, John King
  • Van Hoogdalem, Kevin Alexander
  • Karimi, Farhad
  • Lutchyn, Roman Mykolayovych
  • Marcus, Charles Masamed
  • Vaitiekenas, Saulius
  • Poschl, Andreas Simon
  • Danilenko, Alisa
  • Sabonis, Deividas
  • O'Farrell, Eoin Conor

Abstract

A semiconductor-superconductor hybrid device (400) comprises a semiconductor component (420) configured to host a 2DEG or a 2DHG; a superconductor component (430) for inducing superconductivity in a channel of the semiconductor component; and a set of depletion gates (452, 545, 456). The superconductor component comprises a grounded strip of superconductor. The depletion gates comprise a first outer gate (452 a, 452 b) for defining a first outer segment of the channel; a second outer gate (456 a, 456b) for defining a second outer segment of the channel; and an inner gate (454 a, 454 b) for defining an inner segment of the channel. The device further comprises a first junction comprising a space between the first outer gate and the inner gate, and a helper gate (470 a) for gating the first space; and a second junction comprising a space between the second outer gate and the inner gate, and a helper gate (470 b) for gating the second space. The helper gates are operable to connect the channel to leads (472 a, 472 b).

IPC Classes  ?

  • G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control

8.

MEASURED RESTART OF MICROCONTROLLERS

      
Document Number 03222550
Status Pending
Filing Date 2022-06-08
Open to Public Date 2023-01-19
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Volos, Stavros
  • Doak, Colin
  • Chambers, Simon Douglas
  • Ruggles, David
  • Neal, Richard
  • Fournet, Cedric Alain Marie
  • Vaswani, Kapil
  • Vembu, Balaji

Abstract

In various examples there is a computing device comprising: a first microcontroller comprising a first immutable bootloader and first mutable firmware. The first immutable bootloader uses a unique device secret burnt into hardware of the computing device in order to generate an attestation of the first mutable firmware. The computing device has a second microcontroller. There is second mutable firmware at the second microcontroller. There is a second immutable bootloader at the second microcontroller which sends a measurement of the second mutable firmware to the first immutable bootloader whenever the second microcontroller restarts, such that the first microcontroller is able to include the measurement in the attestation.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 9/4401 - Bootstrapping

9.

IMPLEMENTING CHANGES MADE TO SOURCE CODE OF RELOADABLE TYPES AT RUNTIME

      
Document Number 03222821
Status Pending
Filing Date 2022-06-29
Open to Public Date 2023-01-19
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Matousek, Tomas

Abstract

Systems and methods for implementing changes made to source code of a program at runtime are provided. In particular, a computing device may execute the source code in a runtime environment and detect changes made to the source code at runtime in the runtime environment. In response to detecting the changes, the computing device may determine if the changes were made to a type in the source code identified as reloadable. In response to determining that the changes were made to the type in the source code identified as reloadable, the computing device may create a new version of the type and perform implementation of the changes to the source code at runtime using the new version of the type.

IPC Classes  ?

10.

EFFICIENTLY ACCESSING REFERENCES TO RECENTLY USED RESOURCES

      
Document Number 03220281
Status Pending
Filing Date 2022-05-20
Open to Public Date 2023-01-05
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Vaid, Avi Ashish
  • Oak, Joseph Jiwoong
  • Mansour, Mohamed

Abstract

A network service maintains a recently used resource list for a user that includes a list of references (e.g., hyperlinks) to resources (e.g., files) recently accessed by the user. An application, such as a web browser application or a web browser extension, periodically retrieves the recently used resource list for the user from the network service. When the application is utilized to display a text entry field, a user interface ("UI") can be provided for inserting references to recently used resources identified in the recently used resource list into the text entry field. Through the UI, the user can select a resource identified in the recently used resource list using appropriate user input (e.g., selection of a resource using a mouse cursor, touch, or keyboard input). In response thereto, a reference (e.g., a hyperlink) to a selected resource can be inserted into the text entry field.

IPC Classes  ?

  • G06F 16/957 - Browsing optimisation, e.g. caching or content distillation

11.

CONTEXT-BASED IMAGE CODING

      
Document Number 03220488
Status Pending
Filing Date 2022-05-23
Open to Public Date 2023-01-05
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Li, Jiahao
  • Li, Bin
  • Lu, Yan

Abstract

According to implementations of the present disclosure, there is provided a context-based image coding solution. According to the solution, a reference image of a target image is obtained. A contextual feature representation is extracted from the reference image, the contextual feature representation characterizing contextual information associated with the target image. Conditional encoding or conditional decoding is performed on the target image based on the contextual feature representation. In this way, the enhancement of the performance is achieved in terms of the reconstruction quality and the compression efficiency.

IPC Classes  ?

  • H04N 19/103 - Selection of coding mode or of prediction mode
  • H04N 19/13 - Adaptive entropy coding, e.g. adaptive variable length coding [AVLC] or context adaptive binary arithmetic coding [CABAC]
  • H04N 19/136 - Incoming video signal characteristics or properties
  • H04N 19/172 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object the region being a picture, frame or field
  • G06N 3/04 - Architecture, e.g. interconnection topology

12.

AUTOMATIC LABELING OF TEXT DATA

      
Document Number 03225020
Status Pending
Filing Date 2022-05-23
Open to Public Date 2023-01-05
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Sewak, Mohit
  • Poluri, Ravi Kiran Reddy
  • Blum, William
  • Chan, Pak On
  • Li, Weisheng
  • Acharya, Sharada Shirish
  • Rudnick, Christian
  • Betser, Michael Abraham
  • Drinic, Milenko
  • Liu, Sihong

Abstract

The technology described herein determines whether a candidate text is in a requested class by using a generative model that may not be trained on the requested class. The present technology may use of a model trained primarily in an unsupervised mode, without requiring a large number of manual user-input examples of a label class. The may produce a semantically rich positive example of label text from a candidate text and label. Likewise, the technology may produce from the candidate text and the label a semantically rich negative example of label text. The labeling service makes use of a generative model to produce a generative result, which estimates the likelihood that the label properly applies to the candidate text. In another aspect, the technology is directed toward a method for obtaining a semantically rich example that is similar to a candidate text.

IPC Classes  ?

13.

DEVICE AND METHOD FOR TERMINATING OPTICAL FIBRE CABLES

      
Document Number 03220320
Status Pending
Filing Date 2022-04-29
Open to Public Date 2022-12-22
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Lang, Ian Dewi
  • Harker, Andrew Thomas
  • Stroud, John R

Abstract

A terminator for an optical fibre cable including at least one microstructured optical fibre comprises: a hollow terminating member with a closed end and an opposite open end configured for cooperation with a severed end of an optical fibre cable; and a tubular collar having a first end into which the open end of the terminating member is received in a sealed manner, and an opposite second end to receive the severed end of the optical fibre cable for cooperation with the open end of the terminating member, the second end having an internal diameter which is reducible to seal the tubular collar around the optical fibre cable.

IPC Classes  ?

  • G02B 6/44 - Mechanical structures for providing tensile strength and external protection for fibres, e.g. optical transmission cables
  • G02B 6/02 - Optical fibres with cladding

14.

ENHANCING GAMING CONTENT FOR PREVIOUSLY DEVELOPED GAMING APPLICATIONS

      
Document Number 03220485
Status Pending
Filing Date 2022-05-18
Open to Public Date 2022-12-22
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Kennett, Daniel Gilbert

Abstract

The present disclosure relates to systems, methods, and computer-readable media for identifying a variety of events that occur within a gaming session and implementing one or more in-game enhancements based on the identified events. For example, a gaming service (e.g., a cloud gaming server) can leverage content analysis and event recognition services on a cloud computing system to detect one or more in-game events based on gaming content (e.g., video content, audio content, controller inputs) that is delivered to a client system. Systems described herein can cause in-game enhancements to be implemented on a client system in response to detected events. Detection of events and implementation of the various enhancements may be performed without significant redevelopment of gaming applications, even where a gaming application has been previously shipped.

IPC Classes  ?

  • A63F 13/355 - Performing operations on behalf of clients with restricted processing capabilities, e.g. servers transform changing game scene into an MPEG-stream for transmitting to a mobile phone or a thin client
  • A63F 13/26 - Output arrangements for video game devices having at least one additional display device, e.g. on the game controller or outside a game booth
  • A63F 13/285 - Generating tactile feedback signals via the game input device, e.g. force feedback
  • A63F 13/537 - Controlling the output signals based on the game progress involving additional visual information provided to the game scene, e.g. by overlay to simulate a head-up display [HUD] or displaying a laser sight in a shooting game using indicators, e.g. showing the condition of a game character on screen
  • A63F 13/65 - Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor automatically by game devices or servers from real world data, e.g. measurement in live racing competition
  • A63F 13/67 - Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor adaptively or by learning from player actions, e.g. skill level adjustment or by storing successful combat sequences for re-use

15.

IMAGE CODEC

      
Document Number 03220279
Status Pending
Filing Date 2022-05-11
Open to Public Date 2022-12-15
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Li, Bin
  • Li, Jiahao
  • Lu, Yan

Abstract

According to implementations of the subject matter described herein, a solution is provided for image codec. In the encoding solution, a coded representation of an objective image is obtained, and an objective function associated with a decoder is determined based on the coded representation. Further, a group of adjustments of a group of parameters are determined based on a comparison between a group of change degrees of the objective function with the group of parameters and a threshold degree, and the group of parameters in the coded representation are adjusted based on the group of adjustments so as to obtain an adjusted coded representation. Further, an objective bitstream of the objective image is obtained based on the adjusted coded representation. Thus, more efficient image encoding can be realized.

IPC Classes  ?

  • H04N 19/12 - Selection from among a plurality of transforms or standards, e.g. selection between discrete cosine transform [DCT] and sub-band transform or selection between H.263 and H.264
  • H04N 19/124 - Quantisation
  • H04N 19/13 - Adaptive entropy coding, e.g. adaptive variable length coding [AVLC] or context adaptive binary arithmetic coding [CABAC]
  • H04N 19/147 - Data rate or code amount at the encoder output according to rate distortion criteria
  • H04N 19/174 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the coding unit, i.e. the structural portion or semantic portion of the video signal being the object or the subject of the adaptive coding the unit being an image region, e.g. an object the region being a slice, e.g. a line of blocks or a group of blocks
  • H04N 19/192 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the adaptation method, adaptation tool or adaptation type used for the adaptive coding the adaptation method, adaptation tool or adaptation type being iterative or recursive
  • H04N 19/463 - Embedding additional information in the video signal during the compression process by compressing encoding parameters before transmission
  • H04N 19/91 - Entropy coding, e.g. variable length coding [VLC] or arithmetic coding

16.

TRUSTED CUSTODY CHAIN FOR VERIFIABLE CLAIMS

      
Document Number 03216881
Status Pending
Filing Date 2022-05-06
Open to Public Date 2022-12-08
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Murdoch, Brandon Brian
  • Patel, Ankur
  • Sachs, Eric Christopher

Abstract

A first chain of custody verifiable claim is received by a second entity from a first entity. The first chain of custody verifiable claim is signed by the first entity and specifies that an object was in the custody of the first entity. A distributed ledger is accessed to verify the first chain of custody verifiable claim. A second chain of custody verifiable claim is generated that embeds the first chain of custody verifiable claim and is signed by the second entity. The second chain of custody verifiable claim is recorded on the distributed ledger. The second chain of custody verifiable claim is provided to a third entity. The second chain of custody verifiable claim is configured to specify to the third entity that the object was in the custody of the second entity.

IPC Classes  ?

  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

17.

USING ENTROPY TO PREVENT INCLUSION OF PAYLOAD DATA IN CODE EXECUTION LOG DATA

      
Document Number 03217477
Status Pending
Filing Date 2022-05-02
Open to Public Date 2022-11-24
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Mola, Jordi

Abstract

Using entropy to prevent inclusion of payload data in code execution log data. Embodiments determine that a payload data item associated with code execution log data has entropy exceeding a defined entropy threshold and identify a particular executable code that interacted with the payload data item. Embodiments then take a preventative action that excludes the payload data item from inclusion with a record of execution of the particular executable code. Examples of preventative actions include preventing the payload data item from being exported from the computer system, preventing the payload data item from being included in the code execution log data, and adding the payload data item to a block list in reference to the particular executable code.

