Microsoft Technology Licensing, LLC

États‑Unis d’Amérique

Retour au propriétaire

1-100 de 51 401 pour Microsoft Technology Licensing, LLC Trier par
Recheche Texte
Affiner par
Juridiction
        États-Unis 36 482
        International 14 128
        Canada 791
Date
Nouveautés (dernières 4 semaines) 321
2024 avril (MACJ) 205
2024 mars 219
2024 février 187
2024 janvier 216
Voir plus
Classe IPC
G06F 17/30 - Recherche documentaire; Structures de bases de données à cet effet 4 743
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole 3 958
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison 3 051
G06F 9/44 - Dispositions pour exécuter des programmes spécifiques 2 250
G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur 2 237
Voir plus
Statut
En Instance 3 358
Enregistré / En vigueur 48 043
Résultats pour  brevets
  1     2     3     ...     100        Prochaine page

1.

LOCAL PAGE WRITES VIA PRE-STAGING BUFFERS FOR RESILIENT BUFFER POOL EXTENSIONS

      
Numéro d'application 18534126
Statut En instance
Date de dépôt 2023-12-08
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Ramos, Rogério
  • Golaub, Kareem Aladdin
  • Gottipati, Chaitanya
  • Saenz, Alejandro Hernandez
  • Danday, Raj Kripal

Abrégé

Methods for local page writes via pre-staging buffers for resilient buffer pool extensions are performed by computing systems. Compute nodes in database systems insert, update, and query data pages maintained in storage nodes. Data pages cached locally by compute node buffer pools are provided to buffer pool extensions on local disks as pre-copies via staging buffers that store data pages prior to local disk storage. Encryption of data pages occurs at the staging buffers, which allows a less restrictive update latching during the copy process, with page metadata being updated in buffer pool extensions page tables with in-progress states indicating it is not yet written to local disk. When stage buffers are filled, data pages are written to buffer pool extensions and metadata is updated in page tables to indicate available/valid states. Data pages in staging buffers can be read and updated prior to writing to the local disk.

Classes IPC  ?

  • G06F 13/16 - Gestion de demandes d'interconnexion ou de transfert pour l'accès au bus de mémoire

2.

RESPONSE-TIME-BASED ORDERING OF FINANCIAL MARKET TRADES

      
Numéro d'application 18046806
Statut En instance
Date de dépôt 2022-10-14
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Goyal, Prateesh
  • Marinos, Ilias
  • Chandra, Ranveer
  • Russinovich, Mark Eugene

Abrégé

Examples are disclosed that relate to fairly ordering financial market trades received from different market participant computers via a cloud computing network. In one example, a plurality of trades generated by a plurality of market participant computers are received. The trades are generated based at least on a financial market data point received by the plurality of market participant computers. Each trade is tagged with a delivery clock time stamp that tracks time in relation to financial market events that occur at a corresponding market participant computer. The trades are ordered based on the delivery clock time stamps and sent to a central exchange server computer. The central exchange server computer processes the trades.

Classes IPC  ?

  • G06Q 40/04 - Transactions; Opérations boursières, p.ex. actions, marchandises, produits dérivés ou change de devises

3.

Reduced Video Stream Resource Usage

      
Numéro d'application 17968694
Statut En instance
Date de dépôt 2022-10-18
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Hao, Yichen
  • Li, Lihang
  • Romano, Anthony C.
  • Sangani, Naiteek
  • Menezes, Ryan S.

Abrégé

The description relates to resource aware object detection for encoded video streams that can identify frames of the video stream that include an object of interest, such as a human, without decoding the frames.

Classes IPC  ?

  • H04N 19/177 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant le codage adaptatif caractérisés par l’unité de codage, c. à d. la partie structurelle ou sémantique du signal vidéo étant l’objet ou le sujet du codage adaptatif l’unité étant un groupe d’images [GOP]
  • H04N 19/169 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant le codage adaptatif caractérisés par l’unité de codage, c. à d. la partie structurelle ou sémantique du signal vidéo étant l’objet ou le sujet du codage adaptatif

4.

AUTOMATED REMEDIATION OF EXPOSED SECRETS

      
Numéro d'application 17967124
Statut En instance
Date de dépôt 2022-10-17
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Fanning, Michael Christopher
  • Couraud, Nicolas Yves
  • Czerwonka, Jacek Andrzej
  • Faucon, Christopher Michael Henry
  • Yu, Yingting
  • Basseri, Etan Micah
  • K'Otohoyoh, Floyd Odiwuor
  • Lichwa, Jacek Ernest

Abrégé

Techniques for identifying an exposed credential that, if used, would provide access to a resource are disclosed. The techniques enable the resource to remain online while (i) a new credential is allocated for the resource, (ii) the resource is transitioned to using the new credential instead of the exposed credential, and (iii) the exposed credential is attempted to be invalidated. A credential is accessed. This credential is suspected of being in an exposed state. The credential is accessible from within an artifact and is determined to be in the exposed state. A new credential is generated. This new credential is designed to replace the exposed credential. An instruction is transmitted to the resource to cause it to transition from using the exposed credential to using the new credential. The exposed credential is then invalidated.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p.ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
  • G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures

5.

CODE RADAR

      
Numéro d'application 18168229
Statut En instance
Date de dépôt 2023-02-13
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Ziegler, Albert
  • Wattenberger, Amelia Mein-Rou

Abrégé

Using a language model attention matrix to facilitate a “code radar” source code navigation experience that highlights related source code locations. A computer system identifies a first source code location within source code that is displayed at a code editor user interface (UI). From a set of mappings generated based on a language model attention matrix, the computer system identifies a second source code location as being related to the first source code location. Concurrent with presenting the first source code location in the code editor UI, the computer system presents a related source code navigation experience, which includes both (i) presenting the second source code location in the code editor UI, and (ii) presenting a visual indication that the second source code location is related to the first source code location. Some embodiments include generating the set of mappings based on a language model attention matrix.

Classes IPC  ?

6.

IDENTITY ANONYMIZATION WITH CONTROLLED MASKING AND FORMAT PRESERVING ENCRYPTION

      
Numéro d'application 17966490
Statut En instance
Date de dépôt 2022-10-14
Date de la première publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s) Proano, Guillermo Paul

Abrégé

Systems are methods are used for facilitating identify anonymization by using controlled masking and encryption of user identifiers, such as UUIDs. A system that manages a UUID converts the UUID into a set of one or more different unique versions of the UUID for one or more corresponding different partner system(s) by removing and replacing masked portions of the UUID and by selectively encrypting the non-masked portions of the UUID. New masked portions added to the new version(s) of the UUID identify different corresponding partner(s) and/or rules to be applied by the different partner(s) when handling the different unique version(s) of the UUID(s). Partner systems that receive the new versions of the UUID identify and utilize the new masked portions to deterministically control decrypting and/or other processing of the new version of the UUID.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

7.

MULTITENANT SHARING ANOMALY CYBERATTACK CAMPAIGN DETECTION

      
Numéro d'application 18530853
Statut En instance
Date de dépôt 2023-12-06
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Garyani, Yaakov
  • Israel, Moshe
  • Neuvirth, Hani Hana
  • Abramovitch, Ely
  • Keren, Amir
  • Burrell, Timothy William

Abrégé

Embodiments detect cyberattack campaigns against multiple cloud tenants by analyzing activity data to find sharing anomalies. Data that appears benign in a single tenant's activities may indicate an attack when the same or similar data is also found for additional tenants. Attack detection may depend on activity time frames, on how similar certain activities of different tenants are to one another, on how unusual it is for different tenants to share an activity, and on other factors. Sharing anomaly analysis may utilize hypergeometric probabilities or other statistical measures. Detection avoidance attempts using digital entity randomization are revealed and thwarted. Authorized vendors may be recognized, mooting anomalousness. Although data from multiple tenants is analyzed together for sharing anomalies while monitoring for attacks, tenant confidentiality and privacy are respected through technical and legal mechanisms. Mitigation is performed in response to an attack indication.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

8.

MULTI-MODAL THREE-DIMENSIONAL FACE MODELING AND TRACKING FOR GENERATING EXPRESSIVE AVATARS

      
Numéro d'application 18062239
Statut En instance
Date de dépôt 2022-12-06
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Sawhney, Harpreet Singh
  • Lundell, Benjamin Eliot
  • Shah, Anshul Bhavesh
  • Cristian, Calin
  • Hewitt, Charles Thomas
  • Baltrusaitis, Tadas
  • Radojevic, Mladen
  • Grujcic, Kosta
  • Stojiljkovic, Ivan
  • Mcilroy, Paul Malcolm
  • Olafenwa, John Ishola
  • Jadidian, Jouya
  • Jakubzak, Kenneth Mitchell

Abrégé

Examples are disclosed that relate to generating expressive avatars using multi-modal three-dimensional face modeling and tracking. One example includes a computer system comprising a processor coupled to a storage system that stores instructions. Upon execution by the processor, the instructions cause the processor to receive initialization data describing an initial state of a facial model. The instructions further cause the processor to receive a plurality of multi-modal data signals. The instructions further cause the processor to perform a fitting process using the initialization data and the plurality of multi-modal data signals. The instructions further cause the processor to determine a set of parameters based on the fitting process, wherein the determined set of parameters describes an updated state of the facial model.

Classes IPC  ?

  • G06T 13/40 - Animation tridimensionnelle [3D] de personnages, p.ex. d’êtres humains, d’animaux ou d’êtres virtuels
  • G06T 17/00 - Modélisation tridimensionnelle [3D] pour infographie
  • G06V 40/16 - Visages humains, p.ex. parties du visage, croquis ou expressions

9.

ROSTER MANAGEMENT ACROSS ORGANIZATIONS

      
Numéro d'application 18396387
Statut En instance
Date de dépôt 2023-12-26
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Mclean, Michael Thomas
  • Conceicao, Ladislau
  • Sanghavi, Priyank Deepak
  • Li, Li
  • Manglani, Jayant Kishorbhai

Abrégé

Systems and methods for generating a shared collaborative channel for collaboration are provided. In particular, a computing device may receive a request, from an originating member of an organization, to create the shared collaborative channel, the request including an invitee to be added to the shared collaborative channel. In response to receipt of the request, the computing device may provision a substrate group by creating a container associate with the shared collaborative channel including a substrate database associated with the shared collaborative channel, generate an invitation including a custom link to the shared collaborative channel for the invitee, and determine whether the invitee belongs to an originating collaboration team associated with the originating member based on the substrate database. If the invitee belongs to the originating collaboration team, the computing device may further update the substrate group to add the invitee as a new member of the shared collaborative channel.

Classes IPC  ?

  • G06Q 10/101 - Création collaborative, p.ex. développement conjoint de produits ou de services
  • G06Q 10/10 - Bureautique; Gestion du temps
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences

10.

SYSTEM AND METHOD FOR SEMANTIC AWARE DATA SCIENCE

      
Numéro d'application 18396972
Statut En instance
Date de dépôt 2023-12-27
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Floratou, Avrilia
  • Mueller, Andreas Christian
  • Banda, Dalitso Hansini
  • Cahoon, Joyce Yu
  • Gruenheid, Anja
  • Godwal, Neha

Abrégé

Systems, methods, and devices are described for enabling a user to import a library into a computer program under development. The library includes a data storage interface, one or more semantic objects, and one or more data manipulation or data analysis operations. A user is able to reference code of the library within the computer program under development to generate a dataset from data obtained via the data storage interface and associate the one or more semantic objects with the dataset to generate a semantically-annotated dataset. Systems, methods, and devices enable, based on the importing: the user to invoke a semantic-guided operation of the library that utilizes the semantically-annotated dataset to infer an aspect of a data manipulation or data analysis operation to be performed on the semantically-annotated dataset; or the suggestion of a data manipulation or data analysis operation to the user based on the semantically-annotated dataset.

Classes IPC  ?

11.

CLICK-TO-SCRIPT REFLECTION

      
Numéro d'application 18004447
Statut En instance
Date de dépôt 2021-06-25
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Li, Xiangnan
  • Friedman, Marc Todd
  • Le, Wangchao
  • Zabokritski, Evgueni

Abrégé

A click-to-script service enables developers of big-data job scripts to quickly see the underlying script operations from optimized execution plans. Once a big-data job is received, the disclosed examples compile it and generate tokens that are associated with each operation of the big-data job. These tokens include may include the file name of the job, the line number of the operation, and/or an Abstract Syntax Tree (AST) node for the given operations. An original execution plan is optimized into an optimized execution plan, and the tokens for the original operations of the job script are assigned to the optimized operations of the optimized execution plan. The optimized execution plan is graphically displayed in an interactive manner such that users may view the optimized execution plan and click on its optimized operations to find the original operations of the job script.

Classes IPC  ?

12.

BLINKLESS AND MARKERLESS BI-PHASE DISPLAY CALIBRATION

      
Numéro d'application 17964775
Statut En instance
Date de dépôt 2022-10-12
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s) Kim, Taemin

Abrégé

Techniques for separating an image into a forward sweeping image and a backward sweeping image are disclosed. A lookup table maps MEMS projection positions on a display with corresponding pixel positions in an image generated by a camera facing the display. The lookup table is used to associate a first set of pixel positions in the image with a forward scanning sweep of the MEMS system. The lookup table is also used to associate a second set of pixel positions in the image with a backward scanning sweep of the MEMS system. The first and second sets of pixel positions are used to generate the forward sweeping image and the backward sweeping image, respectively. These images can then be used to calibrate the MEMS system to compensate for bi-phase.

Classes IPC  ?

  • H04N 9/31 - Dispositifs de projection pour la présentation d'images en couleurs
  • G02B 26/08 - Dispositifs ou dispositions optiques pour la commande de la lumière utilisant des éléments optiques mobiles ou déformables pour commander la direction de la lumière
  • G02B 26/10 - Systèmes de balayage
  • G02B 27/01 - Dispositifs d'affichage "tête haute"

13.

OVERLAY SCHEME FOR CONTAINER ADDRESSING IN VIRTUAL NETWORKS

      
Numéro d'application 18047345
Statut En instance
Date de dépôt 2022-10-18
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Aggarwal, Neha
  • Aggarwal, Chandan
  • Tewari, Rishabh
  • Kumar, Abhijeet
  • Goel, Sudhir
  • Nuwal, Trilok
  • Long, Matthew Francis
  • Baker, Evan Alexander
  • Ramachandran, Aanand
  • Upadhyay, Alok

Abrégé

A virtual network provider system supports a virtual network including virtual machines that are each assigned to an underlay address of an underlay addressing scheme. The virtual network provider system further includes multiple routing domains each defined to include a different subset of the virtual machines. Each of the routing domains is assigned to a range of overlay addresses of an overlay addressing scheme. For each routing domain, the assigned range of overlay addresses is allocated among the subset of the virtual machines in the routing domain. The system further includes a virtual network host configured to use addresses of the overlay addressing scheme to selectively route messages between endpoints on select pairs of the virtual machines assigned to a same routing domain of the plurality of routing domains.

