Difference between revisions of "Microsoft Technology Licensing, LLC patent applications published on December 14th, 2023"

From WikiPatents
Jump to navigation Jump to search
(Creating a new page)
 
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
==Patent applications for Microsoft Technology Licensing, LLC on December 14th, 2023==
+
'''Summary of the patent applications from Microsoft Technology Licensing, LLC on December 14th, 2023'''
 +
 
 +
Microsoft Technology Licensing, LLC has recently filed several patents related to various technologies. These patents cover areas such as thermal management systems for cooling electronic devices, dynamically changing pressure within cooling systems, rack security systems, hinged computing devices, collecting operational data in radio access networks, multi-narrowband transceivers for TV white space communication, mobile computing devices with improved camera modules, restricting video content based on audience groups, capturing intensity images and time-of-flight images, and customizing user interfaces for video communication.
  
===LIFT WITH SWIVELING AND HORIZONTALLY SLIDING PLATFORM ([[17840359. LIFT WITH SWIVELING AND HORIZONTALLY SLIDING PLATFORM simplified abstract (Microsoft Technology Licensing, LLC)|17840359]])===
+
Summary:
 +
- Patents cover a range of technologies including thermal management systems, cooling systems, rack security, hinged computing devices, data collection in radio access networks, TV white space communication, camera modules, video content restriction, image capture, and user interface customization.
 +
- These technologies aim to improve cooling efficiency, enhance security, provide flexibility in device design, optimize network performance, enable communication in TV white space, improve camera functionality, personalize video content, capture high-quality images, and enhance user experience in video communication.
  
 +
Notable Applications:
 +
* Cooling electronic devices such as computer servers, data centers, or high-performance computing systems.
 +
* Cooling power electronics in electric vehicles or renewable energy systems.
 +
* Cooling components in aerospace or defense systems.
 +
* Monitoring and analyzing network events in a radio access network for telecommunications or IoT applications.
 +
* Restricting video content for specific audience groups in video streaming platforms or educational platforms.
 +
* Enabling narrowband communication in TV white space for wireless communication systems or IoT devices.
 +
* Improving camera functionality in mobile phones and tablets.
 +
* Customizing user interfaces for video communication in video conferencing or remote collaboration.
  
'''Main Inventor'''
 
  
Jose Seah DELAPAZ
 
  
  
'''Brief explanation'''
+
==Patent applications for Microsoft Technology Licensing, LLC on December 14th, 2023==
The disclosed technology is a lift that includes a chassis, a mounting base, a platform, a motor, guardrails, and a counterweight. The lift is designed to prevent tipping over while the platform is extended.
 
  
* The lift has a chassis and a mounting base that can swivel relative to each other.
+
===LIFT WITH SWIVELING AND HORIZONTALLY SLIDING PLATFORM ([[17840359. LIFT WITH SWIVELING AND HORIZONTALLY SLIDING PLATFORM simplified abstract (Microsoft Technology Licensing, LLC)|17840359]])===
* The platform is connected to the mounting base and can slide horizontally.
 
* A motor is used to raise and lower the mounting base.
 
* The platform has multiple guardrails for safety.
 
* A counterweight is attached to the chassis to prevent tipping over when the platform is extended.
 
  
== Potential Applications ==
 
* Construction sites: The lift can be used to transport workers and materials to different levels of a building under construction.
 
* Warehouses: The lift can help in moving heavy items to higher shelves or mezzanines.
 
* Maintenance and repair: The lift can be used for accessing elevated areas for maintenance or repair work.
 
  
== Problems Solved ==
+
'''Main Inventor'''
* Tipping over: The counterweight system ensures stability and prevents the lift from tipping over, even when the platform is extended.
 
* Horizontal movement: The ability to slide the platform horizontally allows for easy access to different areas without repositioning the entire lift.
 
  
== Benefits ==
+
Jose Seah DELAPAZ
* Safety: The guardrails and counterweight system enhance the safety of workers using the lift.
 
* Versatility: The swiveling and sliding features of the lift provide flexibility in accessing different areas.
 
* Efficiency: The motorized lifting mechanism allows for quick and easy vertical movement of the lift.
 
  
'''Abstract'''
 
The disclosed technology is generally directed to a lift. In one example of the technology, a lift comprises a chassis, a mounting base, a platform, a motor, a plurality of guardrails, and a counterweight. The mounting base is arranged to swivel relative to the chassis. The platform is coupled to the mounting base. The platform is arranged to slide horizontally relative to the mounting base. The motor is arranged to raise and lower the mounting base relative to the chassis. The plurality of guardrails is coupled to the platform. The counterweight is coupled to the chassis such that the counterweight prevents the lift from tipping over while the platform is extended relative to the mounting base.
 
  
 
===TEMPERATURE COMPENSATION FOR STRAIN SENSOR ([[17747898. TEMPERATURE COMPENSATION FOR STRAIN SENSOR simplified abstract (Microsoft Technology Licensing, LLC)|17747898]])===
 
===TEMPERATURE COMPENSATION FOR STRAIN SENSOR ([[17747898. TEMPERATURE COMPENSATION FOR STRAIN SENSOR simplified abstract (Microsoft Technology Licensing, LLC)|17747898]])===
Line 42: Line 37:
 
Xiao Chuan ONG
 
Xiao Chuan ONG
  
 
'''Brief explanation'''
 
The abstract describes a strain sensor that is equipped with a temperature compensation circuit to improve its accuracy. When powered, the temperature compensation circuit applies a voltage to the strain sensor that has a compensating temperature dependency. This compensates for the temperature dependency of the strain sensor itself, resulting in a more stable scale factor between the endured strain and the signal representing the strain.
 
 
* The strain sensor has an associated temperature compensation circuit.
 
* The temperature compensation circuit applies a compensating voltage to the strain sensor.
 
* The compensating voltage has a temperature dependency that is opposite to the temperature dependency of the strain sensor.
 
* This temperature compensation improves the accuracy of the strain sensor by providing a more stable scale factor between the endured strain and the signal representing the strain.
 
 
== Potential Applications ==
 
* Industrial monitoring and control systems
 
* Structural health monitoring in buildings and bridges
 
* Medical devices for monitoring body movements and forces
 
* Robotics and automation systems for precise force sensing
 
 
== Problems Solved ==
 
* Inaccurate strain measurements due to temperature variations
 
* Unstable scale factor between the endured strain and the signal representing the strain
 
 
== Benefits ==
 
* Improved accuracy of strain measurements
 
* More reliable and consistent scale factor
 
* Enhanced performance in various applications
 
 
'''Abstract'''
 
A strain sensor that has an associated temperature compensation circuit. The strain sensor is temperature-compensated as it has a temperature compensation circuit that, when powered, applies an applied voltage across the applied voltage terminals of the strain sensor that has a compensating temperature dependency. That is, the applied voltage has a temperature dependency of one polarity that is opposite a temperature dependency of the strain sensor. Because of this temperature compensation, the signal representing strain has a more stable scale factor between the endured strain and the signal representing the strain. Thus, the accuracy of the strain sensor is improved.
 
  
 
===OPTICAL SENSOR FOR TWO-PHASE COOLING VAPOR LEVEL MEASUREMENT ([[17837412. OPTICAL SENSOR FOR TWO-PHASE COOLING VAPOR LEVEL MEASUREMENT simplified abstract (Microsoft Technology Licensing, LLC)|17837412]])===
 
===OPTICAL SENSOR FOR TWO-PHASE COOLING VAPOR LEVEL MEASUREMENT ([[17837412. OPTICAL SENSOR FOR TWO-PHASE COOLING VAPOR LEVEL MEASUREMENT simplified abstract (Microsoft Technology Licensing, LLC)|17837412]])===
Line 76: Line 45:
 
Robert Craig MCFARLANE, JR.
 
Robert Craig MCFARLANE, JR.
  
 
'''Brief explanation'''
 
The abstract describes an immersion cooling system that uses a working fluid to cool electronic components. The system includes an immersion tank with a chamber, a working fluid, an energy source, an optical sensor, and a microcontroller. The working fluid exists in both liquid and vapor phases within the chamber. The energy source emits an infrared beam through the vapor phase, and the optical sensor measures the concentration of vapor in the chamber. The microcontroller uses data from the energy source, optical sensor, and path length to determine the vapor concentration.
 
 
* The system uses immersion cooling to cool electronic components.
 
* It includes an immersion tank with a chamber and a working fluid.
 
* The working fluid exists in liquid and vapor phases within the chamber.
 
* An energy source emits an infrared beam through the vapor phase.
 
* An optical sensor measures the vapor concentration in the chamber.
 
* A microcontroller analyzes data from the energy source, optical sensor, and path length to determine the vapor concentration.
 
 
== Potential Applications ==
 
* Cooling of electronic components in data centers or high-performance computing systems.
 
* Cooling of power electronics in electric vehicles or renewable energy systems.
 
* Cooling of servers or networking equipment in telecommunications infrastructure.
 
 
== Problems Solved ==
 
* Overheating of electronic components.
 
* Inefficient cooling methods.
 
* Space limitations for traditional cooling systems.
 
 
== Benefits ==
 
* Improved cooling efficiency and performance.
 
* Reduced energy consumption.
 
* Increased lifespan and reliability of electronic components.
 
* Compact design allows for more flexible installation options.
 
 
'''Abstract'''
 
An immersion cooling system includes an immersion tank defining an immersion chamber therein, an immersion working fluid, an energy source, an optical sensor, and a microcontroller. The immersion working fluid is positioned at least partially in the immersion chamber and the immersion working fluid has a liquid phase and a vapor phase. The energy source is positioned and oriented to direct an infrared beam through a portion of the vapor phase with a beam path and path length. The optical sensor is positioned in the beam path. The microcontroller is configured to determine vapor concentration in the immersion chamber based at least partially on data from the path length, the optical sensor, and the energy source.
 
  
 
===ELECTROCHEMICAL SENSOR FOR SENSING TWO-PHASE COOLING FLUID CONTAMINATION ([[17837366. ELECTROCHEMICAL SENSOR FOR SENSING TWO-PHASE COOLING FLUID CONTAMINATION simplified abstract (Microsoft Technology Licensing, LLC)|17837366]])===
 
===ELECTROCHEMICAL SENSOR FOR SENSING TWO-PHASE COOLING FLUID CONTAMINATION ([[17837366. ELECTROCHEMICAL SENSOR FOR SENSING TWO-PHASE COOLING FLUID CONTAMINATION simplified abstract (Microsoft Technology Licensing, LLC)|17837366]])===
Line 113: Line 53:
 
Robert Craig MCFARLANE, JR.
 
Robert Craig MCFARLANE, JR.
  
 
'''Brief explanation'''
 
The abstract describes an immersion cooling system that uses an immersion tank to cool electronic components. The system includes an immersion chamber, a working fluid, and two electrodes. The working fluid is partially filled in the immersion chamber. One electrode is connected to a power source, while the other electrode is positioned near the first electrode and creates a sampling region between them. A small portion of the working fluid is placed in the sampling region, and a microcontroller is used to measure the current across the sampling region.
 
 
* The immersion cooling system uses a tank to cool electronic components.
 
* It includes an immersion chamber and a working fluid.
 
* Two electrodes are used, with one connected to a power source.
 
* The second electrode is positioned near the first and creates a sampling region.
 
* A small portion of the working fluid is placed in the sampling region.
 
* A microcontroller measures the current across the sampling region.
 
 
==Potential Applications==
 
* Cooling of electronic components in data centers.
 
* Cooling of high-performance computing systems.
 
* Cooling of server racks in cloud computing facilities.
 
 
==Problems Solved==
 
* Efficient cooling of electronic components.
 
* Reduction of heat-related issues in data centers.
 
* Improved performance and longevity of electronic devices.
 
 
==Benefits==
 
* Enhanced cooling efficiency compared to traditional air cooling methods.
 
* Reduced energy consumption and operating costs.
 
* Increased lifespan and reliability of electronic components.
 
* Improved performance and reduced risk of overheating.
 