IPC Classes  ?

  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/36 - Preventing errors by testing or debugging of software

18.

HIGH RESOLUTION NEURAL RENDERING

      
Document Number 03211009
Status Pending
Filing Date 2022-03-01
Open to Public Date 2022-09-22
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Garbin, Stephan Joachim
  • Kowalski, Marek Adam
  • Johnson, Matthew Alastair

Abstract

Methods and systems are provided for training a machine learning model to generate density values and radiance components based on positional data, along with a weighting scheme associated with a particular view direction based on directional data to compute a final RGB value for each point along a plurality of camera rays. The positional data and directional data are extracted from set of training images of a particular static scene. The radiance components, density values, and weighting schemes are cached for efficient image data processing to perform volume rendering for each point sampled. A novel viewpoint of a static scene is generated based on the volume rendering for each point sampled.

IPC Classes  ?

19.

DYNAMIC USER-DEVICE UPSCALING OF MEDIA STREAMS

      
Document Number 03198392
Status Pending
Filing Date 2021-10-05
Open to Public Date 2022-05-12
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Lea, Perry Victor

Abstract

A method disclosed herein provides for receiving, at a user device, a media stream including frames of a first resolution generated by a graphics-rendering application and utilizing one or more weight matrices pre-trained in association with the graphics-rendering application to locally upscale each received frame of the media stream at the user device to a second resolution greater than the first resolution. Local upscaling of the media stream may be performed "on the fly," such as with respect to individual content streams (e.g., a game) or segments of content streams (e.g., a scene within a game).

IPC Classes  ?

  • G06N 3/04 - Architecture, e.g. interconnection topology
  • G06T 3/40 - Scaling of a whole image or part thereof

20.

DISAGGREGATED COMPUTER SYSTEMS

      
Document Number 03188707
Status Pending
Filing Date 2021-06-10
Open to Public Date 2022-03-31
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Alissa, Husam A.
  • Manousakis, Ioannis
  • Belady, Christian L.
  • Fontoura, Marcus Felipe
  • Bianchini, Ricardo G.
  • Saunders, Winston Allen
  • Shaw, Mark Edward

Abstract

The discussion relates to disaggregated computing. One example can monitor multiple two-phase liquid immersion tanks. Individual two-phase liquid immersion tanks can contain multiple components of a single type of component type. The example can receive requests for virtual machines and allocate sets of components from individual two-phase liquid immersion tanks to work together to support the virtual machines requests.

IPC Classes  ?

  • H05K 7/20 - Modifications to facilitate cooling, ventilating, or heating

21.

AUTOMATIC NODE FUNGIBILITY BETWEEN COMPUTE AND INFRASTRUCTURE NODES IN EDGE ZONES

      
Document Number 03190966
Status Pending
Filing Date 2021-09-10
Open to Public Date 2022-03-17
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Kurian, Alphonse
  • Pasupuleti, Chandrasekhar
  • Asthana, Arpan Kumar
  • Agrawal, Pushpraj
  • Khan, Humayun Mukhtar

Abstract

A cloud-computing system dynamically manages allocation of infrastructure nodes and compute nodes in an edge zone of the cloud-computing system. The edge zone begins with a first number of infrastructure nodes and a second number of compute nodes. As the edge zone executes customer workloads, the cloud-computing system determines whether the infrastructure nodes are over utilized or under utilized. When the infrastructure nodes are under utilized, the cloud-computing system re-assigns an infrastructure node to the compute nodes. When the infrastructure nodes are over utilized, the cloud-computing system re-assigns a compute node to the infrastructure nodes. In this way, the cloud-computing system dynamically maintains an optimal balance between resources devoted to supporting the edge zone (the infrastructure nodes) and resources devoted to executing customer workloads (the compute nodes). In other words, the cloud-computing system continually maximizes use of edge zone resources for executing the customer workloads while maintaining necessary infrastructure.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

22.

REINFORCEMENT LEARNING BASED RATE CONTROL

      
Document Number 03182110
Status Pending
Filing Date 2020-06-30
Open to Public Date 2022-01-06
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Li, Jiahao
  • Li, Bin
  • Lu, Yan
  • Holcomb, W. Tom
  • Lu, Mei-Hsuan
  • Mezentsev, Andrey
  • Lee, Ming-Chieh

Abstract

Implementations of the subject matter described herein provide a solution for rate control based on reinforcement learning. In this solution, an encoding state of a video encoder is determined, the encoding state being associated with encoding of a first video unit by the video encoder. An encoding parameter associated with rate control in the video encoder is determining by a reinforcement learning model and based on the encoding state of the video encoder. A second video unit different from the first video unit is encoded based on the encoding parameter. In this way, it is possible to achieve a better quality of experience (QOE) for real time communication with computation overhead being reduced.

IPC Classes  ?

  • H04N 19/14 - Coding unit complexity, e.g. amount of activity or edge presence estimation
  • G06N 99/00 - Subject matter not provided for in other groups of this subclass

23.

USING FREE-SPACE OPTICS TO INTERCONNECT A PLURALITY OF COMPUTING NODES

      
Document Number 03182127
Status Pending
Filing Date 2021-05-28
Open to Public Date 2022-01-06
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Saunders, Winston Allen
  • Belady, Christian L.
  • Hsu, Lisa R.
  • Ballani, Hitesh
  • Costa, Paolo
  • Carmean, Douglas

Abstract

A system for using free-space optics to interconnect a plurality of computing nodes can include a plurality of node optical transceivers that are electrically coupled to at least some of the plurality of computing nodes. The system can also include a plurality of router optical transceivers that facilitate free-space optical communications with the plurality of node optical transceivers. Each node optical transceiver among the plurality of node optical transceivers can have a corresponding router optical transceiver that is optically coupled to the node optical transceiver. The system can also include a router that is coupled to the plurality of router optical transceivers. The router can be configured to route the free-space optical communications among the plurality of computing nodes.

IPC Classes  ?

  • H04B 10/112 - Line-of-sight transmission over an extended range

24.

COMPUTER NODE OPTICAL FREE SPACE INTERCONNECTION

      
Document Number 03182151
Status Pending
Filing Date 2021-05-05
Open to Public Date 2022-01-06
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Saunders, Winston Allen
  • Belady, Christian L.
  • Hsu, Lisa Ru-Feng
  • Ballani, Hitesh
  • Costa, Paolo
  • Carmean, Douglas M.

Abstract

A system for using free-space optics to interconnect a plurality of computing nodes can include a plurality of optical transceivers that facilitate free-space optical communications among the plurality of computing nodes. The system may ensure a line of sight between the plurality of computing nodes and the optical transceivers to facilitate the free-space optical communications. The line of sight may be preserved by the position or placement of the computing nodes in the system. The position or placement of the computing nodes may be achieved by using different shaped enclosures for holding the computing nodes.

IPC Classes  ?

25.

GENERATING PHYSIO-REALISTIC AVATARS FOR TRAINING NON-CONTACT MODELS TO RECOVER PHYSIOLOGICAL CHARACTERISTICS

      
Document Number 03182144
Status Pending
Filing Date 2021-04-06
Open to Public Date 2021-12-23
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Mcduff, Daniel J.
  • Hernandez Rivera, Javier
  • Baltrusaitis, Tadas
  • Wood, Erroll William

Abstract

Systems and methods are provided that are directed to generating video sequences including physio-realistic avatars. In examples, an albedo for an avatar is received, a sub-surface skin color associated with the albedo is modified based on physiological data associated with physiologic characteristic, and an avatar based on the albedo and the modified sub-surface skin color is rendered. The rendered avatar may then be synthesized in a frame of video. In some examples, a video including the synthesized avatar may be used to train a machine learning model to detect a physiological characteristic. The machine learning model may receive a plurality of video segments, where one or more of the video segments includes a synthetic physio-realistic avatar generated with the physiological characteristic. The machine learning model may be trained using the plurality of video segments. The trained model may be provided to a requesting entity.

IPC Classes  ?

  • A61B 5/1455 - Measuring characteristics of blood in vivo, e.g. gas concentration, pH-value using optical sensors, e.g. spectral photometrical oximeters
  • G06N 3/02 - Neural networks

26.

ADAPTIVE RADIO CONFIGURATION IN WIRELESS NETWORKS

      
Document Number 03180503
Status Pending
Filing Date 2021-04-22
Open to Public Date 2021-11-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Chakraborty, Tusher
  • Kapetanovic, Zerina
  • Vasisht, Deepak
  • Chandra, Ranveer

Abstract

A wireless networking system is provided. The wireless networking system includes a base station device including processing circuitry configured to detect a transmission rate from a portion of a preamble of an incoming packet transmission signal and adapt a radio configuration to receive a remainder of the incoming packet transmission signal at the transmission rate.

IPC Classes  ?

  • H04B 1/69 - Spread spectrum techniques
  • H04B 1/692 - Hybrid techniques using combinations of two or more spread spectrum techniques
  • H04L 1/00 - Arrangements for detecting or preventing errors in the information received
  • H04L 25/02 - Baseband systems - Details

27.

ACCESS AUTHENTICATION USING OBFUSCATED BIOMETRICS

      
Document Number 03180100
Status Pending
Filing Date 2021-04-21
Open to Public Date 2021-11-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Schonberger, Johannes Lutz
  • Pollefeys, Marc Andre Leon

Abstract

A method for authorizing access to one or more secured computer resources includes obfuscating a reference biometric vector into an obfuscated reference biometric vector using a similarity-preserving obfuscation. An authentication biometric vector is obfuscated into an obfuscated authentication biometric vector using the similarity-preserving obfuscation. A similarity of the obfuscated authentication biometric vector and the obfuscated reference biometric vector is tested. Based on the similarity being within an authentication threshold, access to the one or more secured computer resources is authorized.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

28.

ORCHESTRATED PROXY SERVICE

      
Document Number 03179534
Status Pending
Filing Date 2021-03-19
Open to Public Date 2021-11-04
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Lewin, Guy
  • Khait, Vitaly
  • Haber, Yossi

Abstract

An example proxy server is disclosed. The proxy server includes a plurality of services to process a received network message. Proxy services applicable to the received network message are determined. The applicable proxy services are selected from the plurality of proxy services. The network message is routed to the applicable proxy services for processing.

29.

PRE-SCREENING AND TUNING HETEROJUNCTIONS FOR TOPOLOGICAL QUANTUM COMPUTER

      
Document Number 03170986
Status Pending
Filing Date 2021-01-20
Open to Public Date 2021-09-10
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Pikulin, Dmitry
  • Thomas, Mason L.
  • Nayak, Chetan Vasudeo
  • Lutchyn, Roman Mykolayovych
  • Winkler, Georg Wolfgang
  • Heedt, Sebastian
  • De Lange, Gijsbertus
  • Van Heck, Bernard
  • Martinez, Esteban Adrian
  • Casparis, Lucas
  • Karzig, Torsten

Abstract

A method to evaluate a semiconductor-superconductor heterojunction for use in a qubit register of a topological quantum computer includes measuring a radio-frequency (RF) junction admittance of the semiconductor-superconductor heterojunction to obtain mapping data; finding by analysis of the mapping data one or more regions of a parameter space consistent with an unbroken topological phase of the semiconductor-superconductor heterojunction; measuring a sub-RF conductance including a non-local conductance of the semiconductor-superconductor heterojunction in each of the one or more regions of the parameter space, to obtain refinement data; and finding by analysis of the refinement data a boundary of the unbroken topological phase in the parameter space and a topological gap of the semiconductor-superconductor heterojunction for at least one of the one or more regions of the parameter space.

IPC Classes  ?

  • G06N 10/00 - Quantum computing, i.e. information processing based on quantum-mechanical phenomena

30.

MANAGEMENT OF PROVISIONING OF VIDEO GAME DURING GAME PREVIEW

      
Document Number 03168820
Status Pending
Filing Date 2021-01-20
Open to Public Date 2021-09-02
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Dzjind, Telmen Gerel
  • Astorga, Austin Adrian

Abstract

The present disclosure relates to processing operations configured to manage provisioning of a video game during presentation of a preview of a video game (e.g., video game trailer). Video game previews may be presented through a graphical user interface of an online gaming delivery service. While a video game preview is being presented to a user, a provisioning determination may be made to determine whether to automatically initiate provisioning of a video game (e.g., in the background of the video game preview). For any non-limiting provisioning determination described herein, a state of the provisioning may be determined and graphical indicators of that state information may be presented to a user while the video game preview is being presented. Further examples describe processing related to contextual customization of game previews as well as GUI menus that are used to present game previews.