Classes IPC  ?

  • H04L 45/64 - Routage ou recherche de routes de paquets dans les réseaux de commutation de données à l'aide d'une couche de routage superposée
  • H04L 45/74 - Traitement d'adresse pour le routage
  • H04L 45/76 - Routage dans des topologies définies par logiciel, p.ex. l’acheminement entre des machines virtuelles

14.

QUALITY ESTIMATION MODEL FOR PACKET LOSS CONCEALMENT

      
Numéro d'application 18079342
Statut En instance
Date de dépôt 2022-12-12
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s) Diener, Carl Lorenz

Abrégé

This document relates to training and employing a quality estimation model. One example includes a method or technique that can be performed on a computing device. The method or technique can include providing degraded audio signals to one or more packet loss concealment models, and obtaining enhanced audio signals output by the one or more packet loss concealment models. The method or technique can also include obtaining quality labels for the enhanced audio signals and training a quality estimation model to estimate audio signal quality based at least on the enhanced audio signals and the quality labels.

Classes IPC  ?

  • G10L 25/60 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour comparaison ou différentiation pour mesurer la qualité des signaux de voix
  • G10L 19/005 - Correction d’erreurs induites par le canal de transmission, lorsqu’elles sont liées à l’algorithme de codage
  • G10L 25/30 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes caractérisées par la technique d’analyse utilisant des réseaux neuronaux
  • G10L 25/69 - Techniques d'analyses de la parole ou de la voix qui ne se limitent pas à un seul des groupes spécialement adaptées pour un usage particulier pour l’évaluation de signaux de voix synthétiques ou décodés

15.

IDENTIFYING AND CONSENTING TO PERMISSIONS FOR WORKFLOW AND CODE EXECUTION

      
Numéro d'application 18395825
Statut En instance
Date de dépôt 2023-12-26
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Vaishnav, Sunay
  • Hade, Merwan Vishnu
  • Siciliano, Stephen Christopher
  • Nissimoff, David
  • Anubhav, Fnu

Abrégé

The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.

Classes IPC  ?

  • G06F 21/31 - Authentification de l’utilisateur
  • G06F 12/0891 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p.ex. mémoires cache utilisant des moyens d’effacement, d’invalidation ou de réinitialisation
  • G06F 21/51 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade du chargement de l’application, p.ex. en acceptant, en rejetant, en démarrant ou en inhibant un logiciel exécutable en fonction de l’intégrité ou de la fiabilité de la source
  • G06F 21/53 - Contrôle des usagers, programmes ou dispositifs de préservation de l’intégrité des plates-formes, p.ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p.ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p.ex. "boîte à sable" ou machine virtuelle sécurisée
  • G06F 21/60 - Protection de données

16.

TRACKING IN-GAME EVENTS AND GENERATING EVENT REPORTS ACROSS MULTIPLE GAMING APPLICATIONS

      
Numéro d'application 18391250
Statut En instance
Date de dépôt 2023-12-20
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Kennett, Daniel Gilbert
  • Rabold, Mark Edward

Abrégé

The present disclosure relates to systems, methods, and computer-readable media for identifying a variety of events that occur within a gaming session and generating event reports based on the identified events. For example, a gaming service (e.g., a cloud gaming server) can leverage content analysis and event recognizer services on a cloud computing system to detect one or more in-game events based on gaming content (e.g., video content, audio content, controller inputs) that is delivered to a client system. Systems described herein can train and implement event recognizers trained to track various in-game events across multiple gaming applications. Based on the tracked events, the systems described herein can generate event reports for events, individual users, and groups of users of the cloud computing system.

Classes IPC  ?

  • A63F 13/77 - Aspects de sécurité ou de gestion du jeu incluant les données relatives aux dispositifs ou aux serveurs de jeu, p.ex. données de configuration, version du logiciel ou quantité de mémoire
  • A63F 13/75 - Application des règles, p.ex. détection des joueurs déloyaux ou établissement de listes de joueurs tricheurs

17.

DEVICE PUSH-TO-OPEN DETECTION AND POWER CONTROL

      
Numéro d'application 18046411
Statut En instance
Date de dépôt 2022-10-13
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Jensen, Michael Dale
  • Lin, James Hao-An Chen
  • Ylitalo, Mika Martti

Abrégé

A foldable computing device comprises a first frame rotatably coupled to a second frame. The second frame comprises a push-to-open mechanism comprising an actuator and a power switch located for actuation by the actuator. A detection mechanism detects a displaced position of the actuator that corresponds to releasing the foldable computing device from a closed configuration. Actuation of the power switch is detected and used with detection of the displaced position of the actuator to control an operating state of the computing device.

Classes IPC  ?

  • G06F 1/16 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES - Détails non couverts par les groupes et - Détails ou dispositions de structure

18.

DEEP FUSION OF KERNEL EXECUTION

      
Numéro d'application 17966587
Statut En instance
Date de dépôt 2022-10-14
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Zhu, Haishan
  • Shah, Preyas Janak
  • Mitra, Tiyasa
  • Chung, Eric S.

Abrégé

Embodiments of the present disclosure include techniques for machine language processing. In one embodiment, the present disclosure includes configuring functional modules on a machine learning processor to execute a plurality of machine learning (ML) operations during a plurality of time segments. During the time segments, a first portion of the ML operations execute serially and at least one other ML operation executes during at least a majority of the time of each of the time segments. Serial ML operations may be processed simultaneously with the at least one other ML operation.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
  • G06N 20/00 - Apprentissage automatique

19.

CAMERA SYSTEMS FOR OPERATING IN MULTIPLE OPTICAL CHANNELS

      
Numéro d'application 18047453
Statut En instance
Date de dépôt 2022-10-18
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Bamji, Cyrus Soli
  • Akkaya, Onur Can
  • Ortiz Egea, Sergio

Abrégé

Indirect time-of-flight camera systems for operating in multiple optical channels using active modulated light and accompanying methods of operation are provided. In one aspect, the indirect time-of-flight camera system includes first and second modulatable laser sources outputting light of different wavelengths for illuminating a target environment. The camera system further includes a wavelength-selective reflective element designed to reflect the light of a first wavelength and to transmit the light of a second wavelength. The camera system further includes a controller comprising instructions executable to control the camera system to, in a first time period, activate the first modulatable laser source and deactivate the second modulatable laser source, and in a second time period, deactivate the first modulatable laser source and activate the second modulatable laser source. The camera system further includes a photosensor for receiving the light outputted by the first and second modulatable laser sources.

Classes IPC  ?

  • G01S 17/894 - Imagerie 3D avec mesure simultanée du temps de vol sur une matrice 2D de pixels récepteurs, p.ex. caméras à temps de vol ou lidar flash
  • G02F 1/31 - Dispositifs de déflexion numérique

20.

SYSTEMS AND METHODS FOR DETERMINING SCORES FOR MESSAGES BASED ON ACTIONS OF MESSAGE RECIPIENTS AND A NETWORK GRAPH

      
Numéro d'application 18392642
Statut En instance
Date de dépôt 2023-12-21
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s) Cibelli, Maurizio

Abrégé

Methods and systems cause display of email messages of a user on a screen of a computing system based on scores associated with the email messages. An email ranking system may have assigned the scores to the email messages. The scores are based on actions that other recipients of the email messages have taken with respect to the email messages. In calculating the scores, the actions of the other recipients may receive different weights based on how closely connected a recipient is to the user and a type of connection the recipient has to the user. A network graph may indicate how closely connected the recipient is to the user and the type of connection the recipient has to the user.

Classes IPC  ?

  • H04L 51/226 - Livraison selon les priorités
  • H04L 51/212 - Surveillance ou traitement des messages utilisant un filtrage ou un blocage sélectif
  • H04L 51/216 - Gestion de l'historique des conversations, p.ex. regroupement de messages dans des sessions ou des fils de conversation
  • H04L 51/224 - Surveillance ou traitement des messages en fournissant une notification sur les messages entrants, p.ex. des poussées de notifications des messages reçus
  • H04L 51/42 - Aspects liés aux boîtes aux lettres, p.ex. synchronisation des boîtes aux lettres

21.

TOUCH-SENSITIVE INPUT DEVICE

      
Numéro d'application 18554038
Statut En instance
Date de dépôt 2022-03-25
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Dekel, Shoham
  • Bar-Ness, Assaf

Abrégé

Examples are disclosed that relate to applying haptic output to a touch-sensitive input device. One example provides a touch-sensitive input device comprising a body, a haptic feedback mechanism within the body, a sensor subsystem, a logic processor, and a memory. The memory stores instructions executable by the processor to receive from the sensor subsystem sensor data indicating locations along the body of a plurality of contact points between a user hand and the body, based at least in part on the sensor data, determine a touch profile of the user hand applied to the body, based at least in part on the touch profile of the user hand, determine a selected haptic output to be applied to the body, and cause a drive signal to be transmitted to the haptic feedback mechanism to apply the selected haptic output to the body.

Classes IPC  ?

  • G06F 3/038 - Dispositions de commande et d'interface à cet effet, p.ex. circuits d'attaque ou circuits de contrôle incorporés dans le dispositif
  • G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
  • G06F 3/0354 - Dispositifs de pointage déplacés ou positionnés par l'utilisateur; Leurs accessoires avec détection des mouvements relatifs en deux dimensions [2D] entre le dispositif de pointage ou une partie agissante dudit dispositif, et un plan ou une surface, p.ex. souris 2D, boules traçantes, crayons ou palets

22.

TRANSFORMER-BASED TEXT ENCODER FOR PASSAGE RETRIEVAL

      
Numéro d'application 17938173
Statut En instance
Date de dépôt 2022-10-05
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Cheng, Hao
  • Fang, Hao
  • Liu, Xiaodong
  • Gao, Jianfeng

Abrégé

A computing system includes a logic subsystem and a storage subsystem holding instructions executable by the logic subsystem to implement a transformer-based text encoder. The transformer-based text encoder includes a plurality of transformer blocks previously-trained to apply encoding operations to computer-readable text representations of input text strings, the computer-readable text representations including computer-readable question representations of input text questions, and computer-readable passage representations of input text passages. The plurality of transformer blocks include a shared transformer block trained for both the computer-readable question representations and the computer-readable passage representations and a specialized transformer block including two or more input-specific subnetworks, and a routing function to select an input-specific subnetwork of the two or more input-specific subnetworks for each of the computer-readable text representations.

Classes IPC  ?

23.

User-Controlled Firmware for Hosted Virtual Machines

      
Numéro d'application 17968621
Statut En instance
Date de dépôt 2022-10-18
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Shivaganga Nagaraju, Gangadhara Swamy
  • Chitnis, Pushkar Vijay
  • Zhang, Bo
  • Nad Rudra Gowda, Amar

Abrégé

A computer implemented method includes receiving first firmware information at a hosting environment identifying that a user has selected user-controlled firmware for user virtual machines to be hosted on the hosting environment. A copy of the user-controlled firmware is obtained and a user virtual machine is deployed that includes the user-controlled firmware. The user-controlled firmware is locked against changes by the hosting environment absent receiving permission from the user.

Classes IPC  ?

  • G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
  • G06F 8/65 - Mises à jour

24.

RESOURCE PROVISIONING

      
Numéro d'application 18161679
Statut En instance
Date de dépôt 2023-01-30
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Sen, Rathijit
  • Interlandi, Matteo
  • Cao, Jiashen

Abrégé

A system provisioning resources of a processing unit. The system predicts a performance impact on a workload attributable to a performance constraint of the processing unit for the workload according to a resource model, wherein the workload includes a query and the resource model characterizes attainable compute bandwidth, attainable memory bandwidth, and arithmetic intensity based on peak compute bandwidth and peak memory bandwidth of the processing unit. The system determines a resource allocation of the processing unit, based on the predicted performance impact and instructs the processing unit to allocate the resources for processing the workload based on the determined resource allocation.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]

25.

IDENTITY ANONYMIZATION WITH CONTROLLED MASKING AND FORMAT PRESERVING ENCRYPTION

      
Numéro d'application US2023032809
Numéro de publication 2024/081096
Statut Délivré - en vigueur
Date de dépôt 2023-09-15
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s) Proano, Guillermo Paul

Abrégé

Systems are methods are used for facilitating identify anonymization by using controlled masking and encryption of user identifiers, such as UUIDs. A system that manages a UUID converts the UUID into a set of one or more different unique versions of the UUID for one or more corresponding different partner system(s) by removing and replacing masked portions of the UUID and by selectively encrypting the non-masked portions of the UUID. New masked portions added to the new version(s) of the UUID identify different corresponding partner(s) and/or rules to be applied by the different partner(s) when handling the different unique version(s) of the UUID(s). Partner systems that receive the new versions of the UUID identify and utilize the new masked portions to deterministically control decrypting and/or other processing of the new version of the UUID.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • H04L 9/40 - Protocoles réseaux de sécurité

26.

SELECTIVELY AND INTELLIGENTLY DISPLAYING AUTHENTICATION NOTIFICATIONS TO PROTECT USERS

      
Numéro d'application US2023032808
Numéro de publication 2024/081095
Statut Délivré - en vigueur
Date de dépôt 2023-09-15
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Bandyopadhyay, Poulomi
  • Luthra, Rajat
  • Walker, Lee Francis
  • Edwards, Zachary Michael
  • Trent, Colin

Abrégé

Authentication request notifications are selectively suppressed, reducing notification fatigue and susceptibility to social engineering attacks. Authentication request notifications may be suppressed by not presenting a push notification on the user's phone. The authentication request may still be accessed and approved by manually opening the authenticator app. Notifications may be suppressed based on an estimation that the person attempting to login is not who they say they are. This estimation may be based on applying heuristics and/or machine learning models to the context of the login attempt, such as the IP address that originated the login request, time of day, recent user actions, patterns of previous logins, etc. One heuristic determines that the user has repeatedly ignored notifications caused by a particular IP address. Machine learning models generate a risk score from the login context, and notifications may be suppressed if the risk score exceeds a threshold.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

27.

SOURCE CODE PATCH GENERATION WITH RETRIEVAL-AUGMENTED TRANSFORMER

      
Numéro d'application US2023031787
Numéro de publication 2024/081075
Statut Délivré - en vigueur
Date de dépôt 2023-08-31
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Bakshi, Amandeep Singh
  • Shi, Xin
  • Sundaresan, Neelakantan
  • Svyatkovskiy, Alexey

Abrégé

A source code patch generation system uses the context of a buggy source code snippet of a source code program and a hint to predict a source code segment that repairs the buggy source code snippet. The hint is a source code segment that is semantically-similar to the buggy source code snippet where the similarity is based on a context of the buggy source code snippet. An autoregressive deep learning model uses the context of the buggy source code snippet and the hint to predict the most likely source code segment to repair the buggy source code snippet.