 
'''Abstract'''
 
An immersion cooling system includes an immersion tank defining an immersion chamber therein, an immersion working fluid, a first electrode, and a second electrode. The immersion working fluid is positioned at least partially in the immersion chamber. The first electrode is electrically coupled to an electrical power source, and the second electrode is positioned proximate to the first electrode and defines a sampling region therebetween. A sample portion of the immersion working fluid is positioned in the sampling region, and the second electrode is coupled to a microcontroller configured to measure at least a current across the sampling region between the first electrode and the second electrode.
 
  
 
===FULL BODY TRACKING USING FUSION DEPTH SENSING ([[17838139. FULL BODY TRACKING USING FUSION DEPTH SENSING simplified abstract (Microsoft Technology Licensing, LLC)|17838139]])===
 
===FULL BODY TRACKING USING FUSION DEPTH SENSING ([[17838139. FULL BODY TRACKING USING FUSION DEPTH SENSING simplified abstract (Microsoft Technology Licensing, LLC)|17838139]])===
Line 150: Line 61:
 
Ruben CABALLERO
 
Ruben CABALLERO
  
 
'''Brief explanation'''
 
Techniques in this patent application involve using radar sensor devices on a wearable device to detect, measure, and track the location of objects. The radar sensors generate and evaluate radar signals from the wearable device and its surroundings. Objects within the field of view that reflect radar signals will produce return signals with specific characteristics.
 
 
* Radar sensors on a wearable device detect and track the location of objects.
 
* Radar signals are generated, captured, and evaluated by the sensors.
 
* Objects within the field of view reflect radar signals and produce return signals.
 
* Return signals have characteristic time of arrival, angle of arrival, and frequency shift.
 
* Processing the return signals allows determination of distance, direction, and identification of objects.
 
* Object information can be further resolved by correlating with measurements from cameras or inertial measurement units.
 
 
Potential applications of this technology:
 
 
* Augmented reality: Radar sensors on a wearable device can enhance augmented reality experiences by detecting and tracking objects in the user's environment.
 
* Navigation and obstacle avoidance: The technology can be used to provide real-time information about the location and movement of objects, aiding navigation and avoiding obstacles.
 
* Security and surveillance: Radar sensors on wearable devices can be used for security and surveillance purposes, detecting and tracking objects in the vicinity.
 
 
Problems solved by this technology:
 
 
* Limited visibility: Radar sensors can detect objects even in low visibility conditions such as darkness, fog, or smoke.
 
* Real-time tracking: The technology allows for real-time tracking of objects, providing up-to-date information on their location and movement.
 
* Object identification: By analyzing radar characteristics, the technology can identify objects, aiding in their classification and tracking.
 
 
Benefits of this technology:
 
 
* Enhanced situational awareness: Radar sensors on wearable devices provide users with a better understanding of their surroundings, improving safety and decision-making.
 
* Versatility: Radar sensors can be used in various applications and environments, making them adaptable to different use cases.
 
* Complementary to other sensors: By combining radar data with data from cameras or inertial measurement units, more accurate and comprehensive object information can be obtained.
 
 
'''Abstract'''
 
Techniques disclosed herein may be utilized to detect, measure, and/or track the location of objects via radar sensor devices that are affixed to a wearable device. Each of the radar sensors (e.g., MIMIC radar sensor) generates, captures, and evaluates radar signals associated with the wearable device (e.g., HMD) and the surrounding environment. Objects located within the field of view with sufficient reflectivity will result in radar return signals each with a characteristic time of arrival (TOA), angle of arrival (AOA), and frequency shift (Doppler shift). The sensed return signals can be processed to determine distance and direction, as well as identification of the objects based on radar characteristics of the object (e.g., radar back-scatter or cross-section pattern). Object information, including position and identification, may be further resolved based on correlation with measurements from one or more of the digital cameras or inertial measurement units.
 
  
 
===ADAPTIVE CHORD TYPING SYSTEM ([[18062563. ADAPTIVE CHORD TYPING SYSTEM simplified abstract (Microsoft Technology Licensing, LLC)|18062563]])===
 
===ADAPTIVE CHORD TYPING SYSTEM ([[18062563. ADAPTIVE CHORD TYPING SYSTEM simplified abstract (Microsoft Technology Licensing, LLC)|18062563]])===
Line 189: Line 69:
 
Dany KHALIFE
 
Dany KHALIFE
  
 
'''Brief explanation'''
 
The abstract describes an input device for an adaptive chord typing system. The device includes keys and a chord manager that analyzes input words and generates recommended chords as shortcuts during typing. If the user accepts a recommended chord, it is mapped to a frequently input word, and typing the chord generates keystroke data for the corresponding word(s).
 
 
* Input device for adaptive chord typing system
 
* Includes keys and a chord manager
 
* Chord manager analyzes input words and generates recommended chords
 
* Recommended chords serve as shortcuts during typing
 
* User interface displays recommended chords
 
* Accepted chords are mapped to frequently input words
 
* Typing the mapped chord generates keystroke data for the corresponding word(s)
 
 
== Potential Applications ==
 
* Improving typing speed and efficiency
 
* Assisting individuals with physical disabilities or limitations in typing
 
* Enhancing productivity in typing-intensive tasks such as data entry or transcription
 
 
== Problems Solved ==
 
* Slow typing speed and inefficiency
 
* Difficulty in typing for individuals with physical disabilities or limitations
 
* Tediousness and time-consuming nature of typing-intensive tasks
 
 
== Benefits ==
 
* Increased typing speed and efficiency
 
* Improved accessibility for individuals with physical limitations
 
* Time-saving in typing-intensive tasks
 
 
'''Abstract'''
 
Examples provide an input device for an adaptive chord typing system. An input device includes a plurality of keys and a chord manager in firmware or software on the device. The chord manager analyzes input words and identifies frequently input candidate words. The chord manager automatically generates recommended chords that are shorter than the identified candidate words to serve as a shortcut during typing. The recommended chords are output to a user via a user interface communicatively coupled to the input device. If the user accepts a recommended chord, the chord is mapped to a corresponding frequently input word. When the user types a mapped chord using the keys on the input device, the input device generates keystroke data corresponding to the corresponding frequently input word(s), as if the user had actually input the word(s) rather than the chord to increase typing speed.
 
  
 
===STYLUS HAPTIC COMPONENT ARMING AND POWER CONSUMPTION ([[18454983. STYLUS HAPTIC COMPONENT ARMING AND POWER CONSUMPTION simplified abstract (Microsoft Technology Licensing, LLC)|18454983]])===
 
===STYLUS HAPTIC COMPONENT ARMING AND POWER CONSUMPTION ([[18454983. STYLUS HAPTIC COMPONENT ARMING AND POWER CONSUMPTION simplified abstract (Microsoft Technology Licensing, LLC)|18454983]])===
Line 226: Line 77:
 
Shoham DEKEL
 
Shoham DEKEL
  
 
'''Brief explanation'''
 
The abstract of this patent application describes a method for managing power consumption of a stylus haptic feedback component before it is activated. The method involves determining haptic predictor values based on user interactions with the stylus, weighting these values, and combining them to generate a combined weighted predictive result. This result is then compared to a haptic predictive threshold value. If the comparison indicates a haptic predictive result, power continues to be transmitted to the haptic circuit. If the comparison indicates a non-haptic predictive result, power transmission to the haptic circuit is stopped.
 
 
* The method manages power consumption of a stylus haptic feedback component.
 
* It involves determining haptic predictor values based on user interactions with the stylus.
 
* The haptic predictor values are weighted to generate weighted values.
 
* The weighted values are combined to generate a combined weighted predictive result.
 
* The combined result is compared to a haptic predictive threshold value.
 
* Power transmission to the haptic circuit continues or ceases based on the comparison result.
 
 
== Potential Applications ==
 
This technology can be applied in various fields where stylus haptic feedback is used, such as:
 
* Digital art and design applications
 
* Virtual reality and augmented reality systems
 
* Electronic signature devices
 
* Touchscreen devices with stylus input
 
 
== Problems Solved ==
 
This technology addresses the following problems:
 
* Excessive power consumption of stylus haptic feedback components
 
* Inefficient use of power when the haptic feedback is not necessary or desired
 
* Improper timing of haptic feedback activation
 
 
== Benefits ==
 
The benefits of this technology include:
 
* Reduced power consumption, leading to longer battery life in devices
 
* Improved efficiency in managing power for haptic feedback components
 
* Enhanced user experience by providing haptic feedback only when necessary or desired
 
* Proper timing of haptic feedback activation, enhancing user interaction with the stylus
 
 
'''Abstract'''
 
Examples relate to managing power consumption of a stylus haptic feedback component prior to actuation. In one example, power is transmitted to a haptic circuit and a first haptic predicter value corresponding to a first user interaction with the stylus is determined. A weighted first haptic predicter value is generated by weighting the first haptic predicter value. A second haptic predicter value corresponding to a second user interaction is determined, and a weighted second haptic predicter value is generated by weighting the second haptic predicter value. At least the weighted first and second haptic predicter values are combined to generate a combined weighted predictive result, which is compared to a haptic predictive threshold value. On condition that such comparison yields a haptic predictive result, power continues transmitting to the haptic circuit. On condition that such comparison yields a non-haptic-predictive result, power ceases transmitting to the haptic circuit.
 
  
 
===INTERACTIVE USER INTERFACE CONTROLS FOR SHARED DYNAMIC OBJECTS ([[18455855. INTERACTIVE USER INTERFACE CONTROLS FOR SHARED DYNAMIC OBJECTS simplified abstract (Microsoft Technology Licensing, LLC)|18455855]])===
 
===INTERACTIVE USER INTERFACE CONTROLS FOR SHARED DYNAMIC OBJECTS ([[18455855. INTERACTIVE USER INTERFACE CONTROLS FOR SHARED DYNAMIC OBJECTS simplified abstract (Microsoft Technology Licensing, LLC)|18455855]])===
Line 267: Line 85:
 
Jonathan Seth KAUFTHAL
 
Jonathan Seth KAUFTHAL
  
 
'''Brief explanation'''
 
The patent application describes systems, methods, and devices for interacting with sharable dynamic objects. These objects are components that can be accessed and rendered in a host software application. The patent application also introduces an interactive control element that allows users to embed the component in different host experiences and copy a link to the source file for the component.
 
 
* Sharable dynamic objects are components that can be accessed and rendered in a host software application.
 
* A distributed data structure is generated to represent the component.
 
* An interactive control element is provided in the component.
 
* The interactive control element includes a component location portion that shows the distributed host experiences the component is included in.
 
* The interactive control element also includes a component embedding portion that displays sharable objects where the component can be automatically embedded.
 
* The interactive control element includes a copy component portion that allows users to copy a link to the source file for the component.
 
 
== Potential Applications ==
 
* Collaborative software development: Developers can easily share and embed components in different projects.
 
* Content management systems: Users can share and embed dynamic objects in various web pages or applications.
 
* Interactive presentations: Presenters can include interactive components that can be easily shared and embedded in different slides or presentations.
 
 
== Problems Solved ==
 
* Simplifies the process of sharing and embedding dynamic objects in different host experiences.
 
* Provides a centralized control element for managing the distribution and embedding of components.
 
* Allows for easy copying of source file links, facilitating collaboration and version control.
 
 
== Benefits ==
 
* Streamlines the sharing and embedding process, saving time and effort.
 
* Enhances collaboration by providing a clear overview of component distribution.
 
* Improves version control by enabling easy access to the source file for the component.
 
 
'''Abstract'''
 
In non-limiting examples of the present disclosure, systems, methods, and devices for interacting with sharable dynamic objects are presented. A sharable dynamic object comprising a source file for a component may be accessed. A distributed data structure corresponding to the component may be generated. The component may be rendered in a host software application by processing the distributed data structure. An interactive control element may be rendered in the component, wherein the interactive control element comprises: a component location portion populated with identities of a plurality of distributed host experiences the component is included in, a component embedding portion populated with identities of a plurality of sharable objects that are selectable for automatically embedding the component in, and a copy component portion selectable for copying a link to the source file for the component.
 