IPC Classes  ?

  • A63F 13/77 - Game security or game management aspects involving data related to game devices or game servers, e.g. configuration data, software version or amount of memory
  • A63F 13/35 - Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers - Details of game servers
  • A63F 13/85 - Providing additional services to players

31.

REDUCE OS IMAGING TIME USING 'JUST IN TIME' FILE DELIVERY

      
Document Number 03168652
Status Pending
Filing Date 2021-02-02
Open to Public Date 2021-08-12
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Cook, Randall Richards

Abstract

Embodiments are provided for imaging an operating system (OS) by creating a new OS image from an installer OS image copy maintained in durable storage. During the OS imaging, only a subset of OS files from the installer image are fully copied into the new OS image. Placeholder files are created for other files not included in the initial subset of OS files which were determined to be critical for booting of the OS and/or a minimum set of OS functionality. The placeholder files are distinguished from sparse files and are inaccurately presented by the file system as being full copies of the underlying installer OS image. The data for the placeholder files is only copied when requested, on demand, and/or when there is available/unused processing bandwidth that is subsequently identified after rebooting the computing system with the new OS image.

IPC Classes  ?

32.

EFFICIENTLY PROVIDING A GUEST CONTEXT ACCESS TO FILE CONTENT AT A HOST CONTEXT

      
Document Number 03167008
Status Pending
Filing Date 2021-01-27
Open to Public Date 2021-08-05
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Xie, Ping
  • Brender, Scott
  • Chagani, Shaheed Gulamabbas
  • Starks, John Andrew
  • Kishan, Arun U.

Abstract

Using metadata for a contentless file to provide a guest context access to file content. Within a guest context, a filesystem is mounted from a container image which lacks a first file's content and which includes metadata defining properties of the first file and mapping data defining information for identifying a second file within another filesystem from which the first file's content is obtainable. Based on the properties, a filesystem operation involving the first file is performed without switching to a host context, and a requested access to the first file's content is responded to. Responding includes, based on the mapping data, communicating a request for the host context to supply the first file's content and, after returning from a context switch, responding to the requested access by supplying content of the second file from guest memory page(s) which are mapped to host memory page(s) containing the second file's content.

IPC Classes  ?

  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
  • G06F 16/14 - File systems; File servers - Details of searching files based on file metadata
  • G06F 16/188 - Virtual file systems
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

33.

SYSTEMS AND METHODS FOR ERROR RECOVERY

      
Document Number 03166179
Status Pending
Filing Date 2020-12-16
Open to Public Date 2021-07-29
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Pudipeddi, Bharadwaj
  • Mesmakhosroshahi, Maral
  • Xi, Jinwen
  • Kulkarni, Saurabh M.
  • Tremblay, Marc
  • Baenninger, Matthias
  • Claudino Pereira Lopes, Nuno

Abstract

Embodiments of the present disclosure include an error recovery method comprising detecting a computing error, restarting a first artificial intelligence processor of a plurality of artificial intelligence processors processing a data set, and loading a model in the artificial intelligence processor, wherein the model corresponds to a same model processed by the plurality of artificial intelligence processors during a previous processing iteration by the plurality of artificial intelligence processors on data from the data set.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06N 20/00 - Machine learning
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

34.

ADAPTIVE FRAME BATCHING TO REDUCE SPEECH RECOGNITION LATENCY

      
Document Number 03166381
Status Pending
Filing Date 2020-12-15
Open to Public Date 2021-07-22
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Khalil, Hosam A.
  • Stoimenov, Emilian Y.
  • Gong, Yifan
  • Liu, Chaojun
  • Basoglu, Christopher H.
  • Agarwal, Amit K.
  • Parihar, Naveen
  • Pathak, Sayan

Abstract

Embodiments may include collection of a first batch of acoustic feature frames of an audio signal, the number of acoustic feature frames of the first batch equal to a first batch size, input of the first batch to a speech recognition network, collection, in response to detection of a word hypothesis output by the speech recognition network, of a second batch of acoustic feature frames of the audio signal, the number of acoustic feature frames of the second batch equal to a second batch size greater than the first batch size, and input of the second batch to the speech recognition network.

IPC Classes  ?

  • G10L 15/02 - Feature extraction for speech recognition; Selection of recognition unit
  • G10L 15/16 - Speech classification or search using artificial neural networks

35.

LOCK-FREE READING OF UNITARY VALUE SETS

      
Document Number 03166321
Status Pending
Filing Date 2020-11-17
Open to Public Date 2021-07-15
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Stephens, Maoni Zhang
  • Dussud, Patrick Henri

Abstract

Garbage collectors and other software may utilize performant lock-free multithreaded software. Unitary lock-free updates to a set of variables involves an updating value Z, release barriers and acquire barriers that enforce orderings on code execution, and atomicity resulting from variable alignment. Conveyance is accomplished with a values placing step and a values retrieving step. Values placing replaces a non-updated value in Var1 with Z, executes a release barrier, replaces the non-updated values of other variables with update values, executes another release barrier, and replaces Z with the Var1 update value. Values retrieving reads from Var1 into DestVar1A, executes an acquire barrier, reads from the other variables into respective destination variables, executes another acquire barrier, reads from Var1 into DestVar1B, and repeats if DestVar1A is Z or if DestVar1A and DestVar1B are unequal. This solution conveys the update values without locks, as a unit.

IPC Classes  ?

  • G06F 9/52 - Program synchronisation; Mutual exclusion, e.g. by means of semaphores
  • G06F 12/02 - Addressing or allocation; Relocation

36.

PROTECTING COMMERCIAL OFF-THE-SHELF PROGRAM BINARIES FROM PIRACY USING HARDWARE ENCLAVES

      
Document Number 03166320
Status Pending
Filing Date 2020-11-17
Open to Public Date 2021-07-08
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Ge, Xinyang
  • Cui, Weidong
  • Niu, Ben
  • Chen, Ling Tony

Abstract

This disclosure describes systems and methods for protecting commercial off-the-shelf software program code from piracy. A software program may include multiple image files having code and data. A platform may modify the executable file such that the data may be placed at a location in memory that is an arbitrary distance from the code. The platform may encrypt the code and provide it to a computing device comprising a hardware enclave. The computing device may load the encrypted code into the hardware enclave but load the data into memory outside the hardware enclave. The computing device may request a decryption key from an authentication server using a hash of the hardware enclave signed by a processor. The authentication server may provide the decryption key if it verifies the signature and the hash. The computing device may decrypt the code and mark the hardware enclave as non-readable.

IPC Classes  ?

  • G06F 21/54 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by adding security routines or objects to programs
  • G06F 21/12 - Protecting executable software
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

37.

INTEGRATED REFERENCE AND SECONDARY MARKING

      
Document Number 03163334
Status Pending
Filing Date 2020-11-13
Open to Public Date 2021-06-14
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Stephens, Maoni Zhang
  • Dussud, Patrick Henri

Abstract

Managing secondary objects efficiently increases garbage collection concurrency and reduces object storage requirements. Aliveness marking of secondary objects is integrated with aliveness marking of referenced objects. Allocation of reference-sized secondary object identifier fields in objects which are not primary objects is avoided; a dedicated bit specifies primary objects, together with an object relationship table. A primary object is one with at least one secondary object which is deemed alive by garbage collection if the primary object is alive, without being a referenced object of the primary object. Any referenced objects of the alive primary object will also still be deemed alive. Code paths for marking referenced objects can be shared to allow more efficient secondary object marking. Primary-secondary object relationships may be represented in dependent handles, and may be specified in a hash table or other data structure.

IPC Classes  ?

  • G06F 12/02 - Addressing or allocation; Relocation

38.

PARTIAL DOWNLOADS OF COMPRESSED DATA

      
Document Number 03157076
Status Pending
Filing Date 2020-11-10
Open to Public Date 2021-05-20
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor De Icaza Amozurrutia, Miguel

Abstract

A client is able to decompress an internal portion of a compressed file on a server without having to download and decompress the part of the compressed file that precedes the internal portion. Initially, when the file is compressed, the state of the compressor, e.g., a dictionary, is periodically captured and stored in association with positions in the compressed file. A server stores the compressor states and positions in association with the compressed file. The client identifies the internal section of the compressed file to the server. The server selects a compressor state whose position is closest to the internal section. The server sends the client the selected compressor state and the internal portion of the compressed file. The client primes a decompressor with the sent compressor state, and the primed decompressor then decompresses the internal portion of the compressed file.

IPC Classes  ?

  • H03M 7/30 - Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction
  • G06F 16/182 - Distributed file systems

39.

VIRTUAL ENVIRONMENT TYPE VALIDATION FOR POLICY ENFORCEMENT

      
Document Number 03157071
Status Pending
Filing Date 2020-10-23
Open to Public Date 2021-05-06
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Sugandhi, Tushar Suresh
  • Guo, Amber Tianqi
  • Balasubramanyan, Balaji
  • Singh, Abhijat
  • Karademir, Ahmed Saruhan
  • Schultz, Benjamin M.
  • Pulapaka, Hari R.
  • Shubham, Gupta
  • Thomas, Chase
  • Ramirez, Carlos Ernesto Peza

Abstract

Environment type validation can provide a tamper-resistant validation of the computing environment within which the environment type validation is being performed. Such information can then be utilized to perform policy management, which can include omitting verifications in order to facilitate the sharing of policy, such as application licenses, from a host computing environment into a container virtual computing environment. The environment type validation can perform multiple checks, including verification of the encryption infrastructure of the computing environment, verification of code integrity mechanisms of that computing environment, checks for the presence of functionality evidencing a hypervisor, checks for the presence or absence of predetermined system drivers, or other like operating system components or functionality, checks for the activation or deactivation of resource management stacks, and checks for the presence or absence of predetermined values in firmware.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

40.

ENHANCED CONCURRENCY GARBAGE COLLECTION STACK SCANNING

      
Document Number 03153637
Status Pending
Filing Date 2020-10-08
Open to Public Date 2021-04-22
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Mandaleeka, Aditya

Abstract

Garbage collection (GC) to reclaim memory in computing systems sometimes suspends applications, web services, and other mutator programs in order to scan their execution stacks, which reduces their responsiveness. But suspension times are decreased by behavior-driven stack scan optimization (BDSSO) functionality that increases the concurrency of mutator execution with GC stack scanning. BDSSO obtains execution stack frame occurrence data, determines frame execution likelihoods, selects a stack scan depth based on the likelihoods, and installs a scan return barrier at the selected depth. Then the GC scans the execution stack below the barrier while the mutator runs, thus increasing concurrency and improving mutator responsiveness. Selected barrier locations vary according to actual stack activity to provide optimized concurrency instead of using an inflexible approach to barrier placement. Existing profiler samples or virtual machine interfaces can be reused by BDSSO. Skinny samples that lack profiler performance data may also be used.

IPC Classes  ?

  • G06F 9/448 - Execution paradigms, e.g. implementations of programming paradigms
  • G06F 12/02 - Addressing or allocation; Relocation

41.

INDEXING AND REPLAYING TIME-TRAVEL TRACES USING DIFFGRAMS

      
Document Number 03150188
Status Pending
Filing Date 2020-06-17
Open to Public Date 2021-03-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Mola, Jordi

Abstract

Utilizing diffgrams for trace indexing and replay. A subset of instructions of a trace, beginning with a first instruction and ending with a second instruction, are replayed to obtain state of one or more named resources. Based on replaying the subset of instructions, a diffgram is generated, which is structured such that addition of the diffgram at the first instruction brings the one or more named resources to the second state, and subtraction of the diffgram at the second instruction brings the one or more named resource to the first state. A pat of reaching a target instruction, the diffgram is later added at the first instruction to restore the second state at the second instruction, or subtracted at the second instruction to restore the first state of the first instruction.

IPC Classes  ?

  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/36 - Preventing errors by testing or debugging of software

42.