Classes IPC  ?

  • G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel
  • G06F 8/36 - Réutilisation de logiciel
  • G06F 8/71 - Gestion de versions ; Gestion de configuration
  • G06F 8/75 - Analyse structurelle pour la compréhension des programmes
  • G06N 3/02 - Réseaux neuronaux

28.

RESOURCE PROVISIONING

      
Numéro d'application US2023031781
Numéro de publication 2024/081071
Statut Délivré - en vigueur
Date de dépôt 2023-08-31
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Sen, Rathijit
  • Interlandi, Matteo
  • Cao, Jiashen

Abrégé

A system provisioning resources of a processing unit. The system predicts a performance impact on a workload attributable to a performance constraint of the processing unit for the workload according to a resource model, wherein the workload includes a query and the resource model characterizes attainable compute bandwidth, attainable memory bandwidth, and arithmetic intensity based on peak compute bandwidth and peak memory bandwidth of the processing unit. The system determines a resource allocation of the processing unit, based on the predicted performance impact and instructs the processing unit to allocate the resources for processing the workload based on the determined resource allocation.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]

29.

VISUALIZATION OF APPLICATION CAPABILITIES

      
Numéro d'application US2023031784
Numéro de publication 2024/081073
Statut Délivré - en vigueur
Date de dépôt 2023-08-31
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Dhatchina Moorthy, Madhan Kumar
  • Spaidal, Christopher Bradley
  • Lesnoy, Dmitry

Abrégé

A systematic mechanism for visualizing functions or capabilities that an application has. One or more user experience objects are generated corresponding to an application. An application definition is obtained for that application, and then multiple user experience templates are identified based on that application definition. Information from the application definition is then used to populate at least one of the user experience templates to generate at least one object experience object. The user may then review visualizations of the user experience objects to determine the general capabilities of the application, and thereby determine whether to install or open the application, and how best to use the application.

Classes IPC  ?

  • G06F 8/38 - Création ou génération de code source pour la mise en œuvre d'interfaces utilisateur
  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
  • G06F 8/61 - Installation

30.

TRANSPARENTLY PROVIDING VIRTUALIZATION FEATURES TO UNENLIGHTENED GUEST OPERATING SYSTEMS

      
Numéro d'application US2023031783
Numéro de publication 2024/081072
Statut Délivré - en vigueur
Date de dépôt 2023-08-31
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Lin, Jin
  • Hepkin, David Alan
  • Ebersol, Michael Bishop
  • Kurjanowicz, Matthew David
  • Bhandari, Aditya
  • Mainetti, Attilio
  • Parish, Amy Anthony

Abrégé

Transparently providing a virtualization feature to an unenlightened guest operating system (OS). A guest partition, corresponding to a virtual machine, is divided into a first guest privilege context and a second guest privilege context. A compatibility component executes within the first guest privilege context, while a guest OS executes within the second guest privilege context. The compatibility component is configured to intercept input/output (I/O) operations associated with the guest operating OS. Based on the compatibility component intercepting an I/O operation associated with the guest OS, the compatibility component processes the I/O operation using a virtualization feature that is unsupported by the guest OS. Examples of the virtualization feature include accelerated access to a hardware device and virtual machine guest confidentiality.

Classes IPC  ?

  • G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

31.

IMPLEMENTING A TARGET BLOCK COMMAND ON AN UNSTRUCTURED DATA STORAGE NODE

      
Numéro d'application US2023031775
Numéro de publication 2024/081070
Statut Délivré - en vigueur
Date de dépôt 2023-08-31
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Desai, Shantanu
  • Dammalapati, Kantha Rao

Abrégé

The present disclosure relates to systems, methods, and computer-readable media for extending functionality of unstructured data storage function (UDSF) nodes in supporting features and functionality of services and applications that are accessible via a core network. The systems described herein include a UDSF node having a UDSF data management system that enables network functions to interact with and modify data resources separately maintained by the UDSF node(s). A network function may selectively target discrete sets of blocks of data on records to access without accessing entire records and without issuing redundance application programming interface (API) calls to the USDF node(s). the UDSF node may be implemented in a core network to enhance network functions in fifth generation (5G) and beyond communication environments.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 8/00 - Gestion de données relatives au réseau

32.

METHOD AND SYSTEM FOR EXTENDING QUERY PROCESSING WITH DIFFERENTIABLE OPERATORS

      
Numéro d'application US2023033315
Numéro de publication 2024/081108
Statut Délivré - en vigueur
Date de dépôt 2023-09-21
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Interlandi, Matteo
  • Gandhi, Apurva Sandeep
  • Asada, Yuki
  • Gemawat, Advitya
  • Fu, Victor Renjie
  • Zhang, Lihao
  • Sen, Rathijit
  • Banda, Dalitso Hansini

Abrégé

Example aspects include techniques for query processing over deep neural network runtimes. These techniques include receiving a query including a query operator and a trainable user defined function (UDF). In addition, the techniques include determining a query representation based on the query, and determining, for performing the query in a neural network runtime, an initial neural network program based on the query representation, the initial neural network program including a differentiable operators corresponding to the query operator. and executing the neural network program in the neural network runtime over the neural network data structure to generate a query result. Further, the techniques include training the initial neural network program via the neural network runtime to determine a trained neural network program, and executing the trained neural network program in the neural network runtime to generate inference information.

Classes IPC  ?

  • G06N 3/0464 - Réseaux convolutifs [CNN, ConvNet]
  • G06N 3/084 - Rétropropagation, p.ex. suivant l’algorithme du gradient
  • G06N 3/10 - Interfaces, langages de programmation ou boîtes à outils de développement logiciel, p.ex. pour la simulation de réseaux neuronaux

33.

MULTI-MODAL THREE-DIMENSIONAL FACE MODELING AND TRACKING FOR GENERATING EXPRESSIVE AVATARS

      
Numéro d'application US2023027748
Numéro de publication 2024/081052
Statut Délivré - en vigueur
Date de dépôt 2023-07-14
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Sawhney, Harpreet Singh
  • Lundell, Benjamin Eliot
  • Shah, Anshul Bhavesh
  • Cristian, Calin
  • Hewitt, Charles Thomas
  • Baltrusaitis, Tadas
  • Radojevic, Mladen
  • Grujcic, Kosta
  • Stojiljkovic, Ivan
  • Mcilroy, Paul Malcolm
  • Olafenwa, John Ishola
  • Jadidian, Jouya
  • Jakubzak, Kenneth Mitchell

Abrégé

Examples are disclosed that relate to generating expressive avatars using multi-modal three-dimensional face modeling and tracking. One example includes a computer system comprising a processor coupled to a storage system that stores instructions. Upon execution by the processor, the instructions cause the processor to receive initialization data describing an initial state of a facial model. The instructions further cause the processor to receive a plurality of multi-modal data signals. The instructions further cause the processor to perform a fitting process using the initialization data and the plurality of multi-modal data signals. The instructions further cause the processor to determine a set of parameters based on the fitting process, wherein the determined set of parameters describes an updated state of the facial model.

Classes IPC  ?

  • G06T 13/40 - Animation tridimensionnelle [3D] de personnages, p.ex. d’êtres humains, d’animaux ou d’êtres virtuels
  • G06T 7/00 - Analyse d'image
  • G06T 19/20 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie Édition d'images tridimensionnelles [3D], p.ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties

34.

TRACKING THREE-DIMENSIONAL GEOMETRIC SHAPES

      
Numéro d'application US2023034329
Numéro de publication 2024/081127
Statut Délivré - en vigueur
Date de dépôt 2023-10-03
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Allen, Lingzhi L.
  • Pauli, Wolfgang M.

Abrégé

A set of geometric shapes to be applied by a machine learning model to objects identified in image data is defined. A learning rate of the machine learning model is updated in response to external events. The machine learning model is used to estimate spatial parameters for each of the objects identified in the image data. The spatial parameters are estimated by fitting the objects to the set of geometric shapes. Updates to the spatial parameters are temporally integrated. A spatial estimate of the objects identified in the image data is generated.

Classes IPC  ?

  • G06T 7/73 - Détermination de la position ou de l'orientation des objets ou des caméras utilisant des procédés basés sur les caractéristiques

35.

BLINKLESS AND MARKERLESS BI-PHASE DISPLAY CALIBRATION

      
Numéro d'application US2023031481
Numéro de publication 2024/081068
Statut Délivré - en vigueur
Date de dépôt 2023-08-30
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s) Kim, Taemin

Abrégé

Techniques for separating an image into a forward sweeping image and a backward sweeping image are disclosed. A lookup table maps MEMS projection positions on a display with corresponding pixel positions in an image generated by a camera facing the display. The lookup table is used to associate a first set of pixel positions in the image with a forward scanning sweep of the MEMS system. The lookup table is also used to associate a second set of pixel positions in the image with a backward scanning sweep of the MEMS system. The first and second sets of pixel positions are used to generate the forward sweeping image and the backward sweeping image, respectively. These images can then be used to calibrate the MEMS system to compensate for bi-phase.

Classes IPC  ?

  • G02B 26/08 - Dispositifs ou dispositions optiques pour la commande de la lumière utilisant des éléments optiques mobiles ou déformables pour commander la direction de la lumière
  • G02B 26/10 - Systèmes de balayage
  • G02B 27/01 - Dispositifs d'affichage "tête haute"

36.

VISUALIZATION OF APPLICATION CAPABILITIES

      
Numéro d'application 18076240
Statut En instance
Date de dépôt 2022-12-06
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Dhatchina Moorthy, Madhan Kumar
  • Spaidal, Christopher Bradley
  • Lesnoy, Dmitry

Abrégé

A systematic mechanism for visualizing functions or capabilities that an application has. One or more user experience objects are generated corresponding to an application. An application definition is obtained for that application, and then multiple user experience templates are identified based on that application definition. Information from the application definition is then used to populate at least one of the user experience templates to generate at least one object experience object. The user may then review visualizations of the user experience objects to determine the general capabilities of the application, and thereby determine whether to install or open the application, and how best to use the application.

Classes IPC  ?

  • G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
  • G06F 8/61 - Installation

37.

ENRICHING EXPOSED CREDENTIAL SEARCH RESULTS TO MAKE THEM ACTIONABLE

      
Numéro d'application 17967113
Statut En instance
Date de dépôt 2022-10-17
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Fanning, Michael Christopher
  • Mukherjee, Suvam
  • Czerwonka, Jacek Andrzej
  • Faucon, Christopher Michael Henry
  • Okada Nakamura, Eddy Toshiyuki
  • Gonzalez, Danielle Nicole
  • Couraud, Nicolas Yves
  • Maclellan, Alison Lynne

Abrégé

Techniques for (i) using contextual information associated with an exposed credential to identify a resource that could be accessed using the exposed credential, (ii) identifying a responsible entity of that resource, and (iii) alerting the responsible entity about the exposed credential are disclosed. A credential is determined to be in an exposed state. The exposed credential, if used, could potentially provide an actor access to a resource, despite the fact that the actor should not have access to the resource. The exposed credential is analyzed to determine a context. Based on that context, the resource is identified. A responsible entity associated with the resource is identified. An alert is then sent to that entity.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

38.

MITIGATING VAPOR LOSS IN A TWO-PHASE IMMERSION COOLING SYSTEM

      
Numéro d'application 18396153
Statut En instance
Date de dépôt 2023-12-26
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Keehn, Nicholas Andrew
  • Manousakis, Ioannis
  • Saunders, Winston Allen
  • Alissa, Husam Atallah
  • Peterson, Eric Clarence

Abrégé

Techniques for mitigating loss of vaporized working fluid in a two-phase immersion cooling system may be implemented using one or more supplemental condensers that facilitate condensation of vaporized working fluid when the immersion tank is open, and one or more vapor collection points that are in fluid communication with at least one supplemental condenser. One or more fluid displacement devices may be configured to create suction pressure at the one or more vapor collection points. One or more vents may be positioned in the door. The one or more vents may be configured to permit movement of air from outside the immersion tank into an interior portion of the immersion tank without permitting loss of vaporized working fluid. A directional blowing device may be configured to blow a gaseous substance against a computing device in a downward direction as the computing device is being pulled upward out of the immersion tank.

Classes IPC  ?

  • H05K 7/20 - Modifications en vue de faciliter la réfrigération, l'aération ou le chauffage

39.

NON-PARAMETRIC METHODS OF RESOURCE ALLOCATION

      
Numéro d'application 17932967
Statut En instance
Date de dépôt 2022-09-16
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s) Hamze, Firas

Abrégé

A general methodology is presented for optimizing a value at risk (VaR) associated with an allocation of objects (i.e., a strategy) having variable performance and loss characteristics. For purposes of illustration, investment strategies prescribing a portfolio of items from a set of candidates with unknown and generally correlated joint losses are discussed. The framework is based on approximating the VaR using nonparametric estimates of the portfolio loss density and, using mathematical insights, an efficient approach to computing the VaR gradient with respect to the strategy. The approach also allows inclusion of constraints on the strategy (e.g. a maximum fraction per item) and allows the VaR optimization problem to be solved using optimization techniques such as sequential quadratic programming.

Classes IPC  ?

  • G06Q 50/06 - Fourniture d'électricité, de gaz ou d'eau
  • G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques
  • G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation

40.

SYSTEMS AND METHODS FOR IMPROVING FUNCTIONALITY AND REMOTE MANAGEMENT OF COMPUTING RESOURCES DEPLOYED IN A CONTROLLED HIERARCHICAL NETWORK

      
Numéro d'application 17966547
Statut En instance
Date de dépôt 2022-10-14
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Addaguduru, Chandra Mouli
  • Garimella, Phalgun
  • Dhruva, Krupesh Satishkumar
  • Karumanchi, Narasimha Rao

Abrégé

The present disclosure relates to utilizing a hierarchical network communication system to efficiently manage and monitor a controlled hierarchical network. In particular, the hierarchical network communication system utilizes gateway services embedded among various architecture levels of a controlled hierarchical network to facilitate secure communications between levels of the hierarchical network as well as with an authorized external computing device or computing system. In various instances, the gateway service includes various components and elements that facilitate inter-network level communication as well as remote management, including monitoring, configuring, and upgrading components and resources at each level of the controlled hierarchical network. Indeed, the hierarchical network communication system facilitates the remote management of a controlled hierarchical network while upholding the strict security and communication protocols required for networks adhering to the Purdue Reference Architecture Model, ISA-95 standards, and ISA-99 standards.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 41/044 - Architectures ou dispositions de gestion de réseau comprenant des structures de gestion hiérarchisées

41.