  
 
===VOICE ASSISTANT-ENABLED CLIENT APPLICATION WITH USER VIEW CONTEXT ([[18231333. VOICE ASSISTANT-ENABLED CLIENT APPLICATION WITH USER VIEW CONTEXT simplified abstract (Microsoft Technology Licensing, LLC)|18231333]])===
 
===VOICE ASSISTANT-ENABLED CLIENT APPLICATION WITH USER VIEW CONTEXT ([[18231333. VOICE ASSISTANT-ENABLED CLIENT APPLICATION WITH USER VIEW CONTEXT simplified abstract (Microsoft Technology Licensing, LLC)|18231333]])===
Line 303: Line 93:
 
Jaclyn Carley KNAPP
 
Jaclyn Carley KNAPP
  
 
'''Brief explanation'''
 
The patent application discusses various embodiments that allow client applications to be closely integrated with a voice assistant. This integration enables the voice assistant to perform commands associated with user voice utterances and also seamlessly trigger native functions within the client applications.
 
 
* The embodiments enable client applications to execute voice commands through voice assistant functionality.
 
* The integration allows for automatic execution of native functions within client applications based on the voice utterance and user view context.
 
* The technology intelligently switches to the relevant page and populates specific fields based on the user's needs and voice utterance.
 
 
== Potential Applications ==
 
This technology has potential applications in various fields, including:
 
 
* Mobile applications: Voice-controlled navigation and execution of tasks within mobile apps.
 
* E-commerce platforms: Seamless voice-based shopping experiences with automatic population of relevant fields.
 
* Productivity tools: Voice-activated automation of tasks within productivity applications.
 
* Customer support systems: Voice assistant integration for quick and efficient issue resolution.
 
 
== Problems Solved ==
 
The technology addresses the following problems:
 
 
* Lack of seamless integration between voice assistants and client applications.
 
* Manual navigation and data entry within applications, leading to inefficiency and user frustration.
 
* Limited automation capabilities of voice assistants in executing native functions within applications.
 
 
== Benefits ==
 
The technology offers several benefits:
 
 
* Enhanced user experience through voice-controlled execution of commands and automation of tasks.
 
* Improved efficiency and productivity by eliminating manual navigation and data entry.
 
* Seamless integration between voice assistants and client applications for a more cohesive user interface.
 
 
'''Abstract'''
 
Various embodiments discussed herein enable client applications to be heavily integrated with a voice assistant in order to both perform commands associated with voice utterances of users via voice assistant functionality and also seamlessly cause client applications to automatically perform native functions as part of executing the voice utterance. For example, some embodiments can automatically and intelligently cause a switch to a page the user needs and automatically and intelligently cause a population of particular fields of the page the user needs based on a user view context and the voice utterance.
 
  
 
===SOFTWARE DEPLOYMENT TO MULTIPLE COMPUTING DEVICES ([[18208682. SOFTWARE DEPLOYMENT TO MULTIPLE COMPUTING DEVICES simplified abstract (Microsoft Technology Licensing, LLC)|18208682]])===
 
===SOFTWARE DEPLOYMENT TO MULTIPLE COMPUTING DEVICES ([[18208682. SOFTWARE DEPLOYMENT TO MULTIPLE COMPUTING DEVICES simplified abstract (Microsoft Technology Licensing, LLC)|18208682]])===
Line 343: Line 101:
 
Madhur Joshi
 
Madhur Joshi
  
 
'''Brief explanation'''
 
The abstract describes a method for storing and managing software deployment packages and associated parameters in a data store. The method involves publishing an application to multiple remote computing devices and receiving parameter values from each device, which are then stored in specific regions of the data store.
 
 
* The method involves storing a manifest file and a parameters file in a data store.
 
* The manifest file and parameters file are associated with a software deployment package.
 
* An application associated with the software deployment package is published to multiple remote computing devices.
 
* Parameter values are received from each remote computing device.
 
* The first set of parameter values is stored in a specific region of the data store for the first computing device.
 
* The second set of parameter values is stored in a different region of the data store for the second computing device.
 
 
== Potential Applications ==
 
* Software deployment and management systems
 
* Cloud computing platforms
 
* Distributed computing environments
 
 
== Problems Solved ==
 
* Efficient storage and management of software deployment packages and associated parameters
 
* Simplified deployment and configuration of applications on multiple remote computing devices
 
 
== Benefits ==
 
* Centralized storage and organization of software deployment packages and parameters
 
* Streamlined deployment process for applications on multiple devices
 
* Improved scalability and flexibility in managing software deployments
 
 
'''Abstract'''
 
A particular method includes storing a manifest file and a parameters file at a data store. The manifest file and the parameters file are associated with a software deployment package. An application associated with the software deployment package is published to a first remote computing device and to a second remote computing device. The method includes receiving first parameter values from the first remote computing device and receiving second parameter values from the second remote computing device. The first parameter values are stored in a first region of the data store that is specific to the first computing device. The second parameter values are stored in a second region of the data store that is specific to the second computing device.
 
  
 
===CONTEXTUALIZATION OF CODE DEVELOPMENT ([[17836267. CONTEXTUALIZATION OF CODE DEVELOPMENT simplified abstract (Microsoft Technology Licensing, LLC)|17836267]])===
 
===CONTEXTUALIZATION OF CODE DEVELOPMENT ([[17836267. CONTEXTUALIZATION OF CODE DEVELOPMENT simplified abstract (Microsoft Technology Licensing, LLC)|17836267]])===
Line 378: Line 109:
 
Bjarte SJURSEN
 
Bjarte SJURSEN
  
 
'''Brief explanation'''
 
The disclosed technology is about code transparency and involves receiving raw input data that includes version information associated with code, including pull requests. Key phrases are extracted from the raw input data using key-phrase extraction. Based on these key phrases, a list of relevant documents and a list of relevant people are determined. A relevance ranking is performed on these lists to identify the most relevant documents and people related to the code. Information associated with these relevant documents and/or people is then provided to a developer environment associated with the code.
 
 
* Raw input data with version information and pull requests is received.
 
* Key phrases are extracted from the raw input data.
 
* Lists of relevant documents and relevant people are determined based on the extracted key phrases.
 
* A relevance ranking is performed on these lists.
 
* The most relevant documents and people related to the code are identified.
 
* Information associated with these relevant documents and/or people is provided to the developer environment.
 
 
==Potential Applications==
 
* Code transparency and understanding.
 
* Collaboration and communication among developers.
 
* Enhancing developer productivity and efficiency.
 
 
==Problems Solved==
 
* Difficulty in understanding and navigating code.
 
* Lack of visibility into relevant documents and people related to the code.
 
* Inefficient collaboration and communication among developers.
 
 
==Benefits==
 
* Improved code transparency and understanding.
 
* Enhanced collaboration and communication among developers.
 
* Increased developer productivity and efficiency.
 
 
'''Abstract'''
 
The disclosed technology is generally directed to code transparency. In one example of the technology, raw input data that includes version information that is associated with code is received. The version information includes pull requests associated with the code. Extracted key phrases are provided by performing a key-phrase extraction on the raw input data. A list of documents and a list of people are determined based at least in part on the extracted key phrases. A relevance ranking is performed on the list of documents and the list of people. Based on the relevance ranking, relevant documents and relevant people are determined, such that the relevant documents and the relevant people are relevant to the code. To a developer environment that is associated with the code, information associated with the relevant documents and/or the relevant people is provided.
 
  
 
===Video-Based Progress Tracker for Mobile Application Development ([[17840529. Video-Based Progress Tracker for Mobile Application Development simplified abstract (Microsoft Technology Licensing, LLC)|17840529]])===
 
===Video-Based Progress Tracker for Mobile Application Development ([[17840529. Video-Based Progress Tracker for Mobile Application Development simplified abstract (Microsoft Technology Licensing, LLC)|17840529]])===
Line 414: Line 117:
 
Vishal Goyal
 
Vishal Goyal
  
 
'''Brief explanation'''
 
The abstract describes a method for generating a video that tracks differences between code commits of a software application. Here is a simplified explanation of the abstract:
 
 
* The method involves accessing two code commits for a software application from a code repository.
 
* The first code commit is compared to the second code commit to identify differences across multiple dimensions.
 
* A video frame is generated based on these differences.
 
* The video frame is then appended to a video that tracks the differences between code commits of the software application.
 
 
Potential applications of this technology:
 
 
* Software development: This method can be used by software developers to visually track changes and differences between code commits, making it easier to understand and analyze the evolution of a software application over time.
 
 
Problems solved by this technology:
 
 
* Tracking code changes: Traditional methods of tracking code changes may involve manually reviewing code commits, which can be time-consuming and prone to errors. This method automates the process and provides a visual representation of the differences, making it more efficient and accurate.
 
 
Benefits of this technology:
 
 
* Improved understanding: The generated video provides a clear visual representation of the differences between code commits, allowing developers to easily understand and analyze the changes made to the software application.
 
* Time-saving: By automating the process of tracking code changes and generating a video, this method saves developers time that would otherwise be spent manually reviewing code commits.
 
* Error reduction: The automated nature of this method reduces the chances of human error that may occur during manual code review, ensuring a more accurate representation of the differences between code commits.
 
 
'''Abstract'''
 
A method may include accessing a first code commit for a software application from a code repository, the code repository including a sequence of code commits for the software application; accessing a second code commit for the software application from the code repository, the second code commit occurring prior to the first code commit in the sequence of code commits for the software application; parsing the first code commit for differences across a plurality of dimensions from the second code commit; generating a video frame based on the differences; and appending the video frame to a video, the video including a plurality of frames tracking differences between code commits of the software application.
 
  
 
===SOFTWARE ISOLATION OF VIRTUAL MACHINE RESOURCES ([[17837688. SOFTWARE ISOLATION OF VIRTUAL MACHINE RESOURCES simplified abstract (Microsoft Technology Licensing, LLC)|17837688]])===
 
===SOFTWARE ISOLATION OF VIRTUAL MACHINE RESOURCES ([[17837688. SOFTWARE ISOLATION OF VIRTUAL MACHINE RESOURCES simplified abstract (Microsoft Technology Licensing, LLC)|17837688]])===
Line 447: Line 125:
 
Jin LIN
 
Jin LIN
  
 
'''Brief explanation'''
 
The patent application describes a method for isolating resources of a virtual machine (VM) guest from a host operating system. Here is a simplified explanation of the abstract:
 
 
* The computer system receives a request from a guest partition of a VM, which is an isolated VM.
 
* The request includes information about a specific memory page in the guest partition and a memory page visibility class.
 
* The computer system checks if the physical memory page that corresponds to the guest memory page meets the specified memory page visibility class.
 
* If the physical memory page meets the class, the computer system changes the page acceptance indication for the guest memory page from unaccepted to accepted.
 
 
Potential applications of this technology:
 
 
* Virtualization platforms: This technology can be used in virtualization platforms to enhance the isolation and security of VM guests from the host operating system.
 
* Cloud computing: It can be applied in cloud computing environments to ensure the isolation of resources between different VMs running on the same physical server.
 
 
Problems solved by this technology:
 
 
* Resource isolation: The technology solves the problem of effectively isolating the resources of a VM guest from the host operating system, preventing unauthorized access or interference.
 
* Security vulnerabilities: By ensuring that only memory pages meeting specific visibility classes are accepted, the technology helps mitigate security vulnerabilities that could arise from improper memory access.
 
 
Benefits of this technology:
 
 
* Enhanced security: The technology improves the security of virtualized environments by isolating resources and preventing unauthorized access.
 
* Efficient resource allocation: By effectively managing memory page acceptance, the technology allows for efficient allocation of resources within a virtualized environment.
 
 
'''Abstract'''
 
Isolating resources of a virtual machine (VM) guest from a host operating system. A computer system receives an acceptance request from a guest partition corresponding to an isolated VM. The acceptance request identifies a guest memory page that is mapped into a guest physical address space of the guest partition, and a memory page visibility class. The computer system determines whether a physical memory page that is mapped to the guest memory page meets the memory page visibility class. The computer system sets a page acceptance indication for the guest memory page from an unaccepted state to an accepted state based on the physical memory page meeting the memory page visibility class.
 