DEFERRING CACHE STATE UPDATES IN A NON-SPECULATIVE CACHE MEMORY IN A PROCESSOR-BASED SYSTEM IN RESPONSE TO A SPECULATIVE DATA REQUEST UNTIL THE SPECULATIVE DATA REQUEST BECOMES NON-SPECULATIVE

      
Document Number 03150177
Status Pending
Filing Date 2020-06-17
Open to Public Date 2021-03-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Kothinti Naresh, Vignyan Reddy
  • Perais, Arthur
  • Al Sheikh, Rami Mohammad
  • Priyadarshi, Shivam

Abstract

Deferring cache state updates in a non-speculative cache memory in a processor-based system in response to a speculative data request until the speculative data request becomes non-speculative is disclosed. The updating of at least one cache state in the cache memory resulting from a data request is deferred until the data request becomes non-speculative. Thus, a cache state in the cache memory is not updated for requests resulting from mispredictions. Deferring the updating of a cache state in the cache memory can include deferring the storing of received speculative requested data in the main data array of the cache memory as a result of a cache miss until the data request becomes non-speculative. The received speculative requested data can first be stored in a speculative buffer memory associated with a cache memory, and then stored in the main data array if the data request becomes non-speculative.

IPC Classes  ?

  • G06F 12/0802 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
  • G06F 12/0862 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches with prefetch
  • G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode

43.

HARDWARE ACCELERATION FOR FUNCTION PROCESSING

      
Document Number 03147433
Status Pending
Filing Date 2020-06-11
Open to Public Date 2021-03-04
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Tandon, Prateek
  • Corell, Brian Jacob

Abstract

A function processing service may receive a request to execute source code. The source code may include instructions to perform a function. The function processing service may determine whether at least one hardware acceleration condition has been satisfied for the function. If at least one hardware acceleration condition has been satisfied, the instructions in the source code may be translated into hardware-specific code corresponding to a hardware circuit. The hardware circuit may be configured based on the hardware-specific code, and the hardware circuit may perform the function. The function processing service may then provide the result obtained from the hardware circuit to the requesting entity.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 8/41 - Compilation
  • G06F 15/78 - Architectures of general purpose stored program computers comprising a single central processing unit

44.

DATA PRESERVATION USING MEMORY APERTURE FLUSH ORDER

      
Document Number 03147608
Status Pending
Filing Date 2020-06-15
Open to Public Date 2021-02-25
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Bulusu, Mallik
  • Nguyen, Tom L.
  • Ladkani, Neeraj
  • Mysore Shantamurthy, Ravi

Abstract

Combined operational steps and device characteristics help preserve data against integrity threats. Data is divided into critical data and non-critical data, based on criteria such as customer requirements, workload criticality, or virtual machine criticality. Data may be generated in a compute node for storage in a storage node, for example. Critical data is stored in a battery-backed memory aperture at physical addresses where it will be flushed ahead of the non-critical data due to a flush order imposed by or on the battery-backed memory, e.g., a bottom-up NVDIMM flush order. Redundant copies of the data (especially non-critical data) may also be kept in case it does not get flushed in time. Battery-backed memory apertures are sized and located according to their battery's characteristics, and may be relocated or resized as conditions change. Flush defragging is performed to optimize use of the aperture, especially within the portion that holds critical data.

IPC Classes  ?

  • G06F 12/02 - Addressing or allocation; Relocation
  • G06F 12/0868 - Data transfer between cache memory and other subsystems, e.g. storage devices or host systems
  • G06F 3/06 - Digital input from, or digital output to, record carriers
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

45.

TENSOR-BASED HARDWARE ACCELERATOR INCLUDING A SCALAR-PROCESSING UNIT

      
Document Number 03146416
Status Pending
Filing Date 2020-06-10
Open to Public Date 2021-02-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Reinhardt, Steven Karl
  • Mayer, Joseph Anthony, Ii
  • Zhang, Dan

Abstract

A computing system is described herein that expedites deep neural network (DNN) operations or other processing operations using a hardware accelerator. The hardware accelerator, in turn, includes a tensor-processing engine that works in conjunction with a scalar-processing unit (SPU). The tensor-processing engine handles various kinds of tensor-based operations required by the DNN, such as multiplying vectors by matrices, combining vectors with other vectors, transforming individual vectors, etc. The SPU performs scalar-based operations, such as forming the reciprocal of a scalar, generating the square root of a scalar, etc. According to one illustrative implementation, the computing system uses the same vector-based programmatic interface to interact with both the tensor-processing engine and the SPU.

IPC Classes  ?

  • G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode
  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline, look ahead
  • G06F 17/16 - Matrix or vector computation
  • G06N 3/02 - Neural networks

46.

MEDIA PROVENANCE CERTIFICATION VIA FRAGILE WATERMARKING

      
Document Number 03142746
Status Pending
Filing Date 2020-06-09
Open to Public Date 2021-01-21
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Malvar, Henrique S.
  • England, Paul
  • Horvitz, Eric J.

Abstract

Systems and methods to determine when a media is a high-fidelity reproduction of an original media from a trusted entity are disclosed. In certain aspects, systems and method for generating a fragile watermark are disclosed. The fragile watermark may be inserted into digital media in a manner such that the watermark cannot be identified if the media content is significantly altered. Media content may be subsequently analyzed to determine the presence of a fragile watermark. When the fragile watermark is present, provenance of the media content can be verified and an indication of provenance is provided to the user.

IPC Classes  ?

47.

USING SECURE MEMORY ENCLAVES FROM THE CONTEXT OF PROCESS CONTAINERS

      
Document Number 03143459
Status Pending
Filing Date 2020-06-08
Open to Public Date 2021-01-14
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Renke, Maxwell Christopher
  • Stark, Taylor James
  • Schultz, Benjamin M.
  • Viswanathan, Giridhar
  • Smith, Frederick Justus
  • Thomas, Deepu Chandy
  • Pulapaka, Hari R.
  • Guo, Amber Tianqi

Abstract

Memory is partitioned and isolated in container-based memory enclaves. The container-based memory enclaves have attestable security guarantees. During provisioning of the container-based memory enclaves from a container image, a purported link in the container to a memory address of the enclave is modified to verifiably link to an actual memory address of the host, such as partitioned memory enclave. In some instances, enclave attestation reports can be validated without transmitting corresponding attestation requests to remote attestation services, based on previous attestation of one or more previous container attestation reports from a similar container and without requiring end-to-end attestation between the container and remote attestation service for each new attestation request.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
  • G06F 21/79 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
  • G06F 12/14 - Protection against unauthorised use of memory

48.

HARDWARE-BASED MEMORY COMPRESSION

      
Document Number 03142618
Status Pending
Filing Date 2019-07-02
Open to Public Date 2021-01-07
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Zhang, Lintao
  • Bennett, John G.
  • Li, Bojie

Abstract

A compressed memory is divided into a plurality of segments, each segment is divided into a plurality of sub-segments, and each sub-segment in an uncompressed data space is compressed into block (s) in a compressed data space. Upon a read request to a sub-segment in a segment in compressed memory is received, the corresponding entry is firstly determined based on a first level address mapping between the sub-segment and the entry, and then the corresponding block (s) is determined based on a second level address mapping between the entry and the block (s). By use of two-level address mappings, the size of entry can be reduced, thereby achieving low metadata overhead. Moreover, the proposed data layout for compressed memory.

IPC Classes  ?

  • G06F 12/06 - Addressing a physical block of locations, e.g. base addressing, module addressing, address space extension, memory dedication

49.

DYNAMIC ALLOCATION OF COMPUTING RESOURCES

      
Document Number 03139693
Status Pending
Filing Date 2020-05-04
Open to Public Date 2020-12-30
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Zhang, Quanlu
  • Yang, Fan
  • Zhou, Lidong
  • Yang, Mao
  • Zhao, Hanyu
  • Han, Zhenhua

Abstract

According to implementations of the subject matter, a solution of dynamic management of computing resource is provided. In the solution, a first request for using a target number of computing resource in a set of computing resources is received, wherein at least one free computing resource of the set of computing resources is organized into at least one free resource group. When it is determined that a free matching resource group is absent from the first resource group and a free redundant resource group is present in at least one free resource group, the target number of computing resources are allocated for the first request by splitting the free redundant resource group, wherein the number of resources in the free redundant resource group is greater than the target number. Therefore, the dynamic allocation of computing resources is enabled.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

50.

VISUAL PROGRAMMING FOR DEEP LEARNING

      
Document Number 03139706
Status Pending
Filing Date 2020-05-06
Open to Public Date 2020-12-30
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Lin, Haoxiang
  • Chen, Cheng
  • Yang, Mao
  • Liu, Shuguang

Abstract

Implementations of the present disclosure relate to visual programming for deep learning. A computer-implemented method comprises presenting a visual representation of an artificial neural network, the visual representation comprising graphical elements representing layers of the artificial neural network; in response to receiving a drag-and-drop operation on the graphical elements, modifying an intermediate representation of the artificial neural network, wherein the intermediate representation is independent of a deep learning framework and the drag-and-drop operation is configured to modify connections between the graphical elements; and modifying, based on the intermediate representation of the artificial neural network, code of the artificial neural network for a target deep learning framework.

IPC Classes  ?

  • G06F 8/34 - Graphical or visual programming

51.

TECHNIQUES TO SET FOCUS IN CAMERA IN A MIXED-REALITY ENVIRONMENT WITH HAND GESTURE INTERACTION

      
Document Number 03138681
Status Pending
Filing Date 2020-04-24
Open to Public Date 2020-12-03
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Lei, Maria Cheng
  • Jain, Vishal
  • Dangi, Vikramaditya

Abstract

An adjustable-focus PV (picture/video) camera in a mixed-reality head-mounted display (HMD) device operates with an auto-focus subsystem that is configured to be triggered based on location and motion of a user's hands to reduce the occurrence of auto-focus hunting during camera operations. The HMD device is equipped with a depth sensor that is configured to capture depth data from the surrounding physical environment to detect and track the user's hand location, movements, and gestures in three-dimensions. The hand tracking data from the depth sensor may be assessed to determine hand characteristics - such as which of the user's hands or part of a hand is detected, its size, motion, speed, etc. - within a particular region of interest (ROI) in the field of view of the PV camera. The auto-focus subsystem uses the assessed hand characteristics as an input to control auto-focus of the PV camera to reduce auto-focus hunting occurrences.

IPC Classes  ?

  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G02B 7/28 - Systems for automatic generation of focusing signals
  • G03B 13/36 - Autofocus systems

52.

NEURAL NETWORK FOR SEARCH RETRIEVAL AND RANKING

      
Document Number 03138920
Status Pending
Filing Date 2020-03-25
Open to Public Date 2020-12-03
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Rosset, Corbin Louis
  • Mitra, Bhaskar
  • Hawking, David Anthony
  • Craswell, Nicholas Eric
  • Diaz, Fernando
  • Yilmaz, Emine

Abstract

Described herein is a mechanism for utilizing a neural network to identify and rank search results. A machine learning model is trained by converting training data comprising query-document entries into query term-document entries. The query term-document entries are utilized to train the machine learning model. A set of query terms are identified. The query terms can be derived from a query history. The trained machine learning model is used to calculate document ranking scores for the query terms and the resultant scores are stored in a pre-calculated term-document index. A query to search the document index is broken down into its constituent terms and an aggregate document ranking score is calculated from a weighted sum of the document ranking scores corresponding to the individual query terms. Because the term-document index can be pre-calculated, it can be downloaded to provide deep learning search capabilities in a computationally limited environment.

IPC Classes  ?

  • G06F 16/951 - Indexing; Web crawling techniques
  • G06F 16/31 - Indexing; Data structures therefor; Storage structures
  • G06F 16/335 - Filtering based on additional data, e.g. user or group profiles

53.

IMAGE-BASED LOCALIZATION

      
Document Number 03137709
Status Pending
Filing Date 2020-03-25
Open to Public Date 2020-11-26
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Schonberger, Johannes Lutz
  • Pollefeys, Marc Andre Leon

Abstract

A method for image-based localization includes, at a camera device, capturing a plurality of images of a real-world environment. A first set of image features are detected in a first image of the plurality of images. Before additional sets of image features are detected in other images of the plurality, the first set of image features is transmitted to a remote device configured to estimate a pose of the camera device based on image features detected in the plurality of images. As the additional sets of image features are detected in the other images of the plurality, the additional sets of image features are transmitted to the remote device. An estimated pose of the camera device is received from the remote device.