Workload-Aware Hardware Architecture Recommendations

      
Numéro d'application 17965681
Statut En instance
Date de dépôt 2022-10-13
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Phanishayee, Amar
  • Mahajan, Divya
  • Kulkarni, Janardhan
  • Castro, Miguel
  • Adnan, Muhammad

Abrégé

The description relates to accelerator architectures for deep learning models. One example can obtain a deep learning training script associated with a deep learning model and extract an operator graph from the training script. The example can split the operator graph into first and second portions of a heterogeneous pipeline and tune a first accelerator core for the first portion of the heterogeneous pipeline and a second accelerator core for the second portion of the heterogeneous pipeline. The example can also generate a hardware architecture that includes the first accelerator core and the second accelerator core arranged to collectively accomplish the deep learning model.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
  • G06F 9/48 - Lancement de programmes; Commutation de programmes, p.ex. par interruption
  • G06N 3/08 - Méthodes d'apprentissage

42.

TRANSPARENTLY PROVIDING VIRTUALIZATION FEATURES TO UNENLIGHTENED GUEST OPERATING SYSTEMS

      
Numéro d'application 18145247
Statut En instance
Date de dépôt 2022-12-22
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Lin, Jin
  • Hepkin, David Alan
  • Ebersol, Michael Bishop
  • Kurjanowicz, Matthew David
  • Bhandari, Aditya
  • Mainetti, Attilio
  • Parish, Amy Anthony

Abrégé

Transparently providing a virtualization feature to an unenlightened guest operating system (OS). A guest partition, corresponding to a virtual machine, is divided into a first guest privilege context and a second guest privilege context. A compatibility component executes within the first guest privilege context, while a guest OS executes within the second guest privilege context. The compatibility component is configured to intercept input/output (I/O) operations associated with the guest operating OS. Based on the compatibility component intercepting an I/O operation associated with the guest OS, the compatibility component processes the I/O operation using a virtualization feature that is unsupported by the guest OS. Examples of the virtualization feature include accelerated access to a hardware device and virtual machine guest confidentiality.

Classes IPC  ?

  • G06F 9/455 - Dispositions pour exécuter des programmes spécifiques Émulation; Interprétation; Simulation de logiciel, p.ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation

43.

ACTIVITY BASED SORTING IN COLLABORATIVE APPLICATIONS

      
Numéro d'application 18538653
Statut En instance
Date de dépôt 2023-12-13
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Stephens, David Adam
  • Chism, Shane Michael
  • Kile, Jr., Nathan Darrel
  • Allison, Angela Kaye
  • Zarzar, Dan
  • Milvaney, Douglas Lane
  • Sharma, Manoj

Abrégé

Aspects of the present disclosure relate to systems and methods for sorting one or more files hosted by a collaborative application. In one aspect, one or more activity signals associated with one or more files hosted by the collaborative application may be received from a substrate. An activity-based sort order may be determined using at least a combination of the one or more activity signals. The activity-based sort order may be applied to sort the one or more files hosted by the collaborative application for display in a user interface to an activity object of the collaborative application.

Classes IPC  ?

  • G06F 16/16 - Opérations sur les fichiers ou les dossiers, p.ex. détails des interfaces utilisateur spécialement adaptées aux systèmes de fichiers
  • G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
  • G06F 3/04847 - Techniques d’interaction pour la commande des valeurs des paramètres, p.ex. interaction avec des règles ou des cadrans
  • G06F 16/176 - Support d’accès partagé aux fichiers; Support de partage de fichiers

44.

SELECTIVELY AND INTELLIGENTLY DISPLAYING AUTHENTICATION NOTIFICATIONS TO PROTECT USERS

      
Numéro d'application 18146766
Statut En instance
Date de dépôt 2022-12-27
Date de la première publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Bandyopadhyay, Poulomi
  • Luthra, Rajat
  • Walker, Lee Francis
  • Edwards, Zachary Michael
  • Trent, Colin

Abrégé

Authentication request notifications are selectively suppressed, reducing notification fatigue and susceptibility to social engineering attacks. Authentication request notifications may be suppressed by not presenting a push notification on the user's phone. The authentication request may still be accessed and approved by manually opening the authenticator app. Notifications may be suppressed based on an estimation that the person attempting to login is not who they say they are. This estimation may be based on applying heuristics and/or machine learning models to the context of the login attempt, such as the IP address that originated the login request, time of day, recent user actions, patterns of previous logins, etc. One heuristic determines that the user has repeatedly ignored notifications caused by a particular IP address. Machine learning models generate a risk score from the login context, and notifications may be suppressed if the risk score exceeds a threshold.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

45.

PROGRAM ACCELERATORS WITH MULTIDIMENSIONAL NESTED COMMAND STRUCTURES

      
Numéro d'application 17966637
Statut En instance
Date de dépôt 2022-10-14
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Zhu, Haishan
  • Chung, Eric S.

Abrégé

Embodiments of the present disclosure include techniques for machine language processing. In one embodiment, the present disclosure include commands with data structures comprising fields describing multi-dimensional data and fields describing synchronization. Large volumes of data may be processed and automatically synchronized by execution of a single command.

Classes IPC  ?

46.

SYSTEMS AND METHODS FOR DATACENTER THERMAL MANAGEMENT

      
Numéro d'application 18277513
Statut En instance
Date de dépôt 2022-02-16
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Manousakis, Ioannis
  • De Assis, Rodrigo Lemos
  • Gauthier, David Thomas
  • Warrier, Ii, Brijesh

Abrégé

A method of responding to a thermal management capacity reduction in a datacenter includes obtaining (236) process allocations assigned to a plurality of electronic devices in the datacenter and determining (238) a process priority list based on the process allocations assigned to the plurality of electronic devices. The method further includes monitoring (240) at least one cooling sensor configured to measure a thermal management capacity of a cooling system of the plurality of electronic devices and, in response to detecting a reduction in thermal management capacity, reducing (242) power delivery to at least one electronic device of the plurality of electronic devices based at least partially on the process priority list.

Classes IPC  ?

47.

IMPLEMENTING A TARGET BLOCK COMMAND ON AN UNSTRUCTURED DATA STORAGE NODE

      
Numéro d'application 17965525
Statut En instance
Date de dépôt 2022-10-13
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Desai, Shantanu
  • Dammalapati, Kantha Rao

Abrégé

The present disclosure relates to systems, methods, and computer-readable media for extending functionality of unstructured data storage function (UDSF) nodes in supporting features and functionality of services and applications that are accessible via a core network. The systems described herein include a UDSF node having a UDSF data management system that enables network functions to interact with and modify data resources separately maintained by the UDSF node(s). A network function may selectively target discrete sets of blocks of data on records to access without accessing entire records and without issuing redundance application programming interface (API) calls to the USDF node(s). the UDSF node may be implemented in a core network to enhance network functions in fifth generation (5G) and beyond communication environments.

Classes IPC  ?

  • H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p.ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
  • G06F 3/06 - Entrée numérique à partir de, ou sortie numérique vers des supports d'enregistrement

48.

DEVICES, SYSTEMS, AND METHODS FOR A COOLING SYSTEM

      
Numéro d'application 17968619
Statut En instance
Date de dépôt 2022-10-18
Date de la première publication 2024-04-18
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Dong, Fang
  • Jin, Meng
  • Mehta, Jigar
  • Babang, Mayila
  • Treves, Michele Alberto Scipione
  • Peterson, Martha Geoghegan
  • Xu, Linjie
  • Gupta, Naval
  • Cho, Hyunjung

Abrégé

A cooling system may include a tank filled with a first cooling fluid. The cooling system may include a container including a chamber, the chamber receiving a heat-generating component, the container being sealed, the container being at least partially submerged in the first cooling fluid in the tank, the container including a second cooling fluid.

Classes IPC  ?

  • H05K 7/20 - Modifications en vue de faciliter la réfrigération, l'aération ou le chauffage
  • G06F 1/20 - Moyens de refroidissement

49.

DEEP FUSION OF KERNEL EXECUTION

      
Numéro d'application US2023031789
Numéro de publication 2024/081076
Statut Délivré - en vigueur
Date de dépôt 2023-08-31
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Zhu, Haishan
  • Shah, Preyas Janak
  • Mitra, Tiyasa
  • Chung, Eric S.

Abrégé

Embodiments of the present disclosure include techniques for machine language processing. In one embodiment, the present disclosure includes configuring functional modules on a machine learning processor to execute a plurality of machine learning (ML) operations during a plurality of time segments. During the time segments, a first portion of the ML operations execute serially and at least one other ML operation executes during at least a majority of the time of each of the time segments. Serial ML operations may be processed simultaneously with the at least one other ML operation.

Classes IPC  ?

  • G06N 3/063 - Réalisation physique, c. à d. mise en œuvre matérielle de réseaux neuronaux, de neurones ou de parties de neurone utilisant des moyens électroniques
  • G06N 3/04 - Architecture, p.ex. topologie d'interconnexion
  • G06N 3/08 - Méthodes d'apprentissage

50.

AUTOMATICALLY REDUCING AN ECHO IMPACT IN AN ONLINE CONFERENCE

      
Numéro d'application US2023031785
Numéro de publication 2024/081074
Statut Délivré - en vigueur
Date de dépôt 2023-08-31
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Yang, Huipeng
  • Zou, Jian
  • Wang, Shuo
  • Zhou, Minliang

Abrégé

The present disclosure proposes a method, an apparatus, and a computer program product for automatically reducing an echo impact in an online conference. An initial audio signal produced by a device participating in an online conference may be obtained during the online conference. It may be detected whether there is an echo in the initial audio signal. In response to detecting that there is an echo in the initial audio signal, it may be determined whether an acoustic echo cancellation function of a conferencing application for conducting the online conference on the device is enabled. In response to determining that the acoustic echo cancellation function is not enabled, the acoustic echo cancellation function may be automatically enabled.

Classes IPC  ?

  • H04M 9/08 - Systèmes téléphoniques à haut-parleur à double sens comportant des moyens pour conditionner le signal, p.ex. pour supprimer les échos dans l'une ou les deux directions du trafic 

51.

PROGRAM ACCELERATORS WITH MULTIDIMENSIONAL NESTED COMMAND STRUCTURES

      
Numéro d'application US2023031790
Numéro de publication 2024/081077
Statut Délivré - en vigueur
Date de dépôt 2023-08-31
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Zhu, Haishan
  • Chung, Eric S.

Abrégé

Embodiments of the present disclosure include techniques for machine language processing. In one embodiment, the present disclosure include commands with data structures comprising fields describing multi-dimensional data and fields describing synchronization. Large volumes of data may be processed and automatically synchronized by execution of a single command.

Classes IPC  ?

  • G06F 12/02 - Adressage ou affectation; Réadressage
  • G06N 3/04 - Architecture, p.ex. topologie d'interconnexion
  • G06N 3/063 - Réalisation physique, c. à d. mise en œuvre matérielle de réseaux neuronaux, de neurones ou de parties de neurone utilisant des moyens électroniques
  • G06F 9/30 - Dispositions pour exécuter des instructions machines, p.ex. décodage d'instructions
  • G06F 9/345 - Adressage de l'opérande d'instruction ou du résultat ou accès à l'opérande d'instruction ou au résultat d'opérandes ou de résultats multiples
  • G06F 9/355 - Adressage indexé

52.

SYSTEMS AND METHODS FOR IMPROVING FUNCTIONALITY AND REMOTE MANAGEMENT OF COMPUTING RESOURCES DEPLOYED IN A CONTROLLED HIERARCHICAL NETWORK

      
Numéro d'application US2023031793
Numéro de publication 2024/081078
Statut Délivré - en vigueur
Date de dépôt 2023-08-31
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Addaguduru, Chandra Mouli
  • Garimella, Phalgun
  • Dhruva, Krupesh Satishkumar
  • Karumanchi, Narasimha Rao

Abrégé

The present disclosure relates to utilizing a hierarchical network communication system to efficiently manage and monitor a controlled hierarchical network. In particular, the hierarchical network communication system utilizes gateway services embedded among various architecture levels of a controlled hierarchical network to facilitate secure communications between levels of the hierarchical network as well as with an authorized external computing device or computing system. In various instances, the gateway service includes various components and elements that facilitate inter-network level communication as well as remote management, including monitoring, configuring, and upgrading components and resources at each level of the controlled hierarchical network. Indeed, the hierarchical network communication system facilitates the remote management of a controlled hierarchical network while upholding the strict security and communication protocols required for networks adhering to the Purdue Reference Architecture Model, ISA-95 standards, and ISA-99 standards.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]
  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04W 84/02 - Réseaux pré-organisés hiérarchiquement, p.ex. réseaux de messagerie, réseaux cellulaires, réseaux locaux sans fil [WLAN Wireless Local Area Network] ou boucles locales sans fil [WLL Wireless Local Loop]

53.

PROCESSING OF QUERIES USING A CONSOLIDATED MATCHING ARCHITECTURE

      
Numéro d'application US2023031794
Numéro de publication 2024/081079
Statut Délivré - en vigueur
Date de dépôt 2023-08-31
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Jiao, Jian
  • Manavoglu, Eren

Abrégé

A query-processing technique includes an operation of matching the input query against a plurality of candidate target items, to produce a set of candidate query-item pairings. The matching is applicable to different classes of matching, but is performed by a computer processing architecture that uses a class-agnostic instance of query-processing logic and a class-agnostic target item index. After the matching operation, the technique assigns a matching class to each candidate query-item pairing in the set of candidate query-item pairings, to produce a set of classified pairings. The technique ultimately serves a particular output item to an end user, where the particular output item is chosen based on the results of the matching and assigning. Some implementations of the technique include a filtering operation whereby the candidate-item pairings are filtered to conform to a specified selection strategy or strategies. This filtering operation supplements or replaces the assigning operation.

Classes IPC  ?

  • G06F 16/951 - Indexation; Techniques d’exploration du Web
  • G06Q 30/0242 - Détermination de l’efficacité des publicités

54.

WORKLOAD-AWARE HARDWARE ARCHITECTURE RECOMMENDATIONS

      
Numéro d'application US2023032232
Numéro de publication 2024/081083
Statut Délivré - en vigueur
Date de dépôt 2023-09-08
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Phanishayee, Amar
  • Mahajan, Divya
  • Kulkarni, Janardhan
  • Castro, Miguel
  • Adnan, Muhammad

Abrégé

The description relates to accelerator architectures for deep learning models. One example can obtain a deep learning training script associated with a deep learning model and extract an operator graph from the training script. The example can split the operator graph into first and second portions of a heterogeneous pipeline and tune a first accelerator core for the first portion of the heterogeneous pipeline and a second accelerator core for the second portion of the heterogeneous pipeline. The example can also generate a hardware architecture that includes the first accelerator core and the second accelerator core arranged to collectively accomplish the deep learning model.