  
 
===SYSTEM AND METHOD OF DYNAMICALLY ADJUSTING VIRTUAL MACHINES FOR A WORKLOAD ([[17806191. SYSTEM AND METHOD OF DYNAMICALLY ADJUSTING VIRTUAL MACHINES FOR A WORKLOAD simplified abstract (Microsoft Technology Licensing, LLC)|17806191]])===
 
===SYSTEM AND METHOD OF DYNAMICALLY ADJUSTING VIRTUAL MACHINES FOR A WORKLOAD ([[17806191. SYSTEM AND METHOD OF DYNAMICALLY ADJUSTING VIRTUAL MACHINES FOR A WORKLOAD simplified abstract (Microsoft Technology Licensing, LLC)|17806191]])===
Line 481: Line 133:
 
Soumya RAM
 
Soumya RAM
  
 
'''Brief explanation'''
 
The abstract describes a method for dynamically adjusting the number of virtual machines for a workload based on the likelihood of eviction during different stages. The method involves receiving probability indicators for each stage, predicting the target number of virtual machines for the subsequent stage, and configuring the number of virtual machines based on the target number.
 
 
* The method is used to dynamically adjust the number of virtual machines for a workload.
 
* Probability indicators are received for each stage to determine the likelihood of eviction.
 
* The target number of virtual machines for the subsequent stage is predicted based on the probability indicator, target capacity, and current price.
 
* The number of virtual machines for the workload is configured during the current stage based on the target number for the subsequent stage.
 
 
== Potential Applications ==
 
* Cloud computing: This method can be applied in cloud computing environments to optimize the allocation of virtual machines for workloads.
 
* Resource management: It can be used in resource management systems to efficiently allocate virtual machines based on workload demands.
 
* Cost optimization: By dynamically adjusting the number of virtual machines, this method can help reduce costs associated with maintaining unnecessary virtual machines.
 
 
== Problems Solved ==
 
* Inefficient resource allocation: This method addresses the problem of inefficiently allocating virtual machines for workloads by dynamically adjusting their numbers based on eviction likelihood.
 
* Cost inefficiency: By considering the current price for maintaining a virtual machine, this method helps optimize costs by only configuring the necessary number of virtual machines.
 
 
== Benefits ==
 
* Improved resource utilization: By dynamically adjusting the number of virtual machines, this method ensures optimal utilization of resources for workloads.
 
* Cost savings: The method helps reduce costs by only configuring the necessary number of virtual machines based on workload demands and eviction likelihood.
 
* Enhanced workload performance: By optimizing the allocation of virtual machines, this method can improve the performance and responsiveness of workloads.
 
 
'''Abstract'''
 
A method for dynamically adjusting a number of virtual machines for a workload, includes: receiving a probability indicator for each of a plurality of N sequential stages, where N is a natural number greater than 1, of a likelihood that a virtual machine assigned to a workload will be evicted during the N sequential stages; predicting a target number of virtual machines to configure in a current stage for a subsequent stage from among the plurality of N sequential stages based on the probability indicator, a target capacity for the workload, and a current price for maintaining a virtual machine; and configuring a number of virtual machines for the workload during the current stage based on the target number to be loaded for the workload for the subsequent stage.
 
  
 
===SYNCHRONIZED SYSTEM-ON-CHIP TELEMETRY AGGREGATION AND BUFFERING ([[17835834. SYNCHRONIZED SYSTEM-ON-CHIP TELEMETRY AGGREGATION AND BUFFERING simplified abstract (Microsoft Technology Licensing, LLC)|17835834]])===
 
===SYNCHRONIZED SYSTEM-ON-CHIP TELEMETRY AGGREGATION AND BUFFERING ([[17835834. SYNCHRONIZED SYSTEM-ON-CHIP TELEMETRY AGGREGATION AND BUFFERING simplified abstract (Microsoft Technology Licensing, LLC)|17835834]])===
Line 514: Line 141:
 
Richard Gerard HOFMANN
 
Richard Gerard HOFMANN
  
 
'''Brief explanation'''
 
The present disclosure describes a technique for synchronized telemetry aggregation and buffering in a system-on-chip (SoC). This technique involves receiving telemetry data associated with the operation of multiple processor cores in the SoC during different epochs. The received telemetry data is analyzed to determine if it corresponds to an incomplete set of data for a particular epoch. If an incomplete set is detected, a message is sent to the controllers of the processor cores to modify the operations related to telemetry data collection.
 
 
* The technique involves receiving telemetry data from multiple processor cores in a system-on-chip (SoC).
 
* The telemetry data is received for different epochs, representing different time periods.
 
* The received telemetry data is analyzed to determine if it is an incomplete set for a particular epoch.
 
* If an incomplete set is detected, a message is sent to the controllers of the processor cores to modify telemetry data collection operations.
 
 
== Potential Applications ==
 
* This technique can be applied in various SoC designs where synchronized telemetry data collection is required.
 
* It can be used in systems that rely on accurate and synchronized telemetry data for performance analysis and optimization.
 
* The technique can be beneficial in debugging and troubleshooting complex SoC architectures.
 
 
== Problems Solved ==
 
* The technique solves the problem of incomplete telemetry data collection in a synchronized manner.
 
* It ensures that all necessary telemetry data for a particular epoch is collected and available for analysis.
 
* By modifying telemetry data collection operations, it helps in improving the accuracy and reliability of performance analysis.
 
 
== Benefits ==
 
* The technique provides a synchronized approach to telemetry data aggregation and buffering.
 
* It helps in identifying and addressing incomplete telemetry data collection in real-time.
 
* By ensuring complete telemetry data sets, it enables accurate performance analysis and optimization of SoC designs.
 
 
'''Abstract'''
 
Embodiments of the present disclosure include techniques for synchronized telemetry aggregation and buffering in a system-on-chip (SoC). A first set of telemetry data associated with operation of a plurality of processor cores of the SoC during a first epoch is received. A second set of telemetry data associated with operation of the plurality of processor cores during a second epoch is received. The first set of telemetry data is determined as corresponding to an incomplete set of telemetry data for the first epoch. A message is transmitted to one or more controllers of the plurality of processor cores to modify operations associated with telemetry data collection as a result of the determination.
 
  
 
===EMPLOYING SAMPLED REGISTER VALUES TO INFER MEMORY ACCESSES BY AN APPLICATION ([[17837507. EMPLOYING SAMPLED REGISTER VALUES TO INFER MEMORY ACCESSES BY AN APPLICATION simplified abstract (Microsoft Technology Licensing, LLC)|17837507]])===
 
===EMPLOYING SAMPLED REGISTER VALUES TO INFER MEMORY ACCESSES BY AN APPLICATION ([[17837507. EMPLOYING SAMPLED REGISTER VALUES TO INFER MEMORY ACCESSES BY AN APPLICATION simplified abstract (Microsoft Technology Licensing, LLC)|17837507]])===
Line 548: Line 149:
 
Danny CHEN
 
Danny CHEN
  
 
'''Brief explanation'''
 
The patent application relates to memory access profiling, specifically a method or technique for analyzing memory accesses made by an application. Here are the key points:
 
 
* Obtaining samples collected during the execution of an application, which include register values present in the processor at the time of collection.
 
* Identifying the instructions of the application that were executing when the samples were collected, as well as other instructions of the application.
 
* Evaluating the sampled instructions and other instructions using the sampled register values to identify memory accesses made by the application.
 
* Outputting the identified memory accesses.
 
 
== Potential Applications ==
 
* This technology can be used in software development and debugging processes to analyze and optimize memory usage in applications.
 
* It can help identify memory access patterns and bottlenecks, allowing developers to improve performance and efficiency.
 
* Memory access profiling can also be used in security analysis to detect any unauthorized or suspicious memory accesses made by an application.
 
 
== Problems Solved ==
 
* Traditional methods of memory access profiling may be time-consuming and resource-intensive.
 
* This technology provides a more efficient and accurate way to analyze memory accesses by utilizing sampled register values.
 
* It helps developers quickly identify and address memory-related issues in applications, leading to improved performance and reliability.
 
 
== Benefits ==
 
* The method or technique described in the patent application offers a more streamlined and automated approach to memory access profiling.
 
* It provides valuable insights into an application's memory usage, allowing for targeted optimizations.
 
* By identifying memory access patterns, developers can optimize their code to reduce unnecessary memory accesses and improve overall performance.
 
 
'''Abstract'''
 
This document relates to memory access profiling. One example relates to a method or technique that can include obtaining samples collected when executing an application, the samples comprising sampled register values that were present in one or more registers of a processor when the samples were collected. The method or technique can also include identifying sampled instructions of the application that were executing when the samples were collected and other instructions of the application. The method or technique can also include evaluating the sampled instructions and one or more of the other instructions using the sampled register values to identify memory accesses by the application. The method or technique can also include outputting the identified memory accesses.
 
  
 
===ADDRESS TRANSLATION PREFETCHING FOR INPUT/OUTPUT DEVICES ([[17836936. ADDRESS TRANSLATION PREFETCHING FOR INPUT/OUTPUT DEVICES simplified abstract (Microsoft Technology Licensing, LLC)|17836936]])===
 
===ADDRESS TRANSLATION PREFETCHING FOR INPUT/OUTPUT DEVICES ([[17836936. ADDRESS TRANSLATION PREFETCHING FOR INPUT/OUTPUT DEVICES simplified abstract (Microsoft Technology Licensing, LLC)|17836936]])===
Line 582: Line 157:
 
Ramakrishna HUGGAHALLI
 
Ramakrishna HUGGAHALLI
  
 
'''Brief explanation'''
 
The abstract describes a technology related to input/output memory management unit (IOMMU) in a computing device. Here is a simplified explanation of the abstract:
 
 
* The technology involves an IOMMU in a computing device that receives a prefetch message from a CPU core.
 
* The prefetch message includes a virtual address, which is the address used by the CPU core.
 
* The IOMMU performs a page walk on the virtual address through a page table stored in the main memory of the computing device.
 
* The page walk retrieves a prefetched translation of the virtual address to a physical address, which is the actual location in memory.
 
* The prefetched translation is then stored in a translation lookaside buffer (TLB) of the IOMMU.
 
 
Potential Applications:
 
 
* This technology can be applied in various computing devices such as servers, personal computers, and mobile devices.
 
* It can improve the efficiency of memory management in these devices.
 
 
Problems Solved:
 
 
* The technology solves the problem of efficiently translating virtual addresses to physical addresses in a computing device.
 
* It reduces the time and resources required for address translation.
 
 
Benefits:
 
 
* By prefetching translations, the technology can reduce the latency in accessing memory.
 
* It can improve the overall performance and responsiveness of the computing device.
 
* The use of a TLB can further enhance the efficiency of address translation.
 
 
'''Abstract'''
 
In one example of the present technology, an input/output memory management unit (IOMMU) of a computing device is configured to: receive a prefetch message including a virtual address from a central processing unit (CPU) core of a processor of the computing device; perform a page walk on the virtual address through a page table stored in a main memory of the computing device to obtain a prefetched translation of the virtual address to a physical address; and store the prefetched translation of the virtual address to the physical address in a translation lookaside buffer (TLB) of the IOMMU.
 
  
 
===CONTROL SYSTEM FOR CONTROLLING MANAGEMENT OF DIGITAL CARDS STORED IN DECENTRALIZED CONTENT STORAGE ([[17839012. CONTROL SYSTEM FOR CONTROLLING MANAGEMENT OF DIGITAL CARDS STORED IN DECENTRALIZED CONTENT STORAGE simplified abstract (Microsoft Technology Licensing, LLC)|17839012]])===
 
===CONTROL SYSTEM FOR CONTROLLING MANAGEMENT OF DIGITAL CARDS STORED IN DECENTRALIZED CONTENT STORAGE ([[17839012. CONTROL SYSTEM FOR CONTROLLING MANAGEMENT OF DIGITAL CARDS STORED IN DECENTRALIZED CONTENT STORAGE simplified abstract (Microsoft Technology Licensing, LLC)|17839012]])===
Line 618: Line 165:
 
Salil DAS
 
Salil DAS
  
 
'''Brief explanation'''
 
The abstract of this patent application describes a system that manages a graph to track activities and relationships among digital cards. It allows for the aggregation of digital cards from different locations in a decentralized data storage system, making them appear as if they come from a single virtual location.
 
 
* The system manages a graph that tracks activities related to digital cards.
 
* It also tracks relationships among the digital cards.
 
* Digital cards from various locations in a decentralized data storage system can be combined and projected as if they come from one virtual location.
 