IPC Classes  ?

  • G06T 7/70 - Determining position or orientation of objects or cameras
  • G06V 10/40 - Extraction of image or video features
  • G06V 10/74 - Image or video pattern matching; Proximity measures in feature spaces
  • G06V 20/00 - Scenes; Scene-specific elements

54.

EFFICIENT FRESHNESS CRAWL SCHEDULING

      
Document Number 03138392
Status Pending
Filing Date 2020-03-17
Open to Public Date 2020-11-26
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Kolobov, Andrey
  • Lu, Cheng
  • Horvitz, Eric J.
  • Peres, Yuval

Abstract

The technology described herein builds an optimal refresh schedule by minimizing a cost function constrained by an available refresh bandwidth. The cost function receives an importance score for a content item and a change rate for the content item as input in order to optimize the schedule. The cost function is considered optimized when a refresh schedule is found that minimizes the cost while using the available bandwidth and no more. The technology can build an optimized schedule to refresh content with incomplete change data, content with complete change data, or a mixture of content with and without complete change data. It can also re-learn content item change rates from its own schedule execution history and re-compute the refresh schedule, ensuring that this schedule takes into account the latest trends in content item updates.

IPC Classes  ?

55.

ACTIVATION MANAGEMENT FOR MULTIPLE VOICE ASSISTANTS

      
Document Number 03138926
Status Pending
Filing Date 2020-03-26
Open to Public Date 2020-11-26
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Trufinescu, Adina Magdalena
  • Brush, Alice Jane Bernheim
  • Endres, Kevin J.
  • Stifelman, Lisa J.

Abstract

A system and method include detection of a user utterance of one of plurality of voice keywords, each of the plurality of voice keywords associated with a respective voice assistant application, determination, in response to the detection of the one of the plurality of respective voice keywords, of whether any of the plurality of voice assistant applications are designated as uninterruptable, and, if it is determined that none of the plurality of voice assistant applications are designated as uninterruptable, activation of the one of the plurality of voice assistant applications associated with the detected keyword.

IPC Classes  ?

  • G06F 9/451 - Execution arrangements for user interfaces
  • G06F 3/16 - Sound input; Sound output

56.

MITIGATION OF RANSOMWARE IN INTEGRATED, ISOLATED APPLICATIONS

      
Document Number 03138850
Status Pending
Filing Date 2020-04-13
Open to Public Date 2020-11-26
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Schwartz, Jonathan David
  • Tarnouskaya, Anastasiya

Abstract

Methods, systems, apparatuses, and computer program products are provided for enabling access to a resource in a secured manner. A token request from an application executing in a first computing environment may be received in a second computing environment. The second computing environment may assign a trust level to the received token request that indicates that the first computing environment may not be trusted. The token request, along with the trust level, may be provided to an authorization server to generate an authorization token that includes a trust indication indicative of the trust level of the second computing environment. When the application executing in the second computing environment transmits the authorization token to a resource manager to access a resource, the resource manager may be configured to perform a precautionary action to protect the resource prior to providing access, such as creating a backup of the resource.

IPC Classes  ?

  • G06F 21/44 - Program or device authentication
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

57.

ADAPTABLE REAL-TIME COMMUNICATIONS PLUGIN FOR VIRTUAL DESKTOP INFRASTRUCTURE SOLUTIONS

      
Document Number 03137342
Status Pending
Filing Date 2020-04-14
Open to Public Date 2020-11-19
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Hinnant, Neil R.
  • Howard, Matthew C.
  • Vertido, Rafael Vincent Prieto

Abstract

A plugin works with a remote desktop client that is executing on a client computing device to present a user interface of a communications application that is executing in a cloud computing environment. The plugin enables the remote desktop client to conduct audio and/or video communication with a remote computing device in a peer-to-peer manner rather than via the communications application. The plugin also enables the remote desktop client to determine a hardware-based media processing capability of the client computing device and leverage such capability in conducting the peer-to-peer audio and/or video communication with the remote computing device. Such hardware-based media processing capability may be used, for example, to process media received from the remote computing device, to process media captured from a media source of the client computing device, or as a basis for negotiating a media communication parameter with the remote computing device.

IPC Classes  ?

  • G06F 9/451 - Execution arrangements for user interfaces
  • H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
  • H04L 65/1069 - Session establishment or de-establishment
  • H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
  • H04L 65/80 - Responding to QoS
  • H04L 67/104 - Peer-to-peer [P2P] networks

58.

TECHNIQUES FOR GENERATING A QUERY IMAGE

      
Document Number 03137871
Status Pending
Filing Date 2020-03-17
Open to Public Date 2020-11-12
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Yada, Ravi Theja
  • Wang, Yan
  • Astrakhantsev, Nikita
  • Sacheti, Arun

Abstract

A computer-implemented technique is described herein for performing an image-based search that allows a user to create a custom query image that expresses the user's search intent. The technique generates the query image based on one or more input images and/or one or more information items that describe at least one desired characteristic of the query image. The technique then submits the query image to a search engine, and, in response, receives a set of candidate images that match the query image. In one implementation, the technique constructs the query image using a decoder neural network that operates on a mixed latent variable vector. In one approach, the technique uses a generative adversarial network (GAN) to produce the decoder neural network.

IPC Classes  ?

  • G06F 16/532 - Query formulation, e.g. graphical querying
  • G06F 16/583 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content

59.

HIGH-DENSITY OPTICAL DATA RECORDING

      
Document Number 03138504
Status Pending
Filing Date 2020-03-10
Open to Public Date 2020-11-12
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Black, Richard John
  • Anderson, Patrick Neil
  • Drevinskas, Rokas
  • Donnelly, Austin Nicholas
  • Williams, Hugh David Paul

Abstract

A method to record data in a solid substrate comprises modulating a polarization angle of a coherent optical pulsetrain, and, while the polarization angle is being modulated, focusing the coherent optical pulsetrain on a locus moving through the solid substrate at a relative velocity. Here the relative velocity, a width of the locus in a direction of the relative velocity, and a rate of modulation of the polarization angle are such that the substrate receives within the width of the locus two or more pulses of the optical pulsetrain differing in polarization angle. In this manner, the two or more pulses record, in different portions of the substrate within the width of the locus, two or more different symbols.

IPC Classes  ?

60.

CUSTOMIZED OUTPUT TO OPTIMIZE FOR USER PREFERENCE IN A DISTRIBUTED SYSTEM

      
Document Number 03132837
Status Pending
Filing Date 2020-03-17
Open to Public Date 2020-11-05
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Yoshioka, Takuya
  • Stolcke, Andreas
  • Chen, Zhuo
  • Dimitriadis, Dimitrios Basile
  • Zeng, Nanshan
  • Qin, Lijuan
  • Hinthorn, William Isaac
  • Huang, Xuedong

Abstract

Systems and methods for providing customized output based on a user preference in a distributed system are provided. In example embodiments, a meeting server or system receives audio streams from a plurality of distributed devices involved in an intelligent meeting. The meeting system identifies a user corresponding to a distributed device of the plurality of distributed devices and determines a preferred language of the user. A transcript from the received audio streams is generated. The meeting system translates the transcript into the preferred language of the user to form a translated transcript. The translated transcript is provided to the distributed device of the user.

IPC Classes  ?

  • G06F 40/58 - Use of machine translation, e.g. for multi-lingual retrieval, for server-side translation for client devices or for real-time translation
  • G10L 17/20 - Pattern transformations or operations aimed at increasing system robustness, e.g. against channel noise or different working conditions
  • G10L 13/00 - Speech synthesis; Text to speech systems

61.

BLENDING VIRTUAL ENVIRONMENTS WITH SITUATED PHYSICAL REALITY

      
Document Number 03132796
Status Pending
Filing Date 2020-03-17
Open to Public Date 2020-10-29
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Wilson, Andrew D.
  • Holz, Christian
  • Ofek, Eyal
  • Hartmann, Jeremy

Abstract

Various embodiments are provided herein for tracking a user's physical environment, to facilitate on-the-fly blending of a virtual environment with detected aspects of the physical environment. Embodiments can be employed to facilitate virtual roaming by compositing virtual representations of detected physical objects into virtual environments. A computing device coupled to a HMD can select portions of a depth map generated based on the user's physical environment, to generate virtual objects that correspond to the selected portions. The computing device can composite the generated virtual objects into an existing virtual environment, such that the user can traverse the virtual environment while remaining aware of their physical environment. Among other things, the computing device can employ various blending techniques for compositing, and further provide image pass-through techniques for selective viewing of the physical environment while remaining fully-immersed in virtual reality.

IPC Classes  ?

  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G02B 27/01 - Head-up displays

62.

POWER PLUG RETENTION DEVICE

      
Document Number 03135158
Status Pending
Filing Date 2020-03-26
Open to Public Date 2020-10-22
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Cannon, Lawrence Dale

Abstract

A power plug retention device for use with a power plug inserted in a power receptacle is provided. The power plug retention device includes a body including an insertion portion and a gripping portion formed along an insertion axis of the body. The insertion portion is shaped as a wedge configured to be inserted in a gap between the power plug and the power receptacle. The gripping portion includes an insertion force receiving surface formed orthogonal to the insertion axis and configured to receive an insertion force from a user in an insertion direction along the insertion axis to thereby insert and lodge the wedge in the gap to form an interference fit between the wedge, the power plug, and the power receptacle when the wedge is inserted in the gap.

IPC Classes  ?

  • H01R 13/639 - Additional means for holding or locking coupling parts together after engagement
  • H01R 24/78 - Two-part coupling devices, or either of their cooperating parts, characterised by their overall structure with sockets, clips or analogous contacts and secured to apparatus or structure, e.g. to a wall with additional earth or shield contacts

63.

ARCHITECTURES FOR MODELING COMMENT AND EDIT RELATIONS

      
Document Number 03135387
Status Pending
Filing Date 2020-03-19
Open to Public Date 2020-10-22
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Zhang, Xuchao
  • Jauhar, Sujay Kumar
  • Gamon, Michael

Abstract

Generally discussed herein are devices, systems, and methods for determining a relationship between an edit and a comment. A system can include a memory to store parameters defining a machine learning (ML) model, the ML model to determine a relationship between an edit, by an author or reviewer, of content of a document and a comment, by a same or different author or reviewer, regarding the content of the document, and processing circuitry to provide the comment and the edit as input to the ML model, and receive, from the ML model, data indicating a relationship between the comment and the edit, the relationship including whether the edit addresses the comment or a location of the content that is a target of the comment.

IPC Classes  ?

64.

HYBRID RENDERING

      
Document Number 03132825
Status Pending
Filing Date 2020-03-09
Open to Public Date 2020-10-15
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Frommhold, Dag Birger
  • Lyons, Jonathan Michael
  • Thaut, Benjamin Markus
  • Michail, Ashraf Ayman

Abstract

One disclosed example provides a computing device comprising a processing device and a storage device storing instructions executable by the processing device to execute in a first local process an application that outputs digital content for rendering and display. During execution of the application, the instructions are executable to provide, to a second local or remote process, object information regarding an object to be rendered by the second local or remote process, receive, from the second local or remote process, a rendering of the object, output the rendering of the object to display the object, receive a manipulation made to the object, provide, to the second local or remote process, updated object information based on the manipulation made to the object, receive, from the second local or remote process, an updated rendering of the object, and output the updated rendering of the object to display the object.

IPC Classes  ?

  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06F 9/451 - Execution arrangements for user interfaces

65.

RELATIVE SPATIAL LOCALIZATION OF MOBILE DEVICES

      
Document Number 03132049
Status Pending
Filing Date 2020-01-30
Open to Public Date 2020-09-24
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Pollefeys, Marc Andre Leon

Abstract

To obtain a relative localization between a plurality of mobile devices, a first mobile device observes a second mobile device within a field of view of the first mobile device's camera at time t1, determines a first position of the first mobile device at t1, and receives from the second mobile device a second position of the second mobile device at t1. The first mobile device determines information about the first mobile device's orientation with respect to the second mobile device at t1 based at least in part on the first position and the observation of the second mobile device. The first mobile device identifies two constraints that relate the mobile devices' coordinate systems based at least in part on the second position and the orientation information. The first mobile device's pose relative to the second mobile device may be calculated once at least six constraints are accumulated.