Classes IPC  ?

55.

SYSTEMS AND METHODS FOR ENCODING AN INTERACTIVE SOFTWARE VIDEO STREAM

      
Numéro d'application US2023032231
Numéro de publication 2024/081082
Statut Délivré - en vigueur
Date de dépôt 2023-09-08
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s) Mosier, Scott David

Abrégé

A method of encoding video streams includes, at an encoding device, receiving a first video stream frame from a first server device at the encoding device at a first receipt time; receiving a second video stream frame from a second server device at the encoding device at a second receipt time; encoding the first video stream frame with the encoding device; determining a delay duration based at least partially on a first encoding duration of the first video stream frame and the second receipt time; and transmitting a delay instruction based at least partially on the delay duration to the second server device.

Classes IPC  ?

  • H04N 21/2343 - Traitement de flux vidéo élémentaires, p.ex. raccordement de flux vidéo ou transformation de graphes de scènes MPEG-4 impliquant des opérations de reformatage de signaux vidéo pour la distribution ou la mise en conformité avec les requêtes des utilisateurs finaux ou les exigences des dispositifs des utilisateurs finaux
  • H04N 21/24 - Surveillance de procédés ou de ressources, p.ex. surveillance de la charge du serveur, de la bande passante disponible ou des requêtes effectuées sur la voie montante
  • H04N 21/242 - Procédés de synchronisation, p.ex. traitement de références d'horloge de programme [PCR]

56.

HOLLOW CORE OPTICAL FIBRE TRANSMISSION LINK

      
Numéro d'application US2023031801
Numéro de publication 2024/081080
Statut Délivré - en vigueur
Date de dépôt 2023-09-01
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Harker, Andrew Thomas
  • Lang, Ian Dewi

Abrégé

An optical fibre transmission link for propagating optical signals at a selected wavelength or wavelength range to and/or from a transceiver comprises: portions of optical fibre arranged sequentially along a length of the optical fibre transmission link, the portions of optical fibre comprising at least two portions of hollow core optical fibre, the at least two portions of hollow core optical fibre including at least one short portion of hollow core optical fibre having a length of 100 m or less and at least one long portion of hollow core optical fibre having a length of 500 m or more; wherein the at least one short portion has a higher order mode attenuation at the wavelength or wavelength range which is greater than a higher order mode attenuation at the wavelength or wavelength range of the at least one long portion.

Classes IPC  ?

  • G02B 6/02 - Fibres optiques avec revêtement
  • G02B 6/14 - Convertisseurs de mode
  • G02B 6/255 - Epissage des guides de lumière, p.ex. par fusion ou par liaison
  • G02B 6/12 - OPTIQUE ÉLÉMENTS, SYSTÈMES OU APPAREILS OPTIQUES - Détails de structure de dispositions comprenant des guides de lumière et d'autres éléments optiques, p.ex. des moyens de couplage du type guide d'ondes optiques du genre à circuit intégré

57.

GESTURE-DRIVEN PIVOT TABLE CONFIGURATIONS

      
Numéro d'application US2023031469
Numéro de publication 2024/081065
Statut Délivré - en vigueur
Date de dépôt 2023-08-30
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Simonyi, Charles
  • Osorio Cardona, Juan Camilo

Abrégé

An enhanced user experience is disclosed herein that provides for gesture-based configuring of pivot tables. In various implementations, a pivot table includes query areas associated with fields of a data table being summarized by the pivot table. Gestures made with respect to an area of the pivot table drive changes in the association of the fields of the data table with the query areas of the pivot table. As user input is received with respect to an area of the pivot table, relevant fields are identified, and new associations are made between the query areas and the fields. The pivot table may then be updated accordingly based on the new associations.

Classes IPC  ?

58.

SCHEDULE SEND SUGGESTION IN AN APPLICATION CHAT

      
Numéro d'application US2023031466
Numéro de publication 2024/081064
Statut Délivré - en vigueur
Date de dépôt 2023-08-30
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Zhang, Jiaoyan
  • Guo, Wendy
  • Taing, John Hay
  • Batta, Vineet
  • Isakov, Yury
  • Tam, Simon Chun Ho
  • Nino Tapia, Jennifer Andrea
  • Wall, Matthew David
  • Lynch, Sean Michael
  • Natanov, Milena
  • Constance, Angelina

Abrégé

The present disclosure relates to methods and systems for automatically providing a suggestion to delay sending a message that is being composed by a user to send to a chat participant using a chat feature of an application. The suggestion is sent in response to determining that one or more trigger conditions occurred. The suggestion includes a scheduled time to send the message. The methods and systems send the delayed message at the scheduled time.

Classes IPC  ?

  • G06F 16/9035 - Filtrage basé sur des données supplémentaires, p.ex. sur des profils d'utilisateurs ou de groupes

59.

ACCESS CONTROL USING MEDIATED LOCATION, ATTRIBUTE, POLICY, AND PURPOSE VERIFICATION

      
Numéro d'application US2023031471
Numéro de publication 2024/081066
Statut Délivré - en vigueur
Date de dépôt 2023-08-30
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Venkatesan, Ramarathnam
  • Chandran, Nishanth
  • Ananthanarayanan, Ganesh
  • Antonopoulos, Panagiotis
  • Setty, Srinath T.V.
  • Carroll, Daniel John, Jr.
  • Muthabatulla, Kiran
  • Shu, Yuanchao
  • Mehrotra, Sanjeev

Abrégé

An access control system is disclosed for controlling access to a resource. A request is received by a location attribute policy (LAP) server to access an encrypted resource. The LAP server accesses a resource policy that identifies requirements for granting access to the encrypted resource, such as a list of attributes of the requestor that are required and a dynamic attribute requirement of the requestor. The LAP server receives a cryptographic proof from the computing device that the requestor possesses the attributes and validates the proof based at least on information obtained from a trusted ledger. Once the proof is validated, the LAP server provides a shared secret associated with the dynamic attribute requirement to a decryption algorithm. The decryption algorithm uses the dynamic attribute shared secret in combination with one or more attribute shared secrets from the requestor to generate a decryption key for the encrypted resource.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
  • H04L 9/14 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité utilisant plusieurs clés ou algorithmes
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
  • H04L 9/08 - Répartition de clés
  • H04L 9/30 - Clé publique, c. à d. l'algorithme de chiffrement étant impossible à inverser par ordinateur et les clés de chiffrement des utilisateurs n'exigeant pas le secret

60.

SEARCH SYSTEM THAT PROVIDES SEARCH RESULTS AND GENERATED CONTENT

      
Numéro d'application US2023031477
Numéro de publication 2024/081067
Statut Délivré - en vigueur
Date de dépôt 2023-08-30
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Sacheti, Arun Kumar
  • Yang, Nevin
  • Merchant, Meenaz Aliraza
  • Govindarajen, Parthasarathy
  • Devries, Jeff R.
  • Fischel, Jason Blake

Abrégé

A computing system is described, where the computing system includes a processor and memory storing instructions that, when executed by the processor, cause the processor to perform several acts. The acts include receiving a query from an application executing on a client computing device that is in network communication with the computing system. The acts also include searching a computer-readable index of items based upon the query, identifying an item based upon the searching of the computer-readable index, transmitting the query to a computer-implemented model, and obtaining content generated by the computer-implemented model, where the computer-implemented model generated the content based upon the query. The acts further include returning at least one of the item or the content to the client computing device for presentment by way of the application executing on the client computing device.

Classes IPC  ?

  • G06F 16/953 - Requêtes, p.ex. en utilisant des moteurs de recherche du Web

61.

OPTIMIZING INTELLIGENT THRESHOLD ENGINES IN MACHINE LEARNING OPERATIONS SYSTEMS

      
Numéro d'application US2023031491
Numéro de publication 2024/081069
Statut Délivré - en vigueur
Date de dépôt 2023-08-30
Date de publication 2024-04-18
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Boue, Laurent
  • Rama, Kiran

Abrégé

A sample of data, including a risk factor, is selected by a machine learning (ML) model of an extreme value theory (EVT) mechanism. A threshold is determined by the ML model based on the risk factor, an outlier score is generated for the sample, and the outlier score is compared to the threshold. The sample is identified as anomalous based on the generated outlier score being greater than the threshold. A schema comprising results of an investigation into the sample and the risk factor is updated based on the received schema.

Classes IPC  ?

62.

Embedding-based retrieval techniques for feeds

      
Numéro d'application 17974220
Numéro de brevet 11960550
Statut Délivré - en vigueur
Date de dépôt 2022-10-26
Date de la première publication 2024-04-16
Date d'octroi 2024-04-16
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Faust, Francisco José Claude
  • Mohamed, Ali
  • Raveendran, Nisheedh
  • Sikka, Namit
  • Dangi, Siddharth
  • Tiwana, Birjodh Singh
  • Peck, Adam Robert

Abrégé

Described herein is a technique to facilitate filtering during candidate retrieval stage performed by an information retrieval system that utilizes embedding models. An aNN indexing structure is created for each end-user, and in some instances, each activity type. This allows a single request for candidate content items to invoke a single process to obtain content items that satisfy the filtering criteria (e.g., in this case, the in-network requirement) from the separate per-end-user indexes.

Classes IPC  ?

  • G06F 16/00 - Recherche d’informations; Structures de bases de données à cet effet; Structures de systèmes de fichiers à cet effet
  • G06F 16/2458 - Types spéciaux de requêtes, p.ex. requêtes statistiques, requêtes floues ou requêtes distribuées
  • G06F 16/951 - Indexation; Techniques d’exploration du Web

63.

End-to-end service creation, management, and orchestration in mobile networks

      
Numéro d'application 18071837
Numéro de brevet 11962460
Statut Délivré - en vigueur
Date de dépôt 2022-11-30
Date de la première publication 2024-04-16
Date d'octroi 2024-04-16
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Draznin, Sagiv
  • Goyal, Pankaj
  • Ananthakrishnan, Karthik

Abrégé

An end-to-end service delivery system provides customers representing mobile network and enterprise operators with an online repository for services that are created from virtual network functions, and which are available from multiple service creators and operable across infrastructure underlying the customer's software-defined networking-based mobile network including diverse private, public, and hybrid cloud platforms. The network functions delivery system provides a user interface (UI) exposing a catalog of differentiated services of varying types. When the customer selects a service from the catalog, the service delivery system uses an installation engine to deploy the selected service on the customer's mobile network. The system provides a lifecycle management and orchestration engine that orchestrates the deployed service on an end-to-end basis across domains and network platforms. The service delivery system troubleshoots the service installation if deployment problems arise and notifies the customer of issues through the UI to provide recommendations and solutions.

Classes IPC  ?

  • H04L 41/0806 - Réglages de configuration pour la configuration initiale ou l’approvisionnement, p.ex. prêt à l’emploi [plug-and-play]
  • H04L 41/0895 - Configuration de réseaux ou d’éléments virtualisés, p.ex. fonction réseau virtualisée ou des éléments du protocole OpenFlow
  • H04L 41/14 - Analyse ou conception de réseau
  • H04L 41/40 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p.ex. des réseaux de commutation de paquets en utilisant la virtualisation des fonctions réseau ou ressources, p.ex. entités SDN ou NFV
  • H04L 43/55 - Test de la qualité du niveau de service, p.ex. simulation de l’utilisation du service

64.

Neural network categorization accuracy with categorical graph neural networks

      
Numéro d'application 17981822
Numéro de brevet 11960573
Statut Délivré - en vigueur
Date de dépôt 2022-11-07
Date de la première publication 2024-04-16
Date d'octroi 2024-04-16
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Du, Tianchuan
  • Chang, Keng-Hao
  • Zhang, Ruofei
  • Liu, Paul

Abrégé

Neural network-based categorization can be improved by incorporating graph neural networks that operate on a graph representing the taxonomy of the categories into which a given input is to be categorized by the neural network based-categorization. The output of a graph neural network, operating on a graph representing the taxonomy of categories, can be combined with the output of a neural network operating upon the input to be categorized, such as through an interaction of multidimensional output data, such as a dot product of output vectors. In such a manner, information conveying the explicit relationships between categories, as defined by the taxonomy, can be incorporated into the categorization. To recapture information, incorporate new information, or reemphasize information a second neural network can also operate upon the input to be categorized, with the output of such a second neural network being merged with the output of the interaction.

Classes IPC  ?

  • G06K 9/62 - Méthodes ou dispositions pour la reconnaissance utilisant des moyens électroniques
  • G06F 17/16 - Calcul de matrice ou de vecteur
  • G06F 18/20 - Analyse
  • G06F 18/241 - Techniques de classification relatives au modèle de classification, p.ex. approches paramétriques ou non paramétriques
  • G06F 18/25 - Techniques de fusion
  • G06F 40/30 - Analyse sémantique
  • G06N 3/045 - Combinaisons de réseaux
  • G06N 3/084 - Rétropropagation, p.ex. suivant l’algorithme du gradient
  • G06N 5/046 - Inférence en avant; Systèmes de production
  • G06N 20/10 - Apprentissage automatique utilisant des méthodes à noyaux, p.ex. séparateurs à vaste marge [SVM]
  • G06N 20/20 - Techniques d’ensemble en apprentissage automatique

65.

Leveraging inferred context to improve suggested messages

      
Numéro d'application 18178254
Numéro de brevet 11962546
Statut Délivré - en vigueur
Date de dépôt 2023-03-03
Date de la première publication 2024-04-16
Date d'octroi 2024-04-16
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Hattangady, Poonam Ganesh
  • Grimshaw, Susan Marie
  • Borysenko, Michael Ivan

Abrégé

Systems and methods for using a generative artificial intelligence (AI) model to generate a suggested draft reply to a selected message. A message generation system and method are described that use inferred context to improve the suggested draft reply message for the user. Various message data and additional context are obtained and included in a prompt provided to the AI model to improve suggested content. In some examples, the message data and additional context include a message thread history and previously sent messages, profile information of the sender and recipient(s) of the selected message, known relationship information between the sender and the user, etc. For instance, the user's preferred communication style and talking points can be inferred based on the profile data, relationship data, and the user's past communications with similar participants and used to tailor the suggested draft reply to the user.

Classes IPC  ?