 
==Potential Applications==
 
* Digital card management systems
 
* Decentralized data storage systems
 
* Collaborative work platforms
 
 
==Problems Solved==
 
* Difficulty in managing and organizing digital cards from different locations
 
* Lack of a unified view of digital cards in a decentralized data storage system
 
* Inefficient tracking of activities and relationships among digital cards
 
 
==Benefits==
 
* Simplifies the management and organization of digital cards
 
* Provides a unified view of digital cards from different locations
 
* Enhances tracking and understanding of activities and relationships among digital cards
 
 
'''Abstract'''
 
A metafolder system manages a graph that identifies activities that are performed with respect to digital cards and that identifies relationships among the digital cards. The digital cards from a plurality of different locations in the de-centralized data storage system architecture can be aggregated for projection as coming from a single virtual location.
 
  
 
===GRAPHIC SEARCH BAR WITH RESPONSIVE RESULTS ([[17838604. GRAPHIC SEARCH BAR WITH RESPONSIVE RESULTS simplified abstract (Microsoft Technology Licensing, LLC)|17838604]])===
 
===GRAPHIC SEARCH BAR WITH RESPONSIVE RESULTS ([[17838604. GRAPHIC SEARCH BAR WITH RESPONSIVE RESULTS simplified abstract (Microsoft Technology Licensing, LLC)|17838604]])===
Line 651: Line 173:
 
Laralyn MCWILLIAMS
 
Laralyn MCWILLIAMS
  
 
'''Brief explanation'''
 
The present disclosure provides systems, methods, and devices for a graphic search bar with responsive results. Here are the key points:
 
 
* A search bar is generated with a text input area and dropdown menus containing selectable options.
 
* The search bar is rendered in an application user interface that offers searchable content options.
 
* When an option is selected from a dropdown menu, the content options are filtered in real time based on the selection.
 
* The filtered search results are immediately displayed to the user.
 
 
==Potential Applications==
 
This technology can be applied in various domains, including:
 
 
* E-commerce platforms: Users can easily search for products by selecting specific options from dropdown menus.
 
* Content management systems: Users can quickly find relevant content by filtering options and seeing real-time search results.
 
* Travel websites: Users can search for flights, hotels, or vacation packages by selecting desired options and getting instant search results.
 
 
==Problems Solved==
 
The graphic search bar with responsive results solves the following problems:
 
 
* Time-consuming search processes: Users can find desired information or products more efficiently by filtering options and seeing immediate results.
 
* Complex search interfaces: The search bar simplifies the search process by providing dropdown menus with selectable options, making it easier for users to specify their search criteria.
 
 
==Benefits==
 
This technology offers several benefits:
 
 
* Enhanced user experience: Users can quickly find what they are looking for without having to navigate through multiple pages or complex search interfaces.
 
* Real-time filtering: The search results are dynamically updated as users select different options, providing instant feedback and reducing search time.
 
* Improved search accuracy: By filtering options, users can narrow down their search criteria and receive more relevant results.
 
 
'''Abstract'''
 
In non-limiting examples of the present disclosure, systems, methods, and devices for a graphic search bar with responsive results is provided. A search bar may be generated. The search bar may include a text input area and a number of dropdown menus, each of which contain a selectable list of options. The search bar may be rendered in an application user interface that provides content options that are searchable using the search bar. A selection of an option from a first of the dropdown menus may be received. In response to receiving the selection, the content options may be filtered in real time based on the selected option to generate search results. The search results may be rendered for immediate display to the user.
 
  
 
===SYSTEM FOR CREATING AND ACCESSING DIGITAL CARDS STORED IN DECENTRALIZED CONTENT STORAGE ([[17839003. SYSTEM FOR CREATING AND ACCESSING DIGITAL CARDS STORED IN DECENTRALIZED CONTENT STORAGE simplified abstract (Microsoft Technology Licensing, LLC)|17839003]])===
 
===SYSTEM FOR CREATING AND ACCESSING DIGITAL CARDS STORED IN DECENTRALIZED CONTENT STORAGE ([[17839003. SYSTEM FOR CREATING AND ACCESSING DIGITAL CARDS STORED IN DECENTRALIZED CONTENT STORAGE simplified abstract (Microsoft Technology Licensing, LLC)|17839003]])===
Line 690: Line 181:
 
Salil Das
 
Salil Das
  
 
'''Brief explanation'''
 
==Abstract==
 
A digital card is used to reference a digital item and can be stored within other digital cards. The digital card can also include additional properties or attributes from the referred digital item. It is stored in a decentralized data storage system architecture called a data pod.
 
 
==Patent/Innovation Explanation==
 
* A digital card is created to reference a digital item.
 
* The digital card can be contained within or refer to other digital cards.
 
* Additional properties or attributes from the referred digital item can be added to the digital card.
 
* The digital card is stored in a data pod within a decentralized data storage system architecture.
 
 
==Potential Applications==
 
* Digital asset management systems
 
* Content management systems
 
* E-commerce platforms
 
* Social media platforms
 
* Digital libraries
 
 
==Problems Solved==
 
* Efficient referencing and organization of digital items
 
* Simplified management of digital assets
 
* Enhanced search and retrieval of digital content
 
* Improved collaboration and sharing of digital resources
 
 
==Benefits==
 
* Streamlined access and retrieval of digital items
 
* Improved organization and categorization of digital assets
 
* Enhanced collaboration and sharing capabilities
 
* Efficient utilization of decentralized data storage systems
 
 
'''Abstract'''
 
A reference to a digital item is stored as a digital card. The digital card can also be contained in, and/or refer to, other digital cards. The digital card can also include properties or attributes that may be added from the digital item that is being referred to. The digital card can be stored in a data pod within a de-centralized data storage system architecture.
 
  
 
===TECHNIQUES FOR AUTOMATICALLY IDENTIFYING AND FIXING ONE WAY CORRECTNESS ISSUES BETWEEN TWO LARGE COMPUTING SYSTEMS ([[17837571. TECHNIQUES FOR AUTOMATICALLY IDENTIFYING AND FIXING ONE WAY CORRECTNESS ISSUES BETWEEN TWO LARGE COMPUTING SYSTEMS simplified abstract (Microsoft Technology Licensing, LLC)|17837571]])===
 
===TECHNIQUES FOR AUTOMATICALLY IDENTIFYING AND FIXING ONE WAY CORRECTNESS ISSUES BETWEEN TWO LARGE COMPUTING SYSTEMS ([[17837571. TECHNIQUES FOR AUTOMATICALLY IDENTIFYING AND FIXING ONE WAY CORRECTNESS ISSUES BETWEEN TWO LARGE COMPUTING SYSTEMS simplified abstract (Microsoft Technology Licensing, LLC)|17837571]])===
Line 730: Line 189:
 
Shravya THANDRA
 
Shravya THANDRA
  
 
'''Brief explanation'''
 
The patent application describes a data processing system that identifies and resolves correctness issues in large computing systems with multiple datasets. Specifically, it focuses on the problem of datasets becoming out of sync due to errors, causing references in one dataset to become invalid.
 
 
* The system automatically identifies unattached items in a dependent dataset that reference items in a reference dataset that no longer exist.
 
* It achieves this by comparing the dependent dataset with the reference dataset.
 
* Once unattached items are identified, the system automatically deletes them from the dependent dataset.
 
* The system is designed to work with large computing systems that have multiple computing systems and datastores.
 
 
==Potential Applications==
 
* This technology can be applied in any large computing system that relies on multiple datasets and datastores.
 
* It can be particularly useful in systems where data references are frequently updated and errors can cause datasets to become out of sync.
 
 
==Problems Solved==
 
* The system solves the problem of datasets becoming out of sync in large computing systems.
 
* It addresses the issue of unattached items in a dependent dataset that reference items in a reference dataset that no longer exist.
 
* By automatically identifying and deleting these unattached items, the system ensures the correctness of the datasets.
 
 
==Benefits==
 
* The system automates the process of identifying and resolving correctness issues in datasets, saving time and effort for system administrators.
 
* It helps maintain the integrity of datasets by ensuring that references in dependent datasets are always valid.
 
* By automatically deleting unattached items, the system helps keep datasets clean and organized.
 
 
'''Abstract'''
 
A data processing system implements identifying one-way correctness issues in datasets of large computing systems including a first computing system and a second computing system. The second computing system is associated with a dependent dataset that includes references to data in a second datastore associated with the first computing system. These references updated in response to changes to the data referred to by these references. However, errors can cause the two datasets to become out of sync. The system herein implements automatically identifying unattached items in a dependent dataset that references items in a reference dataset that is no longer present in the reference dataset by comparing the dependent dataset with the reference dataset, and automatically causing the second computing system to delete the unattached items from the dependent dataset.
 
  
 
===CROSS-APPLICATION COMPONENTIZED DOCUMENT GENERATION ([[17836311. CROSS-APPLICATION COMPONENTIZED DOCUMENT GENERATION simplified abstract (Microsoft Technology Licensing, LLC)|17836311]])===
 
===CROSS-APPLICATION COMPONENTIZED DOCUMENT GENERATION ([[17836311. CROSS-APPLICATION COMPONENTIZED DOCUMENT GENERATION simplified abstract (Microsoft Technology Licensing, LLC)|17836311]])===
Line 763: Line 197:
 
Sumit MEHRA
 
Sumit MEHRA
  
 
'''Brief explanation'''
 
The abstract describes a method for presenting and organizing content of an electronic document on a mobile device using machine learning models. Here is a simplified explanation:
 
 
* The method involves displaying the content of an electronic document on a mobile device using a mobile application.
 
* The content is then classified into different components using machine learning models.
 
* After classification, the identified components are highlighted within the mobile application.
 
* The user can select a specific component from the highlighted ones.
 
* The selected component is then added to a component data store on the mobile device, along with its type determined by the machine learning models.
 
 
==Potential Applications==
 
This technology can have various applications in the field of mobile computing and document management. Some potential applications include:
 
 
* Mobile document organization: The method can help users easily organize and categorize different components of electronic documents on their mobile devices.
 
* Content extraction: It can be used to extract specific types of content from documents, such as contact information, dates, or addresses, and store them separately for easy access.
 
* Information retrieval: By classifying and highlighting components, the method can enhance the efficiency of searching and retrieving specific information within documents on mobile devices.
 
 
==Problems Solved==
 
The method addresses several challenges related to content organization and management on mobile devices:
 
 
* Efficient organization: It simplifies the process of organizing and categorizing different components of electronic documents on mobile devices, making it easier for users to find and access specific information.
 
* Content extraction: By automatically identifying and extracting specific types of content, it eliminates the need for manual extraction, saving time and effort.
 
* Improved information retrieval: The highlighting of components and the ability to add them to a data store enhances the speed and accuracy of searching and retrieving information within documents on mobile devices.
 
 
==Benefits==
 
The use of machine learning models in this method offers several benefits:
 
 
* Automation: The classification and highlighting of components are automated processes, reducing the need for manual effort and intervention.
 
* Personalization: The method can adapt to individual user preferences and document types, providing a personalized experience for content organization and retrieval.
 
* Efficiency: By streamlining the organization and retrieval of document components, the method improves overall efficiency and productivity on mobile devices.
 
 
'''Abstract'''
 
A method may include presenting content of an electronic document on a mobile computing device within a mobile version of a computing application; classifying, using a set of machine learning models, by the mobile computing device, the content into a plurality of components; after the classifying, highlighting the plurality of components within the mobile version of the computing application; receiving a user input selecting a component of the plurality of components; and adding, by the mobile computing device, the component to a component data store with a type of the component, the type of the component based on output of the set of machine learning models.
 
  
 
===ASYNCHRONOUS CONTENT SWITCHING ([[17839362. ASYNCHRONOUS CONTENT SWITCHING simplified abstract (Microsoft Technology Licensing, LLC)|17839362]])===
 
===ASYNCHRONOUS CONTENT SWITCHING ([[17839362. ASYNCHRONOUS CONTENT SWITCHING simplified abstract (Microsoft Technology Licensing, LLC)|17839362]])===
Line 804: Line 205:
 
Tao Cai
 
Tao Cai
  
 
'''Brief explanation'''
 
The disclosed technologies involve a system that receives a signal from a user session and generates a ranked list of content items based on the signal. This ranked list is then assigned to different slots within the user session.
 