IPC Classes  ?

  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • H04W 4/02 - Services making use of location information
  • G01S 5/00 - Position-fixing by co-ordinating two or more direction or position-line determinations; Position-fixing by co-ordinating two or more distance determinations

66.

REALITY-GUIDED ROAMING IN VIRTUAL REALITY

      
Document Number 03132080
Status Pending
Filing Date 2020-01-31
Open to Public Date 2020-09-17
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Holz, Christian
  • Ofek, Eyal
  • Wilson, Andrew D.
  • Cheng, Lung-Pan
  • Yang, Junrui

Abstract

In various embodiments, computerized methods and systems for dynamically updating a fully-immersive virtual environment based on tracked physical environment data. A computing device coupled to a HMD receives sensor data from a variety of sensors. The computing device can generate a virtual scene based on the received sensor data, whereby the virtual scene includes at least a portion of a virtual path that corresponds to at least a portion of a navigable path determined based on the received sensor data. The computing device can modify the virtual scene include a virtual obstruction that corresponds to a physical object detected based on additional sensor data received from the sensors. The modified virtual scene is presented to the user for display, so that the user can safely traverse the physical environment while staying fully-immersed in the virtual environment.

IPC Classes  ?

  • G02B 27/01 - Head-up displays
  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer

67.

STYLE TRANSFER

      
Document Number 03132064
Status Pending
Filing Date 2020-02-03
Open to Public Date 2020-09-10
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Wang, Jinpeng
  • Lin, Chin-Yew

Abstract

Various implementations of the present disclosure relate to style transfer. In some implementations, a computer-implemented method comprises: obtaining a target object having a first style, a style of the target object being editable; obtaining a reference image including a reference object; obtaining a second style of the reference object, the second style of the reference object being extracted from the reference image; and applying the second style to the target object.

IPC Classes  ?

  • G06F 40/103 - Formatting, i.e. changing of presentation of documents
  • G06V 30/40 - Document-oriented image-based pattern recognition

68.

LATENCY ADJUSTMENT OF USER INPUT DEVICES

      
Document Number 03132068
Status Pending
Filing Date 2020-02-24
Open to Public Date 2020-09-10
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Mcallen, Christopher Michael
  • Bronder, Matthew
  • Goossen, James Andrew
  • Tector, Christopher John
  • Kalache, Hamze

Abstract

Enhanced user input devices and user input interfacing systems are provided herein which can reduce perceived interaction latency. In one example, a method of operating a user input interface on a host system includes identifying a target pace for delivery of user input state to an application, and determining, based at least on the target pace, one or more timing parameters for transfer of the user input state from a user input device. The method also includes indicating the one or more timing parameters to the user input device, wherein the user input device responsively transfers the user input state according to the one or more timing parameters.

IPC Classes  ?

  • A63F 13/22 - Setup operations, e.g. calibration, key configuration or button assignment
  • A63F 13/40 - Processing input control signals of video game devices, e.g. signals generated by the player or derived from the environment
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

69.

REDUCING SYNCHRONIZATION RELIANCE IN GARBAGE COLLECTION MARKING

      
Document Number 03128016
Status Pending
Filing Date 2020-01-22
Open to Public Date 2020-08-13
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Stephens, Maoni Zhang
  • Dussud, Patrick Henri

Abstract

Memory reclamation is tailored to avoid certain synchronization instructions, speeding concurrent garbage collection while preserving data integrity and availability. Garbage collection reclaims objects no longer in use, or other unused areas of memory. Pointers are partitioned into address portions holding address values and garbage collection portions having a special bit. Marking code writes only the garbage collection portions, setting the special bit as a mark reference, relocation candidate, etc. Mutator threads may concurrently mutate the entire pointer to update the address, but mutation does not cause incorrect reclamations or failure of operations such as relocation. Execution speed is increased by avoiding certain synchronization instructions in the garbage collector, and using different atomic writes instead. Mutators run in user or kernel address spaces. The garbage collector may enclose partitioned pointers and their use, to avoid runtime errors by code that expects references to be in a canonical nonpartitioned form.

IPC Classes  ?

  • G06F 12/02 - Addressing or allocation; Relocation

70.

LANGUAGE AND COMPILER THAT GENERATE SYNCHRONOUS DIGITAL CIRCUITS THAT MAINTAIN THREAD EXECUTION ORDER

      
Document Number 03123903
Status Pending
Filing Date 2020-01-04
Open to Public Date 2020-07-23
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Pelton, Blake D.
  • Caulfield, Adrian Michael

Abstract

A multi-threaded programming language and compiler generates synchronous digital circuits that maintain thread execution order by generating pipelines with code paths that have the same number of stages. The compiler balances related code paths within a pipeline by adding additional stages to a code path that has fewer stages. Programming constructs that, by design, allow thread execution to be re-ordered, may be placed in a reorder block construct that releases threads in the order they entered the programming construct. First-in-first-out (FIFO) queues pass local variables between pipelines. Local variables are popped from FIFOs in the order they were pushed, preserving thread execution order across pipelines.

IPC Classes  ?

  • G06F 8/41 - Compilation
  • G06F 30/32 - Circuit design at the digital level
  • G06F 30/327 - Logic synthesis; Behaviour synthesis, e.g. mapping logic, HDL to netlist, high-level language to RTL or netlist

71.

FABRICATION OF A QUANTUM DEVICE

      
Document Number 03123904
Status Pending
Filing Date 2020-01-04
Open to Public Date 2020-07-23
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Aseev, Pavel
  • Caroff-Gaonac'H, Philippe

Abstract

In a masking phase, a first segment of an amorphous mask is formed on an underlying layer of a substrate. The first segment comprises a first set of trenches exposing the underlying layer. In the masking phase, a second segment of the amorphous mask is formed on the underlying layer. The second segment comprises a second set of trenches exposing the underlying layer. The segments are non-overlapping. An open end of one of the first set of trenches faces an open end of one of the second set of trenches, but the ends are separated by a portion of the amorphous mask. In a semiconductor growth phase, semiconductor material is grown, by selective area growth, in the first and second sets of trenches to form first and second sub-networks of nanowires on the underlying layer. The first and second sub-networks of nanowires are joined to form a single nanowire network.

IPC Classes  ?

  • H10N 60/01 - Manufacture or treatment
  • B82Y 10/00 - Nanotechnology for information processing, storage or transmission, e.g. quantum computing or single electron logic
  • B82Y 40/00 - Manufacture or treatment of nanostructures
  • G06N 10/40 - Physical realisations or architectures of quantum processors or components for manipulating qubits, e.g. qubit coupling or qubit control
  • H10N 60/80 - Constructional details
  • C23C 14/04 - Coating on selected surface areas, e.g. using masks

72.

AUTOMATED GENERATION OF MACHINE LEARNING MODELS

      
Document Number 03119027
Status Pending
Filing Date 2019-11-01
Open to Public Date 2020-06-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Dey, Debadeepta
  • Hu, Hanzhang
  • Caruana, Richard A.
  • Langford, John C.
  • Horvitz, Eric J.

Abstract

This document relates to automated generation of machine learning models, such as neural networks. One example system includes a hardware processing unit and a storage resource. The storage resource can store computer-readable instructions cause the hardware processing unit to perform an iterative model-growing process that involves modifying parent models to obtain child models. The iterative model-growing process can also include selecting candidate layers to include in the child models based at least on weights learned in an initialization process of the candidate layers. The system can also output a final model selected from the child models.

IPC Classes  ?

73.

AUTOMATED REAL-TIME HIGH DYNAMIC RANGE CONTENT REVIEW SYSTEM

      
Document Number 03119512
Status Pending
Filing Date 2019-11-27
Open to Public Date 2020-06-11
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Marais, Charles Claudius

Abstract

Methods, systems and computer program products are described herein that enable the identification and correction of incorrect and/or inconsistent tones in the bright regions in an HDR image. A bright region is identified in an image. The bright region is classified into an assigned classification. A luminance value of the bright region is determined and compared to a predefined luminance values corresponding to the classification. The luminance value of the bright region is adjusted to match the predefined luminance values where there is a mismatch. Bright regions including mismatched or incorrect luminance values may be rendered on display to include a visual indicator that such regions include mismatched luminance values.

IPC Classes  ?

  • G06T 5/94 - based on local image properties, e.g. for local contrast enhancement
  • G06T 7/00 - Image analysis

74.

FASTER ACCESS OF VIRTUAL MACHINE MEMORY BACKED BY A HOST COMPUTING DEVICE'S VIRTUAL MEMORY

      
Document Number 03116380
Status Pending
Filing Date 2019-11-14
Open to Public Date 2020-05-28
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Bak, Yevgeniy
  • Iyigun, Mehmet
  • Kishan, Arun U.

Abstract

To increase the speed with which the hierarchical levels of a Second Layer Address Table (SLAT) are traversed as part of a memory access where the guest physical memory of a virtual machine environment is backed by virtual memory assigned to one or more processes executing on a host computing device, one or more hierarchical levels of tables within the SLAT can be skipped or otherwise not referenced. While the SLAT can be populated with memory correlations at hierarchically higher-levels of tables, the page table of the host computing device, supporting the host computing device's provision of virtual memory, can maintain a corresponding contiguous set of memory correlations at the hierarchically lowest table level, thereby enabling the host computing device to page out, or otherwise manipulate, smaller chunks of memory. If such manipulation occurs, the SLAT can be repopulated with memory correlations at the hierarchically lowest table level.

IPC Classes  ?

  • G06F 12/1036 - Address translation using associative or pseudo-associative address translation means, e.g. translation look-aside buffer [TLB] for multiple virtual address spaces, e.g. segmentation
  • G06F 12/1009 - Address translation using page tables, e.g. page table structures
  • G06F 12/109 - Address translation for multiple virtual address spaces, e.g. segmentation
  • G06F 12/126 - Replacement control using replacement algorithms with special data handling, e.g. priority of data or instructions, handling errors or pinning
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 12/02 - Addressing or allocation; Relocation
  • G06F 12/08 - Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems

75.

IMPLEMENTATION OF CORE CELLULAR NETWORKING STACK ON CLOUD INFRASTRUCTURE

      
Document Number 03115984
Status Pending
Filing Date 2019-10-29
Open to Public Date 2020-05-14
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Bainbridge, Noel Andrew
  • Balkwill, Matthew John
  • Radunovic, Bozidar

Abstract

Techniques are described for operating a core cellular network stack on a cloud computing environment (e.g., a public cloud infrastructure). For example, virtualized packet gateways can be run on virtual machines of the cloud computing environment and standard load balancers can distribute network traffic of the cellular network among the virtualized packet gateways. The virtualized packet gateways can be setup with a local cache of an external key-value store containing bearers of the cellular network and process received data plane network packets using the local cache. Bearers can be updated within the cellular network using the external key-value store, and virtualized packet gateways can obtain and use updated bearer details.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04W 88/16 - Gateway arrangements
  • H04L 67/1036 - Load balancing of requests to servers for services different from user content provisioning, e.g. load balancing across domain name servers
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04L 69/22 - Parsing or analysis of headers

76.

TASK DETECTION IN COMMUNICATIONS USING DOMAIN ADAPTATION

      
Document Number 03113940
Status Pending
Filing Date 2019-09-05
Open to Public Date 2020-05-07
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Sim, Robert A.
  • White, Ryen W.
  • Azarbonyad, Hosein

Abstract

Generally discussed herein are devices, systems, and methods for task classification. A method can include modifying a representation of a source sentence of a source sample from a source corpus to more closely resemble a representation of target sentences of target samples from a target corpus, operating, using a machine learning model trained using the modified representation of the source sentence, with the target sample to generate a task label, the task label indicating whether the target sample includes a task, and causing a personal information manager (PIM) to generate a reminder, based on whether the target sample includes the task.

77.

IMPLEMENTING A GRAPHICAL OVERLAY FOR A STREAMING GAME BASED ON CURRENT GAME SCENARIO

      
Document Number 03112906
Status Pending
Filing Date 2019-06-26
Open to Public Date 2020-04-02
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Wheeler, Joseph
  • Novak, Christopher M.
  • Chavez, Aron R.
  • Esselstrom, Tyler
  • Wiest, Peter M.