  • G06F 17/00 - TRAITEMENT ÉLECTRIQUE DE DONNÉES NUMÉRIQUES Équipement ou méthodes de traitement de données ou de calcul numérique, spécialement adaptés à des fonctions spécifiques
  • G06F 3/0481 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] fondées sur des propriétés spécifiques de l’objet d’interaction affiché ou sur un environnement basé sur les métaphores, p.ex. interaction avec des éléments du bureau telles les fenêtres ou les icônes, ou avec l’aide d’un curseur changeant de comport
  • G06F 3/04842 - Sélection des objets affichés ou des éléments de texte affichés
  • G06F 40/166 - Traitement de texte Édition, p.ex. insertion ou suppression
  • G06F 40/284 - Analyse lexicale, p.ex. segmentation en unités ou cooccurrence
  • G06F 40/40 - Traitement ou traduction du langage naturel
  • H04L 51/02 - Messagerie d'utilisateur à utilisateur dans des réseaux à commutation de paquets, transmise selon des protocoles de stockage et de retransmission ou en temps réel, p.ex. courriel en utilisant des réactions automatiques ou la délégation par l’utilisateur, p.ex. des réponses automatiques ou des messages générés par un agent conversationnel
  • G06F 40/205 - Analyse syntaxique

66.

Detecting abusive collaborative activity using a graph neural network

      
Numéro d'application 18072754
Numéro de brevet 11962661
Statut Délivré - en vigueur
Date de dépôt 2022-12-01
Date de la première publication 2024-04-16
Date d'octroi 2024-04-16
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Oak, Rajvardhan Virendra
  • Khanna, Karan
  • Dave, Vacha Rajendra

Abrégé

A technique uses a graph neural network (GNN) to determine whether a particular entity under consideration is engaging in abusive network-related activity over a computing network in collaboration with other entities. In some applications, the particular entity is part of a bot attack aimed at fraudulently engaging with advertisements. The technique trains the GNN by performing machine learning on a training set that includes a plurality of nodes, edges, and node labels. In forming the training set, the technique associates a feature set with each node in the training set that describes the network activity exhibited by that node's entity. The technique then connects each pair of nodes in the training set with an edge if the feature sets of the pair satisfy a prescribed test for similarity. The technique assigns labels to at least some nodes to convey whether the nodes are associated abusive network-related activity.

Classes IPC  ?

  • H04L 67/50 - Services réseau
  • G06F 18/2413 - Techniques de classification relatives au modèle de classification, p.ex. approches paramétriques ou non paramétriques basées sur les distances des motifs d'entraînement ou de référence
  • G06N 3/08 - Méthodes d'apprentissage

67.

Generating service-to-service dependency map from DNS and fleet management system logs

      
Numéro d'application 18066527
Numéro de brevet 11962565
Statut Délivré - en vigueur
Date de dépôt 2022-12-15
Date de la première publication 2024-04-16
Date d'octroi 2024-04-16
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Pathak, Abhishek
  • Gandhi, Sorabh Kumar
  • Wittenberg, Craig Henry
  • Hao, Ming
  • Galwankar, Rohit Sanjay
  • Tejwani, Vivek Sanjeev

Abrégé

A computing system is provided, including a processor and memory storing instructions that cause the processor to execute a domain name service (DNS) log analyzer configured to identify a container identifier associated with a DNS request and a destination IP address associated with a DNS response to the DNS request, using one or more DNS logs, a fleet management system record analyzer configured to identify a first service associated with the container identifier and a second service associated with the destination IP address, using one or more fleet management system logs, and a dependency map generator configured to generate a service-to-service dependency map between the identified first service and the identified second service.

Classes IPC  ?

  • H04L 12/46 - Interconnexion de réseaux
  • H04L 61/3015 - Enregistrement, génération ou allocation de nom
  • H04L 61/4511 - Répertoires de réseau; Correspondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
  • H04L 61/5007 - Adresses de protocole Internet [IP]

68.

FRAMEWORK FOR INTERACTION AND CREATION OF AN OBJECT FOR A 3D EXPERIENCE IN AN ACCESSIBILITY ENVIRONMENT

      
Numéro d'application 18193373
Statut En instance
Date de dépôt 2023-03-30
Date de la première publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Humphrey, Brett D.
  • De Souza, Lucas Martins
  • Zhang, Yaying
  • Macdonnell, Daryan Josche
  • Dorsey, Emily Jane
  • Tice, Evan

Abrégé

The techniques disclosed herein enable systems to translate three-dimensional experiences into user accessible experiences to improve accessibility for users with disabilities. Namely, the discussed system enables users with disabilities to create and personalize objects for use in the three-dimensional experience. This is accomplished by translating and grouping components from a three-dimensional space to form an intuitive and logical hierarchy. The grouped components are then organized into an accessible user interface which a user with disabilities can navigate using simplified inputs and assistive technologies. In this way, users with disabilities can be empowered to personalize their user experience and understand a three-dimensional space in a layered, well-defined format.

Classes IPC  ?

  • G06T 19/20 - Transformation de modèles ou d'images tridimensionnels [3D] pour infographie Édition d'images tridimensionnelles [3D], p.ex. modification de formes ou de couleurs, alignement d'objets ou positionnements de parties
  • G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur
  • G06F 3/04815 - Interaction s’effectuant dans un environnement basé sur des métaphores ou des objets avec un affichage tridimensionnel, p.ex. modification du point de vue de l’utilisateur par rapport à l’environnement ou l’objet
  • G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p.ex. des menus
  • H04S 7/00 - Dispositions pour l'indication; Dispositions pour la commande, p.ex. pour la commande de l'équilibrage

69.

INTEROPERABILITY FOR TRANSLATING AND TRAVERSING 3D EXPERIENCES IN AN ACCESSIBILITY ENVIRONMENT

      
Numéro d'application 18193430
Statut En instance
Date de dépôt 2023-03-30
Date de la première publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Humphrey, Brett D.
  • Ng, Kian Chai
  • Gable, Thomas Matthew
  • Charnoff, Amichai
  • Grayson, Martin
  • Marques, Rita Faia
  • Morrison, Cecily Peregrine Borgatti
  • Balasubramanian, Harshadha

Abrégé

The techniques disclosed herein enable systems to translate three-dimensional experiences into user accessible experiences to improve accessibility for users with disabilities. This is accomplished by extracting components from a three-dimensional environment such as user avatars and furniture. The components are organized into component groups based on shared attributes. The component groups are subsequently organized into a flow hierarchy. The flow hierarchy is then presented to the user in an accessibility environment that enables interoperability with various accessibility tools such as screen readers, simplified keyboard inputs, and the like. Selecting a component group, and subsequently, a component through the accessibility environment accordingly invokes functionality within the three-dimensional environment. In this way, users with disabilities are empowered to fully interact with three-dimensional experiences.

Classes IPC  ?

  • G06F 3/04815 - Interaction s’effectuant dans un environnement basé sur des métaphores ou des objets avec un affichage tridimensionnel, p.ex. modification du point de vue de l’utilisateur par rapport à l’environnement ou l’objet
  • G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs

70.

PROVIDING RECENT EVENT INFORMATION FOR WEB SEARCH QUERIES

      
Numéro d'application 18263265
Statut En instance
Date de dépôt 2022-01-13
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Agarwal, Manoj Kumar
  • Ronnie, Gandhi Rajeshkumar

Abrégé

An electronic device may identify one or more search queries occurring frequently in a query log during a temporal period and maintain, for each of the one or more search queries, a frequency count of the search query occurring in the query log. The device may identify, a plurality of uniform resource locators (URLs) and match, one or more URLs of the plurality of URLs based on text of the URLs. The device may generate a news event profile for each search query and add each of the matching URLs into a respective news event profile. The device may receive a query from a user and identify, a matching news event profile. The device causes URLs of the matching news event profile and one or more related search queries from the first group of search queries to be presented to the user.

Classes IPC  ?

  • G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation
  • G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p.ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]

71.

TRACKING THREE-DIMENSIONAL GEOMETRIC SHAPES

      
Numéro d'application 18311476
Statut En instance
Date de dépôt 2023-05-03
Date de la première publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Allen, Lingzhi L.
  • Pauli, Wolfgang M.

Abrégé

A set of geometric shapes to be applied by a machine learning model to objects identified in image data is defined. A learning rate of the machine learning model is updated in response to external events. The machine learning model is used to estimate spatial parameters for each of the objects identified in the image data. The spatial parameters are estimated by fitting the objects to the set of geometric shapes. Updates to the spatial parameters are temporally integrated. A spatial estimate of the objects identified in the image data is generated.

Classes IPC  ?

  • G06T 7/60 - Analyse des attributs géométriques
  • G06N 3/084 - Rétropropagation, p.ex. suivant l’algorithme du gradient

72.

CASCADED VIDEO ANALYTICS FOR EDGE COMPUTING

      
Numéro d'application 18537291
Statut En instance
Date de dépôt 2023-12-12
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Ananthanarayanan, Ganesh
  • Shu, Yuanchao
  • Noghabi, Shadi
  • Bahl, Paramvir
  • Cox, Landon
  • Crown, Alexander

Abrégé

This document relates to performing live video stream analytics on edge devices. One example determines resources available to the system, and a video analytics configuration is selected that distributes work between edge devices and cloud devices in a cascading manner, where edge device processing is prioritized over cloud processing in order to conserve resources. This example can dynamically modify the allocation of processing depending on changing conditions, such as network availability.

Classes IPC  ?

  • G06F 16/71 - Indexation; Structures de données à cet effet; Structures de stockage
  • G06F 16/738 - Présentation des résultats des requêtes
  • G06F 16/783 - Recherche de données caractérisée par l’utilisation de métadonnées, p.ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
  • G06V 20/40 - RECONNAISSANCE OU COMPRÉHENSION D’IMAGES OU DE VIDÉOS Éléments spécifiques à la scène dans le contenu vidéo

73.

Smooth and Jump-Free Rapid Target Acquisition

      
Numéro d'application 18545501
Statut En instance
Date de dépôt 2023-12-19
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Price, Raymond Kirk
  • Bleyer, Michael
  • Edmonds, Christopher Douglas

Abrégé

Techniques for correcting an overlay misalignment between an external camera image and a system camera image are disclosed. A first system camera image and a first external camera image are acquired. A first visual alignment is performed between those two images to produce an overlaid image. Some of the content in the overlaid image is surrounded by a bounding element. A position of the bounding element is modified based on movements of the system camera and/or the external camera. In response to performing a second visual alignment using new images, an update vector is computed. Relative movement between the two cameras is determined. Based on the movement and based on the update vector, the bounding element is progressively transitioned to a corrected position in the overlaid image. A speed by which the bounding element is progressively transitioned is proportional to the amount of movement.

Classes IPC  ?

  • G06T 7/33 - Détermination des paramètres de transformation pour l'alignement des images, c. à d. recalage des images utilisant des procédés basés sur les caractéristiques
  • G02B 27/01 - Dispositifs d'affichage "tête haute"
  • G06T 7/11 - Découpage basé sur les zones
  • G06T 7/174 - Découpage; Détection de bords impliquant l'utilisation de plusieurs images

74.

PHYSICAL LAYOUTS OF MAJORANA-BASED QUBITS FOR IMPLEMENTATIONS OF PENTAGONAL TILINGS

      
Numéro d'application 17896258
Statut En instance
Date de dépôt 2022-08-26
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Bonderson, Parsa
  • Aasen, David Alexander
  • Knapp, Christina Paulsen

Abrégé

Physical layouts of Majorana-based qubits for implementations of pentagonal tilings are described. An example quantum device comprises a set of tetrons for enabling Majorana-based qubits. The set of tetrons is arranged in a lattice to allow pentagonal tilings associated with the set of tetrons. The vertices of the pentagonal tilings relate to the qubits and single qubit operations, and the edges of the pentagonal tilings (connecting different vertices) relate to 2-qubit operations acting on a pair of qubits connected by a given edge. As an example, the 1-qubit Pauli measurements relate to the operations performed on the vertices associated with the pentagonal tilings and the 2-qubit measurements relate to the operations performed along the edges of the pentagonal tilings.

Classes IPC  ?

  • G06N 10/40 - Réalisations ou architectures physiques de processeurs ou de composants quantiques pour la manipulation de qubits, p.ex. couplage ou commande de qubit
  • G06N 10/70 - Correction, détection ou prévention d’erreur quantique, p.ex. codes de surface ou distillation d’état magique

75.

USE OF CUSTOMER ENGAGEMENT DATA TO IDENTIFY AND CORRECT SOFTWARE PRODUCT DEFICIENCIES

      
Numéro d'application 17960574
Statut En instance
Date de dépôt 2022-10-05
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Buhariwala, Karl
  • Agarwal, Adity
  • Narayanan, Ganga
  • Nallabothula, Kiran

Abrégé

A method for automatically identifying a root cause of customer dissatisfaction with a software product and creating feedback items to improve the software product includes collecting engagement data pertaining to interactions between a customer and a flow of visual elements presented by the software product and detecting a trigger event indicating that the customer is dissatisfied with the software product. In response to the trigger event and based at least in part on the engagement data, a potential deficiency of the software product is automatically identified and a repair ticket is generated for a development team. The repair ticket identifies the potential deficiency of the software product.

Classes IPC  ?

  • G06Q 30/00 - Commerce
  • G06F 11/36 - Prévention d'erreurs en effectuant des tests ou par débogage de logiciel

76.

SCHEDULE SEND SUGGESTION IN AN APPLICATION CHAT

      
Numéro d'application 18081288
Statut En instance
Date de dépôt 2022-12-14
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Zhang, Jiaoyan
  • Guo, Wendy
  • Taing, John Hay
  • Batta, Vineet
  • Isakov, Yury
  • Tam, Simon Chun Ho
  • Nino Tapia, Jennifer Andrea
  • Wall, Matthew David
  • Lynch, Sean Michael
  • Natanov, Milena
  • Constance, Angelina

Abrégé

The present disclosure relates to methods and systems for automatically providing a suggestion to delay sending a message that is being composed by a user to send to a chat participant using a chat feature of an application. The suggestion is sent in response to determining that one or more trigger conditions occurred. The suggestion includes a scheduled time to send the message. The methods and systems send the delayed message at the scheduled time.

Classes IPC  ?

  • H04L 51/04 - Messagerie en temps réel ou quasi en temps réel, p.ex. messagerie instantanée [IM]
  • H04L 51/42 - Aspects liés aux boîtes aux lettres, p.ex. synchronisation des boîtes aux lettres

77.

SYSTEMS AND METHODS FOR ENCODING AN INTERACTIVE SOFTWARE VIDEO STREAM

      
Numéro d'application 17962773
Statut En instance
Date de dépôt 2022-10-10
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s) Mosier, Scott David

Abrégé

A method of encoding video streams includes, at an encoding device, receiving a first video stream frame from a first server device at the encoding device at a first receipt time; receiving a second video stream frame from a second server device at the encoding device at a second receipt time; encoding the first video stream frame with the encoding device; determining a delay duration based at least partially on a first encoding duration of the first video stream frame and the second receipt time; and transmitting a delay instruction based at least partially on the delay duration to the second server device.