 
* The system receives a signal from a user session and creates a ranked list of content items based on the signal.
 
* The ranked list is divided into subsets and assigned to different slots within the user session.
 
* User activity data and position context data are used to create a second ranked list of content items.
 
* The second ranked list is then assigned to the slots instead of the original subset.
 
 
Potential applications of this technology:
 
 
* Personalized content delivery in online platforms.
 
* Targeted advertising based on user preferences and behavior.
 
* Optimizing user experience by displaying relevant content in different slots.
 
 
Problems solved by this technology:
 
 
* Efficiently delivering personalized content to users.
 
* Maximizing the effectiveness of advertising by targeting specific slots.
 
* Enhancing user engagement by displaying relevant content based on user activity.
 
 
Benefits of this technology:
 
 
* Improved user experience through personalized content delivery.
 
* Increased engagement and interaction with the user session.
 
* Higher conversion rates for advertising by targeting specific slots.
 
 
'''Abstract'''
 
Embodiments of the disclosed technologies receive a first signal from a user session and create a first ranked list of content items. Based on the first signal, a first subset of the first ranked list is assigned to a first set of slots of the user session. A second subset of the first ranked list is assigned to a second set of slots of the user session. Based on user activity data and position context data, a second ranked list of content items is created. The second ranked list is assigned instead of the second subset to the second plurality of slots.
 
  
 
===TENANT NETWORK FOR REWRITING OF CODE INCLUDED IN A WEB PAGE ([[17838789. TENANT NETWORK FOR REWRITING OF CODE INCLUDED IN A WEB PAGE simplified abstract (Microsoft Technology Licensing, LLC)|17838789]])===
 
===TENANT NETWORK FOR REWRITING OF CODE INCLUDED IN A WEB PAGE ([[17838789. TENANT NETWORK FOR REWRITING OF CODE INCLUDED IN A WEB PAGE simplified abstract (Microsoft Technology Licensing, LLC)|17838789]])===
Line 841: Line 213:
 
Meir Baruch BLACHMAN
 
Meir Baruch BLACHMAN
  
 
'''Brief explanation'''
 
The abstract describes a tenant network in a cloud services platform that can rewrite code in a web page. Here is a simplified explanation of the abstract:
 
 
* A tenant network in a cloud services platform has a proxy service and multiple browser applications belonging to the same tenant network.
 
* When a request for a web page is made by a browser, the web page is returned to the proxy service.
 
* The proxy service identifies code component(s) in the web page that need to be rewritten.
 
* The identified code component(s) are provided to another browser in the same tenant network, which is configured to rewrite the code component(s).
 
* After rewriting the code component(s), the second browser provides the rewritten code component(s) back to the proxy service.
 
* The proxy service then forwards the web page, along with the rewritten code component(s), to the first browser for execution and rendering.
 
 
Potential applications of this technology:
 
 
* Content optimization: The ability to rewrite code components in web pages can be used to optimize the content for better performance, user experience, or compatibility with different browsers or devices.
 
* Security enhancements: The code rewriting process can be used to add security measures to web pages, such as removing or modifying vulnerable code components.
 
* A/B testing: By rewriting code components, different versions of a web page can be tested and compared to determine the most effective design or functionality.
 
 
Problems solved by this technology:
 
 
* Compatibility issues: Rewriting code components can help ensure that web pages work correctly across different browsers and devices, reducing compatibility issues.
 
* Performance optimization: By rewriting code components, unnecessary or inefficient code can be removed or improved, leading to faster loading times and better overall performance.
 
* Security vulnerabilities: The ability to rewrite code components allows for the removal or modification of potentially vulnerable code, enhancing the security of web pages.
 
 
Benefits of this technology:
 
 
* Improved user experience: By optimizing code components, web pages can load faster, provide better functionality, and offer a smoother user experience.
 
* Enhanced security: The ability to rewrite code components allows for the implementation of security measures, reducing the risk of vulnerabilities and attacks.
 
* Increased flexibility: Code rewriting enables customization and adaptation of web pages to different browsers, devices, or specific requirements.
 
 
'''Abstract'''
 
A tenant network of a cloud services platform performs the rewriting of code included in a web page. For example, a proxy service communicatively coupled to a plurality of browser applications belonging to the same tenant network and a server receives a request, from a first browser, for a web page hosted by the server. The web page is returned to the proxy service, and the proxy service identifies code component(s) thereof for rewriting. The proxy service provides the identified code component(s) to a second browser included in the same tenant network as the first browser that is configured to rewrite the code component(s). After rewriting the code component, the second browser provides the rewritten code component(s) to the proxy service, which forwards the web page, along with the rewritten code component(s), to the first browser for execution and rendering.
 
  
 
===COMPUTING INVERSE TEMPERATURE UPPER AND LOWER BOUNDS ([[17806440. COMPUTING INVERSE TEMPERATURE UPPER AND LOWER BOUNDS simplified abstract (Microsoft Technology Licensing, LLC)|17806440]])===
 
===COMPUTING INVERSE TEMPERATURE UPPER AND LOWER BOUNDS ([[17806440. COMPUTING INVERSE TEMPERATURE UPPER AND LOWER BOUNDS simplified abstract (Microsoft Technology Licensing, LLC)|17806440]])===
Line 880: Line 221:
 
Haohai YU
 
Haohai YU
  
 
'''Brief explanation'''
 
The abstract describes a computing device that can solve combinatorial optimization problems using a Markov chain Monte Carlo (MCMC) algorithm. The device computes an inverse temperature lower bound and an inverse temperature upper bound to estimate the maximum and minimum changes in the energy function of the problem. It then executes the MCMC algorithm over multiple timesteps, setting the inverse temperature to the lower bound initially and the upper bound at the end, to find the solution. The device outputs the solution.
 
 
* Computing device for solving combinatorial optimization problems
 
* Uses a Markov chain Monte Carlo (MCMC) algorithm
 
* Computes inverse temperature lower bound and upper bound
 
* Estimates maximum and minimum changes in the energy function
 
* Executes MCMC algorithm over multiple timesteps
 
* Sets inverse temperature to lower bound initially and upper bound at the end
 
* Outputs the solution to the problem
 
 
==Potential Applications==
 
* Optimization problems in various fields such as logistics, scheduling, and resource allocation
 
* Network routing and traffic optimization
 
* Financial portfolio optimization
 
* DNA sequence alignment and protein folding
 
 
==Problems Solved==
 
* Solves complex combinatorial optimization problems efficiently
 
* Provides a solution to problems that are difficult to solve using traditional methods
 
* Enables optimization in real-time or near-real-time scenarios
 
 
==Benefits==
 
* Faster and more efficient solution to combinatorial optimization problems
 
* Can handle large-scale problems with many variables and constraints
 
* Provides accurate estimates of the energy function changes
 
* Enables real-time decision-making and optimization
 
 
'''Abstract'''
 
A computing device including a processor configured to receive an energy function of a combinatorial optimization problem. The processor may be further configured to compute an inverse temperature lower bound, which may include estimating a maximum change in the energy function between successive timesteps. The processor may be further configured to compute an inverse temperature upper bound, which may include estimating a minimum change in the energy function between successive timesteps. The processor may be further configured to compute the solution to the combinatorial optimization problem at least in part by executing a Markov chain Monte Carlo (MCMC) algorithm over the plurality of timesteps. An inverse temperature of the MCMC algorithm may be set to the inverse temperature lower bound during an initial timestep and may be set to the inverse temperature upper bound during a final timestep. The processor may be further configured to output the solution.
 
  
 
===TRUSTED ROOT RECOVERY ([[18188438. TRUSTED ROOT RECOVERY simplified abstract (Microsoft Technology Licensing, LLC)|18188438]])===
 
===TRUSTED ROOT RECOVERY ([[18188438. TRUSTED ROOT RECOVERY simplified abstract (Microsoft Technology Licensing, LLC)|18188438]])===
Line 919: Line 229:
 
Cristian Iuliu POP
 
Cristian Iuliu POP
  
 
'''Brief explanation'''
 
==Abstract==
 
A device can communicate with a cloud service provider even if it has an invalid root certificate authority (CA) certificate. The cloud service provider establishes a temporary non-secure connection with the device and sends a signed updated root CA certificate. This allows the device to establish a secure connection with the cloud service provider.
 
 
==Patent/Innovation Explanation==
 
* Device can communicate with a cloud service provider despite an invalid root CA certificate.
 
* Temporary non-secure connection is established between the device recovery service and the device.
 
* Device recovery service sends a signed updated root CA certificate to the device.
 
* Secure connection is established between the device and operational functions at the cloud service provider based on the updated root CA certificate.
 
 
==Potential Applications==
 
* IoT devices that need to connect to cloud service providers.
 
* Devices that have outdated or invalid root CA certificates.
 
* Devices that require a secure connection to the cloud service provider.
 
 
==Problems Solved==
 
* Overcoming the issue of invalid root CA certificates preventing secure connections.
 
* Allowing devices to establish secure connections with cloud service providers despite certificate issues.
 
 
==Benefits==
 
* Enables devices to continue communicating with cloud service providers even with invalid certificates.
 
* Provides a solution for devices that cannot establish secure connections due to certificate problems.
 
* Simplifies the process of updating root CA certificates on devices.
 
 
'''Abstract'''
 
A device is provisioned to communicate with a cloud service provider when the device is unable to establish a secure connection due to an invalid root certificate authority (CA) certificate installed at the device. The cloud service provider establishes a temporary non-secure connection between a device recovery service and the device. The device recovery service sends a signed updated root CA certificate to the device. Based on the signed updated root CA certificate, a secure connection is established between the device and operational functions at the cloud service provider.
 
  
 
===SECURE USER ASSIGNED DEVICE FROM MANUFACTURER ([[18236725. SECURE USER ASSIGNED DEVICE FROM MANUFACTURER simplified abstract (Microsoft Technology Licensing, LLC)|18236725]])===
 
===SECURE USER ASSIGNED DEVICE FROM MANUFACTURER ([[18236725. SECURE USER ASSIGNED DEVICE FROM MANUFACTURER simplified abstract (Microsoft Technology Licensing, LLC)|18236725]])===
Line 954: Line 237:
 
Anni Dong
 
Anni Dong
  
 
'''Brief explanation'''
 
The patent application relates to securing ownership of devices to specific users to prevent misuse of lost or stolen devices. Here is a simplified explanation of the abstract:
 
 
* Users can purchase devices directly from the original equipment manufacturer (OEM).
 
* During the purchasing process, users provide ownership information for the device, including a user identifier and an identity provider.
 
* The ownership data is written to the device's firmware.
 
* When the device is powered on, it requests a user identifier.
 
* The device validates the user identifier with the identity provider before allowing any operations to continue.
 
 
Potential applications of this technology:
 
 
* Preventing unauthorized use of lost or stolen devices.
 
* Ensuring that only authorized users can access and operate devices.
 
* Enhancing device security and reducing the risk of data breaches.
 
 
Problems solved by this technology:
 
 
* Preventing malicious use of devices that are lost or stolen.
 
* Protecting user data and sensitive information stored on devices.
 
* Minimizing the risk of unauthorized access to devices and their functionalities.
 
 
Benefits of this technology:
 
 
* Enhanced device security through user authentication.
 
* Improved protection of user data and privacy.
 
* Increased control over device ownership and usage.
 
* Reduced risk of unauthorized access and misuse of devices.
 
 
'''Abstract'''
 
This document relates to securing ownership of devices to particular users when the devices are shipped directly from an original equipment manufacturer in order to prevent malicious use of devices that are lost or stolen. A purchaser may purchase a device from an original equipment manufacturer, and as part of the purchasing process, may provide ownership information for the device, which may include a user identifier and an identity provider. The ownership data can be written to firmware, and upon powering on of the device, the device can request a user identifier, which is then validated by the identity provider before allowing operating systems operations to continue on the device.
 