Abstract

A system is configured to implement a graphical overlay in a streaming game based on a current game state. Game data generated by a video game is received including game video in the form of a video stream containing game video frames. The game video is displayed on a display screen of a computing device to represent the video game to a user playing the video game at the computing device. At least one feature of the video game is identified at least in the game data. A user interface (UI) control configuration associated with the identified at least one feature is selected from among a plurality of UI control configurations for the video game and a graphical overlay corresponding to the selected UI control configuration is implemented on the video game in the display screen.

IPC Classes  ?

  • A63F 13/42 - Processing input control signals of video game devices, e.g. signals generated by the player or derived from the environment by mapping the input signals into game commands, e.g. mapping the displacement of a stylus on a touch screen to the steering angle of a virtual vehicle
  • A63F 13/2145 - Input arrangements for video game devices characterised by their sensors, purposes or types for locating contacts on a surface, e.g. floor mats or touch pads the surface being also a display device, e.g. touch screens
  • A63F 13/22 - Setup operations, e.g. calibration, key configuration or button assignment
  • A63F 13/335 - Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers using wide area network [WAN] connections using Internet
  • A63F 13/355 - Performing operations on behalf of clients with restricted processing capabilities, e.g. servers transform changing game scene into an MPEG-stream for transmitting to a mobile phone or a thin client
  • A63F 13/533 - Controlling the output signals based on the game progress involving additional visual information provided to the game scene, e.g. by overlay to simulate a head-up display [HUD] or displaying a laser sight in a shooting game for prompting the player, e.g. by displaying a game menu
  • A63F 13/67 - Generating or modifying game content before or while executing the game program, e.g. authoring tools specially adapted for game development or game-integrated level editor adaptively or by learning from player actions, e.g. skill level adjustment or by storing successful combat sequences for re-use

78.

TECHNIQUES FOR DISPLAYING A SHADER TABLE ASSOCIATED WITH RAYTRACING IMAGES

      
Document Number 03104277
Status Pending
Filing Date 2019-06-19
Open to Public Date 2020-01-23
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Kinross, Austin Neil
  • Patel, Amar

Abstract

Examples described herein generally relate to intercepting, from a graphics processing unit (GPU) or a graphics driver, a buffer that specifies one or more shader records of a shader table to use in generating the image using raytracing, determining, based at least in part on an identifier of the one or more shader records, a layout of the one or more shader records, interpreting, based at least in part on the layout, additional data in the buffer to determine one or more parameters corresponding to the one or more shader records, and displaying, via an application, an indication of the one or more parameters on an interface.

IPC Classes  ?

79.

COUPLING A PEN DEVICE TO A COMPANION DEVICE BASED ON PEN PROXIMITY

      
Document Number 03104058
Status Pending
Filing Date 2019-06-19
Open to Public Date 2020-01-16
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Gilbert, Jay
  • Gorgenyi, Frank
  • Gur, Arie Yehuda
  • Kudryavtsev, Maxim
  • Michaud, Alain L.
  • Ramadas, Rahul
  • Ron, Uri
  • Wilson, Daryl M.

Abstract

The disclosure herein describes coupling a stylus and a computing device. Based on a tip of a stylus being brought proximate to a display of a computing device configured to communicate in accordance with a wireless protocol, the computing device is configured to receive a stylus wireless protocol identifier and transmit a wireless protocol identifier of the computing device and one or more security keys to the stylus via a communication channel in response, whereby the stylus and computing device are coupled. Based on receiving a signal associated with user input from the coupled stylus using the wireless protocol, the computing device performs an operation based on the signal. The described "loose coupling" enables streamlined use of styluses with compatible computing devices without requiring full pairing.

IPC Classes  ?

  • G06F 3/0354 - Pointing devices displaced or positioned by the user; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
  • G06F 21/44 - Program or device authentication
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
  • G06F 3/038 - Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
  • G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means

80.

CACHE-BASED TRACE REPLAY BREAKPOINTS USING RESERVED TAG FIELD BITS

      
Document Number 03102624
Status Pending
Filing Date 2019-06-18
Open to Public Date 2020-01-02
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Mola, Jordi

Abstract

Performing breakpoint detection via a cache includes detecting an occurrence of a memory access and identifying whether any cache line of the cache matches an address associated with the memory access. When a cache line does match the address associated with the memory access no breakpoint was encountered. When no cache line matches the address associated with the memory access embodiments identify whether any cache line matches the address associated with the memory access when one or more flag bits are ignored. When a cache line does match the address associated with the memory access when the one or more flag bits are ignored, embodiment perform a check for whether a breakpoint was encountered. Otherwise, embodiments process a cache miss.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 12/0802 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches
  • G06F 12/126 - Replacement control using replacement algorithms with special data handling, e.g. priority of data or instructions, handling errors or pinning

81.

DISTRIBUTED COMPUTING SYSTEM WITH A SYNTHETIC DATA AS A SERVICE FRAMESET PACKAGE STORE

      
Document Number 03097073
Status Pending
Filing Date 2019-05-17
Open to Public Date 2019-12-05
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Zargahi, Kamran

Abstract

Various embodiments, methods and systems for implementing a distributed computing system frameset package store are provided. Initially, a query for a frameset package is received from a frameset package query interface. The frameset query interface comprises a plurality of frameset package categories. A query result frameset package is identified based on a frameset package profile. The query result frameset package is communicated.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

82.

PROCESSOR FEATURE ID RESPONSE FOR VIRTUALIZATION

      
Document Number 03098192
Status Pending
Filing Date 2019-05-13
Open to Public Date 2019-11-28
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Sherwin, Bruce J., Jr.

Abstract

The disclosed technology is generally directed to virtualization technology. The disclosed technology includes providing processor feature ID information requested by, or from, a virtual machine (VM), virtualized application, Virtualization Based Security (VBS) user mode process, VBS kernel mode process, or other guest partition, by a processor. Such information may be provided based on information provided a priori to the processor, for example, by a supervisory partition, such as a hypervisor. The disclosed technology also includes a supervisory partition, for example, that provides such information to the processor, and includes guest partitions that receive such information.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

83.

SELECTING A NEURAL NETWORK ARCHITECTURE FOR A SUPERVISED MACHINE LEARNING PROBLEM

      
Document Number 03097036
Status Pending
Filing Date 2019-04-27
Open to Public Date 2019-11-14
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Amizadeh, Saeed
  • Yang, Ge
  • Fusi, Nicolo
  • Casale, Francesco Paolo

Abstract

Systems and methods for selecting a neural network for a machine learning problem are disclosed. A method includes accessing an input matrix. The method includes accessing a machine learning problem space associated with a machine learning problem and multiple untrained candidate neural networks for solving the machine learning problem. The method includes computing, for each untrained candidate neural network, at least one expressivity measure capturing an expressivity of the candidate neural network with respect to the machine learning problem. The method includes computing, for each untrained candidate neural network, at least one trainability measure capturing a trainability of the candidate neural network with respect to the machine learning problem. The method includes selecting, based on the at least one expressivity measure and the at least one trainability measure, at least one candidate neural network for solving the machine learning problem.

84.

GRAPHICAL USER INTERFACE FEATURES FOR UPDATING A CONVERSATIONAL BOT

      
Document Number 03098115
Status Pending
Filing Date 2019-04-13
Open to Public Date 2019-11-14
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Liden, Lars
  • Williams, Jason
  • Shayandeh, Shahin
  • Mazzola, Matt

Abstract

Various technologies pertaining to creating and/or updating a chatbot are described herein. Graphical user interfaces (GUIs) are described that facilitate updating a computer-implemented response model of the chatbot based upon interaction between a developer and features of the GUIs, wherein the GUIs depict dialogs between a user and the chatbot.

IPC Classes  ?

  • G06F 8/33 - Intelligent editors
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages

85.

EXECUTION CONTROL WITH CROSS-LEVEL TRACE MAPPING

      
Document Number 03097009
Status Pending
Filing Date 2019-04-25
Open to Public Date 2019-11-07
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Nelson, Patrick
  • Davis, Jackson
  • Myers, Del
  • Lai, Thomas
  • Chen, Deborah
  • Mola, Jordi
  • Falk, Noah

Abstract

Described technologies aid execution control during replays of traced program behavior. Cross-level mapping correlates source code, an intermediate representation, and native instructions in a trace. The trace includes a record of native code instructions which were executed by a runtime-managed program. The trace does not include any executing instance of the runtime. Breakpoints are set to align trace locations with source code expressions or statements, and to skip over garbage collection and other code unlikely to interest a developer. A live debugging environment is adapted to support trace-based reverse execution. An execution controller in a debugger or other tool may utilize breakpoint ranges, cross-level mappings, backward step-out support, and other items to control a replay execution of the trace. Aspects of familiar compilers or familiar runtimes may be re-purposed for innovative execution control which replays previously generated native code, as opposed to their established purpose of generating native code.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software

86.

INPUT AND OUTPUT SCHEMA MAPPINGS

      
Document Number 03103838
Status Pending
Filing Date 2019-04-22
Open to Public Date 2019-11-07
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Ruiz-Meraz, Cesar M.
  • Ravipati, Venkata Rajagopal
  • Kalyana Sundaram, Jayaraman
  • Monge, Hillary Caituiro
  • Hamad, Ashraf
  • Banisadr, Bahram

Abstract

Optimizations are provided for interconnecting event sources with event subscribers in a seamless manner so that the native formatting/schema methodologies used by event sources and subscribers will not need to be natively modified. An event grid service is provided as a routing and mapping service. This event grid service receives event data that may be organized in any kind of format. By analyzing the format, the event grid service determines whether the format correlates with a format used by a consumer of that event data. If the formats conform, then the event grid service extracts relevant data from the event data and pushes it to the subscriber. If the formats do not conform, the event grid service intelligently generates a mapping to map the two formats together.

IPC Classes  ?

87.

MECHANISM FOR PEN INTEROPERABILITY WITH PRESSURE SENSOR DESIGN

      
Document Number 03096446
Status Pending
Filing Date 2019-04-09
Open to Public Date 2019-10-31
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Weins, Connor Lawrence
  • Abzarian, David

Abstract

Features of the present disclosure solve the above-identified problem by implementing techniques to detect the contact or proximity of a stylus to a display screen of a computer device in the absence of pressure information within the constraints of existing pen protocols. To this end, a digitizer associated with the display screen of the computer device may determine when the stylus is touching (or significantly close) the screen when a signal communication between the pen and digitizer exceeds a threshold (e.g., time or voltage).

IPC Classes  ?

  • G06F 3/038 - Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
  • G06F 3/0354 - Pointing devices displaced or positioned by the user; Accessories therefor with detection of 2D relative movements between the device, or an operating part thereof, and a plane or surface, e.g. 2D mice, trackballs, pens or pucks
  • G06F 3/041 - Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means

88.

MATRIX VECTOR MULTIPLIER WITH A VECTOR REGISTER FILE COMPRISING A MULTI-PORT MEMORY

      
Document Number 03096443
Status Pending
Filing Date 2019-04-06
Open to Public Date 2019-10-24
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Fowers, Jeremy
  • Ovtcharov, Kalin
  • Chung, Eric S.
  • Massengill, Todd Michael
  • Liu, Ming Gang
  • Weisz, Gabriel Leonard

Abstract

Neural network processors including a vector register file (VRF) having a multi-port memory and related methods are provided. The processor may include tiles to process an N by N matrix of data elements and an N by 1 vector of data elements. The VRF may, in response to a write instruction, store N data elements in a multi-port memory and during each one of out of P clock cycles provide N data elements to each one of P input interface circuits of the multi-port memory comprising an input lane configured to carry L data elements in parallel. During the each one of the P clock cycles the multi-port memory may be configured to receive N data elements via a selected at least one of the P input interface circuits. The VRF may include output interface circuits for providing N data elements in response to a read instruction.

IPC Classes  ?

  • G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode

89.