Classes IPC  ?

  • H04N 19/42 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques - caractérisés par les détails de mise en œuvre ou le matériel spécialement adapté à la compression ou à la décompression vidéo, p.ex. la mise en œuvre de logiciels spécialisés
  • H04N 19/136 - Caractéristiques ou propriétés du signal vidéo entrant
  • H04N 19/172 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant le codage adaptatif caractérisés par l’unité de codage, c. à d. la partie structurelle ou sémantique du signal vidéo étant l’objet ou le sujet du codage adaptatif l’unité étant une zone de l'image, p.ex. un objet la zone étant une image, une trame ou un champ
  • H04N 19/40 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant le transcodage vidéo, c. à d. le décodage partiel ou complet d’un flux d’entrée codé suivi par un ré-encodage du flux de sortie décodé

78.

SYSTEM FOR DETECTING LATERAL MOVEMENT COMPUTING ATTACKS

      
Numéro d'application 18081641
Statut En instance
Date de dépôt 2022-12-14
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Rotstein, Tomer
  • Shany, Eran

Abrégé

A method may include receiving from a first computing device, metadata that includes a suspected malicious activity indicator and a device identifier associated with the indicator; receiving, from a second computing device, log activity data; matching the device identifier included in the metadata to a device identifier in the log activity data; and based on the matching, transmitting an alert identifying the second computing device as a source of the suspected malicious activity.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

79.

CYBERSECURITY INSIDER RISK MANAGEMENT

      
Numéro d'application 17990667
Statut En instance
Date de dépôt 2022-11-19
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Miyake, Erin K.
  • Tm, Sudarson
  • Mccann, Robert
  • Siddiqui, Maria
  • Mishra, Ashish
  • Mir, Talhah Munawar
  • Mittal, Sakshi
  • Kalajdjieski, Jovan
  • Ruvalcaba, Diego

Abrégé

Some embodiments help manage cybersecurity insider risk. An authorized user influence pillar value is based on an influence signal representing the user's actual or potential influence in a computing environment. An authorized user access pillar value is based on an access signal representing the user's actual or potential access to resources. An impact risk value is calculated as a weighted combination of the pillar values. In response, an embodiment automatically adjusts a cybersecurity characteristic, such as a security risk score, security group membership, threat detection mechanism, or alert threshold. In some cases, impact risk is also based on a cumulative potential exfiltration anomaly access signal. In some cases, impact risk is based on one or more values which represent user public visibility, user social network influence, brand damage risk, resource mission criticality, access request response speed or success rate, or a known cybersecurity attack.

Classes IPC  ?

  • H04L 9/40 - Protocoles réseaux de sécurité

80.

Tomography of unitary matrix using quantum computing device

      
Numéro d'application 17934322
Statut En instance
Date de dépôt 2022-09-22
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Haah, Jeongwan
  • Kothari, Robin Ashok
  • O'Donnell, Ryan William
  • Tang, Ewin Nicolas

Abrégé

A computing system including a quantum computing device and a classical computing device. The computing system computes an estimated unitary matrix over a plurality of iterations that each include, at a processor, computing a current-iteration exponent, a current-iteration error parameter, and a conjugate transpose of a current-iteration estimate of the unitary matrix. Each iteration further includes transmitting the current-iteration exponent, the current-iteration error parameter, and the conjugate transpose to the quantum computing device. At the quantum computing device, each iteration further includes computing a process tomography result and outputting the process tomography result to the classical computing device. At the processor, each iteration further includes computing a distance measure between the current-iteration estimate and the process tomography result, and, when the distance measure is below a predefined constant, updating the current-iteration estimate. The computing system outputs, as the estimated unitary matrix, the updated current-iteration estimate computed in a final iteration.

Classes IPC  ?

  • G06F 17/16 - Calcul de matrice ou de vecteur
  • G06N 10/20 - Modèles d’informatique quantique, p.ex. circuits quantiques ou ordinateurs quantiques universels

81.

BLIND SUBPOENA PROTECTION

      
Numéro d'application 17938711
Statut En instance
Date de dépôt 2022-10-07
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Venkatesan, Ramarathnam
  • Chandran, Nishanth
  • Antonopoulos, Panagiotis
  • Setty, Srinath T.V.
  • Cherian, Basil
  • Carroll, Jr., Daniel John
  • Barnwell, Jason Sydney

Abrégé

Embodiments described herein enable at least one of a plurality of entities to access data protected by a security policy in response to validating respective digital access requests from the entities. The respective digital access requests are received, each comprising a proof. For each request, an encrypted secret share is obtained from a respective ledger database. Each request is validated based at least on the respective encrypted secret share and the proof, without decrypting the respective encrypted secret share. In response to validating all of the requests, a verification that an access criteria of a security policy is met is made. If so, at least one of the entities is provided with access to data protected by the security policy. In an aspect, embodiments enable a blind subpoena to be performed. In another aspect, embodiments enable the at least one entity to access the data for an isolated purpose.

Classes IPC  ?

  • G06F 21/62 - Protection de l’accès à des données via une plate-forme, p.ex. par clés ou règles de contrôle de l’accès
  • H04L 9/08 - Répartition de clés
  • H04L 9/32 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système

82.

INTEGRATED LASER AND MODULATOR SYSTEMS

      
Numéro d'application 17960679
Statut En instance
Date de dépôt 2022-10-05
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Zhang, Yifei
  • Barter, Thomas Hamish

Abrégé

A display system includes an integrated laser and modulator device and a display assembly. The integrated laser and modulator device includes a laser component configured to facilitate light emission responsive to applied current and a modulator component configured to selectively modulate light responsive to applied signal. The modulator component is integrally coupled to the laser component via a bridging structure that intervenes between the laser component and the modulator component. At least a portion of the bridging structure facilitates power reflectivity into a laser cavity of the laser component. The bridging structure facilitates transmission of light emitted by the laser component into the modulator component for modulation by the modulator component to provide modulated light. The display assembly is configured to direct the modulated light provided by the integrated laser and modulator device to illuminate pixels to form an image.

Classes IPC  ?

  • H01S 5/026 - Composants intégrés monolithiques, p.ex. guides d'ondes, photodétecteurs de surveillance ou dispositifs d'attaque
  • F21V 8/00 - Utilisation de guides de lumière, p.ex. dispositifs à fibres optiques, dans les dispositifs ou systèmes d'éclairage
  • G02B 27/01 - Dispositifs d'affichage "tête haute"
  • G02F 1/17 - Dispositifs ou dispositions pour la commande de l'intensité, de la couleur, de la phase, de la polarisation ou de la direction de la lumière arrivant d'une source lumineuse indépendante, p.ex. commutation, ouverture de porte ou modulation; Optique non linéaire pour la commande de l'intensité, de la phase, de la polarisation ou de la couleur basés sur des éléments à absorption variable non prévus dans les groupes
  • G09G 3/02 - Dispositions ou circuits de commande présentant un intérêt uniquement pour l'affichage utilisant des moyens de visualisation autres que les tubes à rayons cathodiques par traçage ou balayage d'un faisceau lumineux sur un écran
  • H01S 5/00 - Lasers à semi-conducteurs
  • H01S 5/042 - Excitation électrique

83.

SEARCH SYSTEM THAT PROVIDES SEARCH RESULTS AND GENERATED CONTENT

      
Numéro d'application 17963993
Statut En instance
Date de dépôt 2022-10-11
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Sacheti, Arun Kumar
  • Yang, Nevin
  • Merchant, Meenaz Aliraza
  • Govindarajen, Parthasarathy
  • Devries, Jeff R.
  • Fischel, Jason Blake

Abrégé

A computing system is described, where the computing system includes a processor and memory storing instructions that, when executed by the processor, cause the processor to perform several acts. The acts include receiving a query from an application executing on a client computing device that is in network communication with the computing system. The acts also include searching a computer-readable index of items based upon the query, identifying an item based upon the searching of the computer-readable index, transmitting the query to a computer-implemented model, and obtaining content generated by the computer-implemented model, where the computer-implemented model generated the content based upon the query. The acts further include returning at least one of the item or the content to the client computing device for presentment by way of the application executing on the client computing device.

Classes IPC  ?

  • G06F 16/951 - Indexation; Techniques d’exploration du Web
  • G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation
  • G06F 16/9538 - Présentation des résultats des requêtes

84.

SYSTEM AND METHOD OF GENERATING DIGITAL INK NOTES

      
Numéro d'application 17962256
Statut En instance
Date de dépôt 2022-10-07
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Primadona, Fnu
  • Mopati, Sivaramakrishna
  • Silvis, Jason Glenn

Abrégé

A method of and system for automatically generating an ink note object is carried out by detecting receipt of a digital ink input on a user interface (UI) screen, the UI screen being displayed by an application and being associated with at least one of a document, a page or an event. Once digital ink input is detected, the digital ink input is captured. Additionally, contextual data associated with the digital ink input is collected, the contextual data being related to at least one of the document, the page, the event, and a user providing the digital ink input. An ink note object is then generated and stored for the digital ink input, the ink note object including the captured digital ink input and the contextual data, and the ink note object being an entity that is separate from the document, the page and the even.

Classes IPC  ?

  • G06F 3/04883 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] utilisant des caractéristiques spécifiques fournies par le périphérique d’entrée, p.ex. des fonctions commandées par la rotation d’une souris à deux capteurs, ou par la nature du périphérique d’entrée, p.ex. des gestes en fonction de la pression exer utilisant un écran tactile ou une tablette numérique, p.ex. entrée de commandes par des tracés gestuels pour l’entrée de données par calligraphie, p.ex. sous forme de gestes ou de texte
  • G06F 3/04845 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p.ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs pour la transformation d’images, p.ex. glissement, rotation, agrandissement ou changement de couleur
  • G06F 11/34 - Enregistrement ou évaluation statistique de l'activité du calculateur, p.ex. des interruptions ou des opérations d'entrée–sortie

85.

INFERRING AND CONTEXTUALIZING A STRANGER ON AN ENTERPRISE PLATFORM

      
Numéro d'application 18067010
Statut En instance
Date de dépôt 2022-12-15
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Bonyadi, Mohammadreza
  • Fosse, Eivind Berg
  • Putilin, Sergey
  • Sommerfelt, Espen Trautmann
  • Schiehlen, Ute Katja
  • Solonko, Kateryna
  • Saetrom, Ola
  • Helvik, Torbjørn
  • Paruch, Malgorzata

Abrégé

Systems and methods for inferring and contextualizing a stranger on an enterprise platform are provided. The method includes generating a familiarity score between a user and an individual. Based on the generated familiarity score, the individual is determined to be a stranger to the user and a contextualized summary of the stranger is generated. The generated contextualized summary of the stranger is presented to the user in response to an upcoming interaction between the user and the stranger or a detected interaction between the user and the stranger.

Classes IPC  ?

  • G06Q 50/00 - Systèmes ou procédés spécialement adaptés à un secteur particulier d’activité économique, p.ex. aux services d’utilité publique ou au tourisme
  • G06N 5/04 - Modèles d’inférence ou de raisonnement

86.

MACHINE LEARNING FOR IDENTIFYING IDLE SESSIONS

      
Numéro d'application 17962078
Statut En instance
Date de dépôt 2022-10-07
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Gambhir, Prerana Dharmesh
  • Pari-Monasch, Sharena Meena
  • Nguyen, Khoa Dang
  • Shi, Yiming
  • Dong, Yongchang

Abrégé

Systems and methods for identifying and evicting idle sessions include training a machine learning model as a session classifying model to learn rules for classifying active sessions between clients and the cloud-based service. The session classifying model is trained to receive a plurality of parameters pertaining to the document associated with an active session as input and to apply the rules to the plurality of parameters to determine a classification for the active session and to provide an output indicative of the classification for the active session. The session classifying model is then utilized in the cloud-based service to classify the active sessions. The active sessions classified as idle sessions may then be evicted from the cloud-based service.

Classes IPC  ?

  • H04L 67/143 - Interruption ou inactivation de sessions, p.ex. fin de session contrôlée par un événement
  • H04L 67/54 - Gestion de la présence, p.ex. surveillance ou enregistrement pour la réception des informations de connexion des utilisateurs ou état de connexion des utilisateurs

87.

DETECTING AND MITIGATING MEMORY ATTACKS

      
Numéro d'application US2023031321
Numéro de publication 2024/076426
Statut Délivré - en vigueur
Date de dépôt 2023-08-29
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Agarwal, Ishwar
  • Saroiu, Stefan
  • Wolman, Alastair
  • Berger, Daniel, Sebastian

Abrégé

The present disclosure relates to systems and methods implemented on a memory controller for detecting and mitigating memory attacks (e.g., row hammer attacks). For example, a memory controller may engage a counting mode in which activation counts for memory subbanks are tracked. For example, a memory controller may engage a counting mode in which activation counts for memory rows of memory sub-banks are maintained. Under certain conditions, the memory controller may transition from the counting mode to a sampling mode to mitigate potential row hammer attacks. The memory controller may consider various conditions in determining whether to continue detecting and mitigating potential row hammer attacks in the sampling mode and/or transitioning back to the counting mode. By selectively transitioning between the different operating modes, the memory controller may reduce periods of time when the memory hardware is vulnerable to attacks.

Classes IPC  ?

  • G11C 11/406 - Organisation ou commande des cycles de rafraîchissement ou de régénération de la charge
  • G11C 11/408 - Circuits d'adressage

88.

REUSE OF BRANCH INFORMATION QUEUE ENTRIES FOR MULTIPLE INSTANCES OF PREDICTED CONTROL INSTRUCTIONS IN CAPTURED LOOPS IN A PROCESSOR

      
Numéro d'application US2023031322
Numéro de publication 2024/076427
Statut Délivré - en vigueur
Date de dépôt 2023-08-29
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Streett, Daren, Eugene
  • Al Sheikh, Rami Mohammad

Abrégé

Reuse of branch information queue entries for multiple instances of predicted control instructions in captured loops in a processor, and related methods and computer-readable media. The processor establishes and updates a branch entry in a branch information queue (BIQ) circuit with branch information in response to a speculative prediction made for a predicted control instruction. The branch information is used for making and tracking flow path predictions for predicted control instructions as well as verifying such predictions against its resolution for possible misprediction recovery. The processor is configured to reuse the same branch entry in the BIQ circuit for each instance of the predicted control instruction. This conserves space in the BIQ circuit, which allows for a smaller sized BIQ circuit to be used thus conserving area and power consumption. The branch information for each instance of a predicted control instruction within a loop remains consistent.

Classes IPC  ?

  • G06F 9/38 - Exécution simultanée d'instructions

89.