  
 
===GENERIC FEATURE EXTRACTION FOR IDENTIFYING MALICIOUS PACKAGES ([[17837703. GENERIC FEATURE EXTRACTION FOR IDENTIFYING MALICIOUS PACKAGES simplified abstract (Microsoft Technology Licensing, LLC)|17837703]])===
 
===GENERIC FEATURE EXTRACTION FOR IDENTIFYING MALICIOUS PACKAGES ([[17837703. GENERIC FEATURE EXTRACTION FOR IDENTIFYING MALICIOUS PACKAGES simplified abstract (Microsoft Technology Licensing, LLC)|17837703]])===
Line 993: Line 245:
 
Rahul PANDITA
 
Rahul PANDITA
  
 
'''Brief explanation'''
 
The patent application describes a computer system that classifies packages as either malicious or benign based on generic feature extraction. Here is a simplified explanation of the abstract:
 
 
* The computer system uses a set of training packages, some known to be malicious and some known to be benign.
 
* It extracts a set of training feature vectors from these packages using a feature extraction model.
 
* These training feature vectors are used to train a classification model.
 
* Once the classification model is trained, it can classify a subject package as malicious or benign.
 
* This is done by extracting a feature vector for the subject package using the feature extraction model and inputting it to the classification model.
 
 
Potential applications of this technology:
 
 
* Cybersecurity: This technology can be used to identify and classify malicious packages, helping to protect computer systems from malware and other threats.
 
* Software development: It can be used to analyze and classify packages during the development process, ensuring that only safe and trusted packages are used.
 
* Network security: By classifying packages, this technology can help in detecting and preventing network attacks and intrusions.
 
 
Problems solved by this technology:
 
 
* Efficient classification: The system automates the process of classifying packages, saving time and effort compared to manual analysis.
 
* Scalability: The system can handle a large number of packages, making it suitable for real-world scenarios with a high volume of data.
 
* Generic feature extraction: The feature extraction model can extract relevant features from different types of packages, making it adaptable to various contexts.
 
 
Benefits of this technology:
 
 
* Enhanced security: By accurately classifying packages, the system can improve the overall security of computer systems and networks.
 
* Time and cost savings: The automated classification process reduces the need for manual analysis, saving time and resources.
 
* Flexibility: The system can be trained on different sets of training packages, allowing it to adapt to evolving threats and new types of packages.
 
 
'''Abstract'''
 
Classifying packages based on generic feature extraction. A computer system identifies a set of training packages, including a first subset known to be malicious, and a second subset known to be benign. The computer system extracts a set of training feature vectors from the set of training packages by inputting each training package to a feature extraction model, which generates a training feature vector for each training package. The computer system trains a classification model using the set of training feature vectors. After training the classification model using the set of training feature vectors, a subject package is classified as malicious or benign based on extracting a feature vector for the subject package by inputting the subject package to the feature extraction model, and inputting the feature vector to the classification model.
 
  
 
===CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA ([[17835050. CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA simplified abstract (Microsoft Technology Licensing, LLC)|17835050]])===
 
===CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA ([[17835050. CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA simplified abstract (Microsoft Technology Licensing, LLC)|17835050]])===
Line 1,031: Line 253:
 
Arash VAHIDNIA
 
Arash VAHIDNIA
  
 
'''Brief explanation'''
 
The abstract describes a patent application that focuses on controlling access to resources in a computing environment by applications. Here are the key points:
 
 
* The technology provides fine-grained access control to resources in a computing environment.
 
* It determines the compliance status of an application based on access control policy compliance criteria.
 
* It ascertains the authorization status of a request based on the authorization credential and requirement of the resource.
 
* The response to the request is based on both the compliance status and the authorization status.
 
* Access control can also be based on the beneficiary of the request.
 
* The compliance classifier dynamically updates the compliance status when compliance criteria or attributes change.
 
* An identity service access control architecture uses a compliance attribute to improve efficiency.
 
* Applications can be grouped based on resource sensitivity labels.
 
 
Potential applications of this technology:
 
 
* Cloud computing platforms can use this technology to control access to resources by different applications.
 
* Enterprises can implement this technology to ensure secure access to sensitive data and resources.
 
* Government agencies can utilize this technology to enforce access control policies for classified information.
 
 
Problems solved by this technology:
 
 
* Provides a fine-grained access control mechanism, allowing organizations to have more control over who can access their resources.
 
* Reduces the risk of unauthorized access by dynamically updating compliance status based on changes in compliance criteria or attributes.
 
* Improves efficiency by utilizing a compliance attribute in the identity service access control architecture.
 
 
Benefits of this technology:
 
 
* Enhanced security by providing fine-grained access control to resources.
 
* Improved compliance management by dynamically updating compliance status.
 
* Increased efficiency through the use of a compliance attribute in the access control architecture.
 
 
'''Abstract'''
 
Some embodiments control access by applications to resources in a computing environment. An embodiment notes a request from an application to access a resource, determines a compliance status of the application based on access control policy compliance criteria, ascertains an authorization status of the request based on an authorization credential of the request and an authorization requirement of the resource, and responds to the request based on the compliance status and also based on the authorization status, thereby providing fine-grained access control. Access may also be controlled based on a request's beneficiary. An access request response may allow access, deny access, or ask for additional authorization. A compliance classifier reduces risk by dynamically updating compliance status after compliance criteria changes or attribute changes. An identity service access control architecture uses a compliance attribute to improve efficiency. Applications may be access control grouped according to resource sensitivity labels.
 
  
 
===SYSTEMS AND METHODS FOR MANUFACTURING ADAPTIVE PERIPHERAL DEVICES ([[17840383. SYSTEMS AND METHODS FOR MANUFACTURING ADAPTIVE PERIPHERAL DEVICES simplified abstract (Microsoft Technology Licensing, LLC)|17840383]])===
 
===SYSTEMS AND METHODS FOR MANUFACTURING ADAPTIVE PERIPHERAL DEVICES ([[17840383. SYSTEMS AND METHODS FOR MANUFACTURING ADAPTIVE PERIPHERAL DEVICES simplified abstract (Microsoft Technology Licensing, LLC)|17840383]])===
Line 1,072: Line 261:
 
Elizabeth Rose MILLER
 
Elizabeth Rose MILLER
  
 
'''Brief explanation'''
 
The abstract describes a method for modifying an object model using a template page and a rendering engine. The method involves presenting a model of a peripheral to a user, allowing the user to change the UI value through UI inputs, and updating the model and rendering based on the user input. The altered fit component can then be provided to an additive manufacturing device.
 
 
* Method for modifying an object model using a template page and rendering engine
 
* User can interact with the model and change UI values through UI inputs
 
* Model values are updated based on user input, and rendering is updated accordingly
 
* Altered fit component can be provided to an additive manufacturing device
 
 
==Potential Applications==
 
* Customization of peripheral models for additive manufacturing
 
* Designing and modifying objects with specific fit components
 
* Creating personalized products based on user preferences
 
 
==Problems Solved==
 
* Simplifies the process of modifying object models
 
* Allows for easy customization and personalization of products
 
* Streamlines the design process for additive manufacturing
 
 
==Benefits==
 
* Increased efficiency in modifying object models
 
* Enables quick and easy customization of products
 
* Reduces the time and effort required for designing and manufacturing personalized products
 
 
'''Abstract'''
 
A method of modifying an object model includes, defining a template page having a plurality of nodes; obtaining a model of a peripheral, wherein the model includes a fit component and functional component; presenting to a user with a rendering engine of the template page, a rendering of the model in a first node of the plurality of nodes of the template page; presenting to the user, in a second node of the plurality of nodes of the template page, at least one UI input; receiving a user input with the UI input that changes the UI value of the UI input through the second node; changing the model value of the at least one property of at least one fit component in response to the UI value; updating the rendering of the model based on the model value; and providing an altered fit component to an additive manufacturing device.
 
  
 
===SYSTEMS AND METHODS FOR MANUFACTURING ADAPTIVE PERIPHERAL DEVICES ([[17840379. SYSTEMS AND METHODS FOR MANUFACTURING ADAPTIVE PERIPHERAL DEVICES simplified abstract (Microsoft Technology Licensing, LLC)|17840379]])===
 
===SYSTEMS AND METHODS FOR MANUFACTURING ADAPTIVE PERIPHERAL DEVICES ([[17840379. SYSTEMS AND METHODS FOR MANUFACTURING ADAPTIVE PERIPHERAL DEVICES simplified abstract (Microsoft Technology Licensing, LLC)|17840379]])===
Line 1,106: Line 269:
 
Elizabeth Rose MILLER
 
Elizabeth Rose MILLER
  
 
'''Brief explanation'''
 
The abstract describes a method for manufacturing an electronic device peripheral using additive manufacturing technology. The method involves obtaining a model of the peripheral, identifying fit components and functional components, and making changes to fit components based on any modifications to the model. The altered fit components are then provided to an additive manufacturing device.
 
 
* The method involves manufacturing electronic device peripherals using additive manufacturing technology.
 
* A model of the peripheral is obtained, which includes various components.
 
* Fit components and functional components are identified within the model.
 
* Any changes made to the model are used to modify the fit components without altering the functional components.
 
* The altered fit components are then provided to an additive manufacturing device for production.
 
 
== Potential Applications ==
 
* Manufacturing electronic device peripherals using additive manufacturing technology.
 
* Customizing fit components of electronic device peripherals based on specific requirements or modifications.
 
 
== Problems Solved ==
 
* Traditional manufacturing methods may not easily accommodate changes or modifications to fit components without affecting functional components.
 
* Additive manufacturing allows for more flexibility in modifying and producing fit components based on changes to the model.
 
 
== Benefits ==
 
* Enables the production of electronic device peripherals with customized fit components.
 
* Provides a more efficient and flexible manufacturing process.
 
* Reduces the need for extensive rework or redesign when modifications are made to the model.
 
 
'''Abstract'''
 
A method of manufacturing an electronic device peripheral includes obtaining a model of a peripheral, where the model has a plurality of components. The method further includes identifying one or more fit components of the model and identifying one or more functional components. The method includes receiving at least one change to the model and, based at least partially on the at least one change, changing at least one property of a fit component of the one or more fit components without altering a functional component of the plurality of components before providing at least an altered fit component to an additive manufacturing device.
 
  
 
===Techniques for Pretraining Document Language Models for Example-Based Document Classification ([[17836977. Techniques for Pretraining Document Language Models for Example-Based Document Classification simplified abstract (Microsoft Technology Licensing, LLC)|17836977]])===
 
===Techniques for Pretraining Document Language Models for Example-Based Document Classification ([[17836977. Techniques for Pretraining Document Language Models for Example-Based Document Classification simplified abstract (Microsoft Technology Licensing, LLC)|17836977]])===
Line 1,139: Line 277:
 
Guoxin WANG
 
Guoxin WANG
  
 
'''Brief explanation'''
 
The patent application describes a data processing system that trains machine learning models to analyze unlabeled documents. The system receives a set of unlabeled documents associated with specific categories and fine-tunes two machine learning models.
 
 
* The system receives unlabeled documents and categories to train machine learning models.
 
* Two machine learning models are fine-tuned based on the unlabeled documents.
 
* The first model determines a semantic representation of the categories.
 
* The second model classifies the semantic representations according to the categories.
 
* The models are trained using unlabeled training data from different categories.
 
 
==Potential Applications==
 
This technology has potential applications in various fields, including:
 
 
* Document classification: The system can be used to automatically categorize and organize large volumes of documents based on their content.
 
* Information retrieval: The trained models can help improve search engines by accurately understanding and categorizing documents for better search results.
 
* Content recommendation: By analyzing the semantic representations of documents, the system can provide personalized content recommendations to users based on their interests.
 
 
==Problems Solved==
 
The technology addresses several problems in machine learning and document analysis:
 
 
* Unlabeled document analysis: The system enables the training of machine learning models using unlabeled documents, allowing for more efficient and scalable analysis.
 
* Semantic representation: The first model learns to determine a semantic representation of document categories, which enhances the understanding and classification of documents.
 
* Multi-category training: By training the models with unlabeled data from different categories, the system can handle a wide range of document types and improve classification accuracy.
 
 
==Benefits==
 
The technology offers several benefits:
 
 
* Improved document analysis: The fine-tuned machine learning models can accurately analyze and classify unlabeled documents, leading to more efficient and effective document processing.
 
* Scalability: By training the models with unlabeled data, the system can handle large volumes of documents without the need for manual labeling.
 
* Flexibility: The system can be adapted to different domains and document types by training the models with relevant unlabeled data.
 