COMPOUND CONDITIONAL REORDERING FOR FASTER SHORT-CIRCUITING

      
Document Number 03094994
Status Pending
Filing Date 2019-03-12
Open to Public Date 2019-10-17
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Sabne, Amit Jayant
  • Brumer, Eric Avi

Abstract

A computing device is provided, including a processor configured to receive source code at a compiler. The source code may include at least one compound conditional having a plurality of conditions. For each condition of the plurality of conditions, the source code may further include a respective code block including instructions to evaluate the condition. For each ordering of a plurality of orderings of the plurality of conditions, the processor may determine that the ordering satisfies one or more legality constraints. For each ordering of the plurality of orderings that satisfy the one or more legality constraints, the processor may determine a respective estimated computational cost for that ordering. The processor may reorder the plurality of conditions to have an ordering that has a lowest estimated computational cost of the plurality of orderings that satisfy the one or more legality constraints.

IPC Classes  ?

90.

COMPUTERIZED ASSISTANCE USING ARTIFICIAL INTELLIGENCE KNOWLEDGE BASE

      
Document Number 03096845
Status Pending
Filing Date 2019-03-27
Open to Public Date 2019-10-17
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Vangala, Vipindeep
  • Srinivasan, Sundararajan
  • Gunda, Rajesh

Abstract

A computerized personal assistant includes a natural language user interface, a natural language processing machine, an identity machine, and a knowledge-base updating machine. The knowledge-base updating machine is configured to update a user-centric artificial intelligence knowledge base associated with the particular user to include a new or updated user-centric fact based on the computer-readable representation of the user input, wherein the knowledge-base updating machine updates the user-centric artificial intelligence knowledge base via an update protocol useable by a plurality of different computer services.

IPC Classes  ?

91.

SYSTEMS AND METHODS FOR NETWORK SLICING

      
Document Number 03092370
Status Pending
Filing Date 2019-03-20
Open to Public Date 2019-09-26
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Qian, Haibo
  • Muralidharan, Srinivasan
  • Nickell, Kenton Perry
  • Parker, Ronald M.
  • Rink, Fred

Abstract

Embodiments disclosed herein relate to systems and methods for network slicers. Network slicers can receive creation request messages and select network slices based on policies. A network slicer can indicate to next hop routers that it has lower routing costs in order to receive messages, and inspect the received messages to identify creation request messages. A network slicer can indicate to a DNS server that it has a higher priority than other network elements, and receive creation request messages based on the higher priority. New creation request messages can be sent to the selected network slices based on received creation request messages. The network can also create and send appropriate response messages to the creation request to establish future communications with the selected network slice.

IPC Classes  ?

92.

COMPUTING SYSTEM WITH SUPERCONDUCTING AND NON-SUPERCONDUCTING COMPONENTS LOCATED ON A COMMON SUBSTRATE

      
Document Number 03092180
Status Pending
Filing Date 2018-12-01
Open to Public Date 2019-09-19
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Christiansen, Martin B.
  • Wakamiya, Stanley K.
  • Chorosinski, Leonard G.
  • Heffner, Harlan C.

Abstract

A computing system including a common substrate having both superconducting components and non-superconducting components is provided. The superconducting components may be attached towards a first end of the common substrate and the non-superconducting components may be attached towards a second end, opposite to the first end, of the common substrate. The common substrate may include circuit traces for interconnecting the superconducting components with the non-superconducting components. A heat-shield may thermally separate the first end from the second end of the common substrate such that the superconducting components are configured to operate in a temperature range between 2 Kelvin to 77 Kelvin and the non-superconducting components are configured to operate in a temperature range between 200 Kelvin to 400 Kelvin. Each of the superconducting components may be configured to provide primarily a processor functionality and each of the non-superconducting components may be configured to provide primarily a storage functionality.

IPC Classes  ?

93.

LOGGING CACHE INFLUXES BY REQUEST TO A HIGHER-LEVEL CACHE

      
Document Number 03088558
Status Pending
Filing Date 2019-02-14
Open to Public Date 2019-08-29
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Mola, Jordi
  • Gabryjelski, Henry

Abstract

Trace logging based on an upper cache layer determining how to log an influx by a lower cache layer. A second cache receives, from a lower layer first cache, a logging request referencing a memory address. The second cache determines whether it has a cache line for the memory address. When the cache line is present, the second cache either forwards the request to a next logging cache layer or causes the cache line to be logged if second cache is the outermost logging layer. When the cache line isn't present, the second cache causes the cache line to be logged when the cache line isn't determined by the second cache to be logged, or when it is determined by the second cache to be logged but it is not determined whether the first cache is aware of a current value of the cache line in the second cache.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 11/30 - Monitoring

94.

TRACE RECORDING BY LOGGING INFLUXES TO A LOWER-LAYER CACHE BASED ON ENTRIES IN AN UPPER-LAYER CACHE

      
Document Number 03088563
Status Pending
Filing Date 2019-02-13
Open to Public Date 2019-08-29
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Mola, Jordi

Abstract

Trace recording based on recording an influx to a lower-level cache by reference to prior log data, based on knowledge of an upper-level cache. A computing device includes a plurality of processing units, a plurality of N-level caches, and an (N+i)-level cache that is a backing store for the N-level caches. Based on activity of a first processing unit, the computing device detects an influx of data to a first N-level cache. The computing device checks the (N+i)-level cache to determine if the data was already logged for a second processing unit. Based on the check, the computing device (i) causes the data to be logged for the first processing unit by reference to log data (i.e., when the data was already logged), or causes the data to be logged by value for the first processing unit (i.e., when the data was not already logged).

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 11/30 - Monitoring

95.

CLEARANCE OF BARE METAL RESOURCE TO TRUSTED STATE USABLE IN CLOUD COMPUTING

      
Document Number 03088634
Status Pending
Filing Date 2019-01-04
Open to Public Date 2019-08-22
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Tuttle, Bryan W.
  • Cela, Carlos Jose
  • Chau, Ho-Yuen
  • Raghuraman, Melur K.
  • Kulkarni, Saurabh M.
  • Deng, Yimin

Abstract

A bare metal resource includes a trusted portion and an untrusted portion. The trusted portion includes trusted hardware, an image repository, and a clearance manager. The clearance manager is executable during bootup of the bare metal resource to perform a clearance process on the untrusted portion, including deleting the BIOS in the untrusted portion and loading a trusted BIOS from the image repository on the untrusted hardware, to place the untrusted portion in a trusted state. The bare metal resource may be provisioned to a tenant of a cloud provider after being placed in the trusted state.

IPC Classes  ?

  • G06F 21/74 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result

96.

SENSOR DEVICE

      
Document Number 03085175
Status Pending
Filing Date 2019-01-08
Open to Public Date 2019-07-18
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Holz, Christian
  • Ofek, Eyal
  • Sinclair, Michael J.

Abstract

A sensor device is described herein. The sensor device includes a multi-dimensional optical sensor and processing circuitry, wherein the multi-dimensional optical sensor generates images and the processing circuitry is configured to output data that is indicative of hemodynamics of a user based upon the images. The sensor device is non-invasive, and is able to be incorporated into wearable devices, thereby allowing for continuous output of the data that is indicative of the hemodynamics of the user.

IPC Classes  ?

  • A61B 5/02 - Measuring pulse, heart rate, blood pressure or blood flow; Combined pulse/heart-rate/blood pressure determination; Evaluating a cardiovascular condition not otherwise provided for, e.g. using combinations of techniques provided for in this group with electrocardiography; Heart catheters for measuring blood pressure
  • A61B 5/00 - Measuring for diagnostic purposes ; Identification of persons
  • A61B 5/021 - Measuring pressure in heart or blood vessels
  • A61B 5/024 - Measuring pulse rate or heart rate
  • A61B 5/026 - Measuring blood flow
  • A61B 5/1455 - Measuring characteristics of blood in vivo, e.g. gas concentration, pH-value using optical sensors, e.g. spectral photometrical oximeters

97.

CONTROLLER WITH HAPTIC FEEDBACK

      
Document Number 03082508
Status Pending
Filing Date 2018-12-13
Open to Public Date 2019-07-04
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Holz, Christian
  • Ofek, Eyal
  • Sinclair, Michael Jack
  • Benko, Hrvoje
  • Choi, Inrak
  • Whitmire, Eric

Abstract

A controller is provided that can provide haptic feedback to a user by controlling a separation of a stationary portion and a moveable portion, such as a moveable arm, which can include one or more mounts for one or more of a user's fingers. A sensor can be included on the stationary portion to sense whether the user's thumb is proximate a thumb rest. Different haptic interaction modes can be set depending on whether the user's thumb is not proximate the sensor, such as a touch mode, or is proximate the sensor, such as a grasping or trigger mode. When grasping and trigger modes are provided, they can be determined based on the nature of a virtual object grasped by a user. Additional haptic sensations can be provided, such as to a user's fingertip, such as by a vibratory component or a rotatable object of one or more haptic elements.

IPC Classes  ?

  • G06F 3/01 - Input arrangements or combined input and output arrangements for interaction between user and computer
  • G06F 3/0338 - Pointing devices displaced or positioned by the user; Accessories therefor with detection of limited linear or angular displacement of an operating part of the device from a neutral position, e.g. isotonic or isometric joysticks
  • B25J 13/02 - Hand grip control means
  • G05G 9/047 - Manually-actuated control mechanisms provided with one single controlling member co-operating with two or more controlled members, e.g. selectively, simultaneously the controlling member being movable in different independent ways, movement in each individual way actuating one controlled member only in which movement in two or more ways can occur simultaneously the controlling member being movable by hand about orthogonal axes, e.g. joysticks

98.

NATURAL LANGUAGE PROCESSING AND ANALYSIS IN A CONVERSATIONAL SCHEDULING ASSISTANT COMPUTING SYSTEM

      
Document Number 03072881
Status Pending
Filing Date 2018-06-25
Open to Public Date 2019-03-28
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Cheung, Benjamin Gene
  • Monroy-Hernandez, Andres
  • Newman, Todd Daniel
  • Carvalho Neto, Mayerber Loureiro De
  • Palmer, Michael Brian
  • Bhattacharya, Pamela
  • Cranshaw, Justin Brooks
  • Lee, Charles Yin-Che

Abstract

A software agent, that is used to assist in providing a service, receives communications from a set of users that are attempting to use the software agent. The communications include communications that are interacting with the software agent, and communications that are not interacting with the software agent. The software agent performs natural language processing on all communications to identify such things as user sentiment, user concerns or other items in the content of the messages, and also to identify actions taken by the users in order to obtain a measure of user satisfaction with the software agent. One or more action signals are then generated based upon the identified user satisfaction with the software agent.

IPC Classes  ?

  • H04L 51/02 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail using automatic reactions or user delegation, e.g. automatic replies or chatbot-generated messages
  • H04L 51/046 - Interoperability with other network applications or services

99.

CACHE-BASED TRACE RECORDING USING CACHE COHERENCE PROTOCOL DATA

      
Document Number 03072872
Status Pending
Filing Date 2018-06-22
Open to Public Date 2019-03-21
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor Mola, Jordi

Abstract

Performing a cache-based trace recording using cache coherence protocol (CCP) data. Embodiments detect that an operation that causes an interaction between a cache line and a backing store has occurred, that logging is enabled for a processing unit that caused the operation, that the cache line is a participant in logging, and that the CCP indicates that there is data to be logged to a trace. Embodiments then cause that data to be logged to the trace, which data is usable to replay the operation.

IPC Classes  ?

  • G06F 11/36 - Preventing errors by testing or debugging of software
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

100.

ENABLING AND DISABLING LOCATION SHARING BASED ON ENVIRONMENTAL SIGNALS

      
Document Number 03072869
Status Pending
Filing Date 2018-06-22
Open to Public Date 2019-03-21
Owner MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventor
  • Rusu, Andi F.
  • Andrew, Felix G.T.I.
  • Halvorsen, Patrick Michael

Abstract

Environmental signals are used to determine when to prompt a user to enable location sharing on their computer devices. These environmental signals may include the current location of the user being an unusual location for the user or a location that is tagged as a known social location such as a concert venue, stadium, or park. The environmental signals may also include one or more friends of the user being near the user. If the user chooses to enable location sharing in response to the prompt, the location of the user may be shared with some or all of their friends, or just the friends that have been determined to be near the user. After some amount of time has passed, or the environmental signals have changed, the location sharing may be automatically disabled for the user.

IPC Classes  ?

  • G01S 1/00 - Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmitters; Receivers co-operating therewith
  • H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
  • H04W 4/029 - Location-based management or tracking services
  • G09B 29/10 - Map spot or co-ordinate position indicators; Map-reading aids
  1     2     3     ...     8        Next Page