INFERRING AND CONTEXTUALIZING A STRANGER ON AN ENTERPRISE PLATFORM

      
Numéro d'application US2023031323
Numéro de publication 2024/076428
Statut Délivré - en vigueur
Date de dépôt 2023-08-29
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Bonyadi, Mohammadreza
  • Fosse, Eivind, Berg
  • Putilin, Sergey
  • Sommerfelt, Espen, Trautmann
  • Schiehlen, Ute, Katja
  • Solonko, Kateryna
  • Saetrom, Ola
  • Helvik, Torbjørn
  • Paruch, Malgorzata

Abrégé

Systems and methods for inferring and contextualizing a stranger on an enterprise platform are provided. The method includes generating a familiarity score between a user and an individual. Based on the generated familiarity score, the individual is determined to be a stranger to the user and a contextualized summary of the stranger is generated. The generated contextualized summary of the stranger is presented to the user in response to an upcoming interaction between the user and the stranger or a detected interaction between the user and the stranger.

Classes IPC  ?

  • G06Q 10/00 - Administration; Gestion
  • G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
  • G06Q 10/10 - Bureautique; Gestion du temps
  • G06Q 10/101 - Création collaborative, p.ex. développement conjoint de produits ou de services
  • G06Q 50/10 - Services

90.

PRIVACY-PRESERVING RULES-BASED TARGETING USING MACHINE LEARNING

      
Numéro d'application US2023031352
Numéro de publication 2024/076429
Statut Délivré - en vigueur
Date de dépôt 2023-08-29
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s) Rama, Kiran

Abrégé

Techniques are described herein that are capable of providing privacy-preserving rules-based targeting using machine learning. Ranks are assigned to entities using a machine learning model. Values of each targetable feature associated with the respective entities are ordered. For each targetable feature, the entities are sorted among bins based on the values of the feature associated with the respective entities. For each targetable feature, a bin is selected from the bins that are associated with the feature based on the selected bin including more entities having respective ranks that are within a designated range than each of the other bins that are associated with the feature. A targeting rule is established, indicating a prerequisite for targeting an entity. The prerequisite indicating that the value of each targetable feature associated with the entity is included in a respective interval associated with the selected bin for the feature.

Classes IPC  ?

  • G06Q 10/00 - Administration; Gestion
  • G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projets; Planification d’entreprise ou d’organisation; Modélisation d’entreprise ou d’organisation
  • G06Q 30/02 - Marketing; Estimation ou détermination des prix; Collecte de fonds
  • G06Q 30/0251 - Publicités ciblées

91.

MACHINE LEARNING FOR IDENTIFYING IDLE SESSIONS

      
Numéro d'application US2023031445
Numéro de publication 2024/076433
Statut Délivré - en vigueur
Date de dépôt 2023-08-29
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Gambhir, Prerana Dharmesh
  • Pari-Monasch, Sharena Meena
  • Nguyen, Khoa Dang
  • Shi, Yiming
  • Dong, Yongchang

Abrégé

Systems and methods for identifying and evicting idle sessions include training a machine learning model as a session classifying model to learn rules for classifying active sessions between clients and the cloud-based service. The session classifying model is trained to receive a plurality of parameters pertaining to the document associated with an active session as input and to apply the rules to the plurality of parameters to determine a classification for the active session and to provide an output indicative of the classification for the active session. The session classifying model is then utilized in the cloud-based service to classify the active sessions. The active sessions classified as idle sessions may then be evicted from the cloud-based service.

Classes IPC  ?

  • G06F 9/50 - Allocation de ressources, p.ex. de l'unité centrale de traitement [UCT]

92.

INTEROPERABILITY FOR TRANSLATING AND TRAVERSING 3D EXPERIENCES IN AN ACCESSIBILITY ENVIRONMENT

      
Numéro d'application US2023031448
Numéro de publication 2024/076434
Statut Délivré - en vigueur
Date de dépôt 2023-08-29
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Humphrey, Brett D.
  • Ng, Kian Chai
  • Gable, Thomas Matthew
  • Charnoff, Amichai
  • Grayson, Martin
  • Marques, Rita Faia
  • Morrison, Cecily Peregrine Borgatti
  • Balasubramanian, Harshadha

Abrégé

The techniques disclosed herein enable systems to translate three-dimensional experiences into user accessible experiences to improve accessibility for users with disabilities. This is accomplished by extracting components from a three-dimensional environment such as user avatars and furniture. The components are organized into component groups based on shared attributes. The component groups are subsequently organized into a flow hierarchy. The flow hierarchy is then presented to the user in an accessibility environment that enables interoperability with various accessibility tools such as screen readers, simplified keyboard inputs, and the like. Selecting a component group, and subsequently, a component through the accessibility environment accordingly invokes functionality within the three-dimensional environment. In this way, users with disabilities are empowered to fully interact with three-dimensional experiences.

Classes IPC  ?

  • G06F 3/01 - Dispositions d'entrée ou dispositions d'entrée et de sortie combinées pour l'interaction entre l'utilisateur et le calculateur

93.

BLIND SUBPOENA PROTECTION

      
Numéro d'application US2023031452
Numéro de publication 2024/076436
Statut Délivré - en vigueur
Date de dépôt 2023-08-29
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Venkatesan, Ramarathnam
  • Chandran, Nishanth
  • Antonopoulos, Panagiotis
  • Setty, Srinath, T.V.
  • Cherian, Basil
  • Carroll, Daniel, John, Jr.
  • Barnwell, Jason, Sydney

Abrégé

Embodiments described herein enable at least one of a plurality of entities to access data protected by a security policy in response to validating respective digital access requests from the entities. The respective digital access requests are received, each comprising a proof. For each request, an encrypted secret share is obtained from a respective ledger database. Each request is validated based at least on the respective encrypted secret share and the proof, without decrypting the respective encrypted secret share. In response to validating all of the requests, a verification that an access criteria of a security policy is met is made. If so, at least one of the entities is provided with access to data protected by the security policy. In an aspect, embodiments enable a blind subpoena to be performed. In another aspect, embodiments enable the at least one entity to access the data for an isolated purpose.

Classes IPC  ?

  • G06F 21/64 - Protection de l’intégrité des données, p.ex. par sommes de contrôle, certificats ou signatures
  • H04L 9/08 - Répartition de clés
  • H04L 9/00 - Dispositions pour les communications secrètes ou protégées; Protocoles réseaux de sécurité
  • H04L 9/40 - Protocoles réseaux de sécurité

94.

DETERMINATION OF AN OUTLIER SCORE USING EXTREME VALUE THEORY (EVT)

      
Numéro d'application US2023031461
Numéro de publication 2024/076438
Statut Délivré - en vigueur
Date de dépôt 2023-08-30
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Boue, Laurent
  • Rama, Kiran

Abrégé

A subset of data that includes a feature may be selected from a dataset. Parameters from the selected subset of data are determined and an extreme value theory (EVT) algorithm is implemented to determine a probability value for the feature based at least in part on the determined parameters. Based on the determined probability value for the feature, an outlier score is generated for the feature. Based on the outlier score being above a threshold, the subset is identified as anomalous.

Classes IPC  ?

  • G06F 17/18 - Opérations mathématiques complexes pour l'évaluation de données statistiques

95.

DEEP APERTURE

      
Numéro d'application US2023032227
Numéro de publication 2024/076444
Statut Délivré - en vigueur
Date de dépôt 2023-09-08
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Cutler, Benjamin Franklin
  • Yang, Weiwei
  • Fowers, Spencer

Abrégé

The techniques disclosed herein enable a realistic, inclusive sense of physical presence for videoconference participants that is comparable to in-person communication. Multiple users are simultaneously provided with an immersive experience without the need for head-mounted displays or other wearable technology. Specifically, a real-time three-dimensional model of a scene at the remote end of the videoconference is received. At the same time, the location and perspective of each local participant is determined. Each local participant is then individually provided with a spatially correct stereoscopic view of the model. The sense of physical presence is created by changing what each local participant sees in response to a change in their perspective. The sense of physical presence is enhanced by enabling direct eye contact, clear communication of emotional state and other non-verbal cues, and a shared visual experience and audio ambience across locations.

Classes IPC  ?

  • H04N 7/15 - Systèmes pour conférences
  • H04N 13/194 - Transmission de signaux d’images
  • H04N 13/282 - Générateurs de signaux d’images pour la génération de signaux d’images correspondant à au moins trois points de vue géométriques, p.ex. systèmes multi-vues
  • H04N 13/351 - Affichage simultané
  • H04N 13/366 - Suivi des spectateurs

96.

TRANSFORMER-BASED TEXT ENCODER FOR PASSAGE RETRIEVAL

      
Numéro d'application US2023032228
Numéro de publication 2024/076445
Statut Délivré - en vigueur
Date de dépôt 2023-09-08
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Cheng, Hao
  • Fang, Hao
  • Liu, Xiaodong
  • Gao, Jianfeng

Abrégé

A computing system includes a logic subsystem and a storage subsystem holding instructions executable by the logic subsystem to implement a transformer-based text encoder. The transformer-based text encoder includes a plurality of transformer blocks previously-trained to apply encoding operations to computer-readable text representations of input text strings, the computer-readable text representations including computer-readable question representations of input text questions, and computer-readable passage representations of input text passages. The plurality of transformer blocks include a shared transformer block trained for both the computer-readable question representations and the computer-readable passage representations and a specialized transformer block including two or more input-specific subnetworks, and a routing function to select an input-specific subnetwork of the two or more input-specific subnetworks for each of the computer-readable text representations.

Classes IPC  ?

97.

CLOUD REMOVAL BY ILLUMINATION NORMALIZATION AND INTERPOLATION WEIGHTED BY CLOUD PROBABILITIES

      
Numéro d'application US2023032566
Numéro de publication 2024/076454
Statut Délivré - en vigueur
Date de dépôt 2023-09-12
Date de publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Olsen, Peder Andreas
  • De Moura Estevao Filho, Roberto
  • Nunes, Leonardo De Oliveira

Abrégé

Clouds in a satellite image are replaced with a prediction of what was occluded by those clouds. The cloudy portion of the image is interpolated from a series of satellite images taken over time, some of which are cloud-free in the target image's cloudy portion. In some configurations, clouds are removed taking into account each pixel's availability – a measure of certainty that a pixel is cloud-free. Furthermore, these images may have been taken under different amounts of illumination, making it difficult to determine whether a difference between two images is due to a change in illumination or a change to the location. The effect of illumination on each image is removed before interpolating the cloudy portion of the image. In some configurations, removing the effect of illumination also takes into account pixel availability.

Classes IPC  ?

98.

CLOUD REMOVAL BY ILLUMINATION NORMALIZATION AND INTERPOLATION WEIGHTED BY CLOUD PROBABILITIES

      
Numéro d'application 18181183
Statut En instance
Date de dépôt 2023-03-09
Date de la première publication 2024-04-11
Propriétaire MICROSOFT TECHNOLOGY LICENSING, LLC (USA)
Inventeur(s)
  • Olsen, Peder Andreas
  • De Moura Estevao Filho, Roberto
  • Nunes, Leonardo De Oliveira

Abrégé

Clouds in a satellite image are replaced with a prediction of what was occluded by those clouds. The cloudy portion of the image is interpolated from a series of satellite images taken over time, some of which are cloud-free in the target image's cloudy portion. In some configurations, clouds are removed taking into account each pixel's availability—a measure of certainty that a pixel is cloud-free. Furthermore, these images may have been taken under different amounts of illumination, making it difficult to determine whether a difference between two images is due to a change in illumination or a change to the location. The effect of illumination on each image is removed before interpolating the cloudy portion of the image. In some configurations, removing the effect of illumination also takes into account pixel availability.

Classes IPC  ?

  • G06V 10/60 - Extraction de caractéristiques d’images ou de vidéos relative aux propriétés luminescentes, p.ex. utilisant un modèle de réflectance ou d’éclairage
  • G06T 7/90 - Détermination de caractéristiques de couleur
  • G06V 10/25 - Détermination d’une région d’intérêt [ROI] ou d’un volume d’intérêt [VOI]
  • G06V 10/26 - Segmentation de formes dans le champ d’image; Découpage ou fusion d’éléments d’image visant à établir la région de motif, p.ex. techniques de regroupement; Détection d’occlusion
  • G06V 10/56 - Extraction de caractéristiques d’images ou de vidéos relative à la couleur
  • G06V 10/74 - Appariement de motifs d’image ou de vidéo; Mesures de proximité dans les espaces de caractéristiques
  • G06V 20/13 - Images satellite

99.

EVALUATING QUANTUM COMPUTING CIRCUITS IN VIEW OF THE RESOURCE COSTS OF A QUANTUM ALGORITHM

      
Numéro d'application 18356634
Statut En instance
Date de dépôt 2023-07-21
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s)
  • Haener, Thomas
  • Roetteler, Martin H.
  • Svore, Krysta M.

Abrégé

Methods for evaluating quantum computing circuits in view of the resource costs of a quantum algorithm are described. A processor-implemented method for performing an evaluation of a polynomial corresponding to an input is provided. The method includes determining a polynomial interpolation for a set of sub-intervals corresponding to the input. The method further includes constructing a quantum circuit for performing, in parallel, polynomial evaluation corresponding to each of the set of sub-intervals.

Classes IPC  ?

  • G06N 10/20 - Modèles d’informatique quantique, p.ex. circuits quantiques ou ordinateurs quantiques universels
  • G06F 17/11 - Opérations mathématiques complexes pour la résolution d'équations
  • G06N 10/60 - Algorithmes quantiques, p.ex. fondés sur l'optimisation quantique ou les transformées quantiques de Fourier ou de Hadamard

100.

MULTIPLE DATAPOINT FORMATS IN SPREADSHEETS

      
Numéro d'application 18391091
Statut En instance
Date de dépôt 2023-12-20
Date de la première publication 2024-04-11
Propriétaire Microsoft Technology Licensing, LLC (USA)
Inventeur(s) Liddell, Derek

Abrégé

Systems, methods, and software are disclosed herein that allow multiple values to be stored and referenced individually in a spreadsheet or table cell. In an implementation, an application identifies a format of a cell in a spreadsheet with a format having multiple data points. The application receives multiple values corresponding to the multiple data points and stores each value of the multiple values in the cell as a separately referenceable value with respect to each other value of the multiple values. In some implementations, formulas in other cells or sub-routines can reference an individual one of the values in the cell.

Classes IPC  ?

  • G06F 40/18 - Traitement de texte Édition, p.ex. insertion ou suppression utilisant des lignes réglées de tableurs
  • H04L 67/04 - Protocoles spécialement adaptés à la portabilité du terminal
  1     2     3     ...     100        Prochaine page