 
'''Abstract'''
 
A data processing system implements a method for training machine learning modes, including receiving a set of one or more unlabeled documents associated one or more first categories of documents to be used to train machine learning models to analyze the one or more unlabeled documents, and fine-tuning a first machine learning model and a second machine learning model based on the one or more unlabeled document to enable the first machine learning model to determine a semantic representation of the one or more first categories of document, and to enable the second machine learning model to classify the semantic representations according to the one or more first categories of documents, the first machine learning model and the second machine learning model having been trained using first unlabeled training data including a second plurality of categories of documents that do not include the one or more first categories of documents.
 
  
 
===Automatic Speech Recognition Systems and Processes ([[17836390. Automatic Speech Recognition Systems and Processes simplified abstract (Microsoft Technology Licensing, LLC)|17836390]])===
 
===Automatic Speech Recognition Systems and Processes ([[17836390. Automatic Speech Recognition Systems and Processes simplified abstract (Microsoft Technology Licensing, LLC)|17836390]])===
Line 1,180: Line 285:
 
Kshitiz KUMAR
 
Kshitiz KUMAR
  
 
'''Brief explanation'''
 
'''Abstract:'''
 
A data processing system is designed to receive speech data in multiple languages and convert it into letters. The system then applies linguistic rules to normalize the speech data for Latin-based languages, builds a computer model using the normalized data, fine-tunes the model with additional speech data, and finally recognizes words in a target language using the refined model.
 
 
'''Patent/Innovation Explanation:'''
 
* Data processing system for speech data in multiple languages
 
* Converts speech data into letters
 
* Applies linguistic rules to normalize speech data for Latin-based languages
 
* Builds a computer model using normalized speech data
 
* Fine-tunes the computer model with additional speech data
 
* Recognizes words in a target language using the refined computer model
 
 
'''Potential Applications:'''
 
* Speech recognition systems for multilingual environments
 
* Language learning applications
 
* Translation services
 
* Voice-controlled devices and virtual assistants
 
 
'''Problems Solved:'''
 
* Efficiently processing speech data in multiple languages
 
* Normalizing speech data for Latin-based languages using linguistic rules
 
* Building accurate computer models for speech recognition
 
* Improving the recognition of words in a target language
 
 
'''Benefits:'''
 
* Enhanced accuracy and efficiency in speech recognition
 
* Improved language learning experiences
 
* Seamless translation services
 
* More reliable voice-controlled devices and virtual assistants
 
 
'''Abstract'''
 
A data processing system is implemented for receiving speech data for a plurality of languages, and determining letters from the speech data. The data processing system also implements normalizing the speech data by applying linguistic based rules for Latin-based languages on the determined letters, building a computer model using the normalized speech data, fine-tuning the computer model using additional speech data, and recognizing words in a target language using the fine-tuned computer model.
 
  
 
===TRANSFORMER-BASED GRAPH NEURAL NETWORK TRAINED WITH THREE-DIMENSIONAL DISTANCE DATA ([[17806076. TRANSFORMER-BASED GRAPH NEURAL NETWORK TRAINED WITH THREE-DIMENSIONAL DISTANCE DATA simplified abstract (Microsoft Technology Licensing, LLC)|17806076]])===
 
===TRANSFORMER-BASED GRAPH NEURAL NETWORK TRAINED WITH THREE-DIMENSIONAL DISTANCE DATA ([[17806076. TRANSFORMER-BASED GRAPH NEURAL NETWORK TRAINED WITH THREE-DIMENSIONAL DISTANCE DATA simplified abstract (Microsoft Technology Licensing, LLC)|17806076]])===
Line 1,221: Line 293:
 
Shuxin ZHENG
 
Shuxin ZHENG
  
 
'''Brief explanation'''
 
The abstract describes a computing system that uses a transformer-based graph neural network to analyze molecular graphs and predict energy changes in a molecular system. Here are the key points:
 
 
* The system includes a processor that provides a training data set consisting of pre-transformation molecular graphs and corresponding energy parameter values.
 
* The pre-transformation molecular graphs are fully connected networks of normal nodes, connected by edges.
 
* The processor encodes structural information by representing the three-dimensional Euclidean distance along each edge as learnable embeddings.
 
* The training data set is inputted to a transformer-based graph neural network, which is trained to perform inference.
 
* During inference, the processor receives a pre-transformation molecular graph as input, and outputs the predicted post-transformation energy parameter value.
 
 
Potential applications of this technology:
 
 
* Drug discovery: The system can be used to analyze molecular structures and predict energy changes, aiding in the development of new drugs.
 
* Material design: It can be applied to analyze the structural properties of materials and predict their energy changes, assisting in the design of new materials with desired properties.
 
* Chemical reactions: The system can help understand and predict the energy changes that occur during chemical reactions, facilitating reaction optimization and synthesis planning.
 
 
Problems solved by this technology:
 
 
* Complex molecular systems: The system provides a way to analyze and predict energy changes in complex molecular systems, which is challenging using traditional methods.
 
* Efficient analysis: The use of a transformer-based graph neural network allows for efficient analysis of large amounts of molecular data, enabling faster and more accurate predictions.
 
* Structural encoding: The learnable embeddings of the three-dimensional Euclidean distances capture important structural information, improving the accuracy of predictions.
 
 
Benefits of this technology:
 
 
* Improved accuracy: By using a transformer-based graph neural network and structural encoding, the system can provide more accurate predictions of energy changes in molecular systems.
 
* Time and cost savings: The system enables faster analysis of molecular data, reducing the time and cost required for tasks such as drug discovery and material design.
 
* Enhanced understanding: The predictions provided by the system can help researchers gain a deeper understanding of molecular systems and their energy changes, leading to new insights and discoveries.
 
 
'''Abstract'''
 
A computing system is provided, including a processor configured to, during a training phase, provide a training data set including a pre-transformation molecular graph and post-transformation energy parameter value representing an energy change in a molecular system following an energy transformation. The pre-transformation molecular graph includes a plurality of normal nodes fully connected by edges. The processor is configured to encode structural information including a three-dimensional Euclidean distance along an edge connecting a pair of the normal nodes in each molecular graph as learnable embeddings. The processor is configured to input the training data set to a transformer-based graph neural network to train the network to perform an inference at inference time. The processor is further configured to receive inference-time input of the inference-time pre-transformation molecular graph at the trained transformer-based graph neural network, and output the inference-time post-transformation energy parameter value based on the inference-time pre-transformation molecular graph.
 
  
 
===MULTI-DOMAIN JOINT SEMANTIC FRAME PARSING ([[18457708. MULTI-DOMAIN JOINT SEMANTIC FRAME PARSING simplified abstract (Microsoft Technology Licensing, LLC)|18457708]])===
 
===MULTI-DOMAIN JOINT SEMANTIC FRAME PARSING ([[18457708. MULTI-DOMAIN JOINT SEMANTIC FRAME PARSING simplified abstract (Microsoft Technology Licensing, LLC)|18457708]])===
Line 1,259: Line 301:
 
Dilek Z. Hakkani-Tur
 
Dilek Z. Hakkani-Tur
  
 
'''Brief explanation'''
 
The patent application describes a processing unit that can train a joint multi-domain recurrent neural network (JRNN) for spoken language understanding (SLU). This model can perform tasks such as slot filling, intent determination, and domain classification simultaneously.
 
 
* The processing unit can train a model called JRNN, which is a combination of bi-directional recurrent neural network (bRNN) and recurrent neural network with long-short term memory (RNN-LSTM).
 
* The trained model can estimate a complete semantic frame per query, which includes information about intents and slots across multiple domains.
 
* The JRNN model enables multi-task deep learning by leveraging data from multiple domains.
 
 
== Potential Applications ==
 
* Spoken language understanding systems in various domains such as customer service, virtual assistants, and voice-controlled devices.
 
* Natural language processing applications that require understanding user queries and extracting relevant information.
 
 
== Problems Solved ==
 
* Traditional SLU models often focus on a single domain, making it difficult to handle queries that involve multiple domains.
 
* Training separate models for each domain can be time-consuming and resource-intensive.
 
* Existing models may struggle to accurately estimate semantic frames that include intents and slots across multiple domains.
 
 
== Benefits ==
 
* The joint multi-domain model allows for more accurate and efficient processing of user queries involving multiple domains.
 
* Training a single JRNN model reduces the need for separate models for each domain, saving time and resources.
 
* The model leverages the data from multiple domains, enabling better performance and generalization.
 
 
'''Abstract'''
 
A processing unit can train a model as a joint multi-domain recurrent neural network (JRNN), such as a bi-directional recurrent neural network (bRNN) and/or a recurrent neural network with long-short term memory (RNN-LSTM) for spoken language understanding (SLU). The processing unit can use the trained model to, e.g., jointly model slot filling, intent determination, and domain classification. The joint multi-domain model described herein can estimate a complete semantic frame per query, and the joint multi-domain model enables multi-task deep learning leveraging the data from multiple domains. The joint multi-domain recurrent neural (JRNN) can leverage semantic intents (such as, finding or identifying, e.g., a domain specific goal) and slots (such as, dates, times, locations, subjects, etc.) across multiple domains.
 
  
 
===COMBINED TABLE LOOKUP AT QUANTUM COMPUTING DEVICE ([[17806923. COMBINED TABLE LOOKUP AT QUANTUM COMPUTING DEVICE simplified abstract (Microsoft Technology Licensing, LLC)|17806923]])===
 
===COMBINED TABLE LOOKUP AT QUANTUM COMPUTING DEVICE ([[17806923. COMBINED TABLE LOOKUP AT QUANTUM COMPUTING DEVICE simplified abstract (Microsoft Technology Licensing, LLC)|17806923]])===
Line 1,291: Line 309:
 
Mathias SOEKEN
 
Mathias SOEKEN
  
 
'''Brief explanation'''
 
The abstract describes a quantum computing device that includes a table lookup circuit. This circuit can perform table lookup operations on two inputs simultaneously and write the combined output to a register. The output consists of multiple qubits from each table lookup operation.
 
 
* The quantum computing device has a table lookup circuit that can process two inputs at the same time.
 
* The circuit performs table lookup operations on the inputs in parallel.
 
* The combined output of the circuit is stored in a register.
 
* The output includes qubits from both table lookup operations.
 
 
== Potential Applications ==
 
* Quantum database search: The device can be used to search large databases in parallel, providing faster results compared to classical computers.
 
* Machine learning: Quantum machine learning algorithms often involve table lookups, and this device can enhance the speed and efficiency of such algorithms.
 
* Cryptography: Quantum computing has the potential to break traditional cryptographic algorithms, but this device can be used to develop more secure quantum-resistant cryptographic techniques.
 
 
== Problems Solved ==
 
* Parallel processing: The device allows for simultaneous processing of multiple inputs, increasing the speed and efficiency of computations.
 
* Quantum algorithm optimization: By performing table lookup operations in parallel, the device can optimize the execution of quantum algorithms that rely on such operations.
 
 
== Benefits ==
 
* Speed and efficiency: The parallel processing capability of the device enables faster computations and reduces the time required for complex tasks.
 
* Enhanced quantum algorithms: By optimizing table lookup operations, the device can improve the performance of quantum algorithms, leading to more accurate results and better problem-solving capabilities.
 
* Potential for breakthroughs in various fields: The device opens up possibilities for advancements in fields such as database search, machine learning, and cryptography, enabling new discoveries and applications.
 
 
'''Abstract'''
 
A quantum computing device is provided, including a table lookup circuit configured to receive a first table lookup input and a second table lookup input. The table lookup circuit may be further configured to perform a first table lookup operation on the first table lookup input and a second table lookup operation on the second table lookup input in parallel such that a combined table lookup output is written to a combined output register. The combined table lookup output may include a plurality of first table lookup output qubits of the first table lookup operation and a plurality of second table lookup output qubits of the second table lookup operation.
 
  
 
===DOUBLY CONTROLLED iX CIRCUIT ([[17806927. DOUBLY CONTROLLED iX CIRCUIT simplified abstract (Microsoft Technology Licensing, LLC)|17806927]])===
 
===DOUBLY CONTROLLED iX CIRCUIT ([[17806927. DOUBLY CONTROLLED iX CIRCUIT simplified abstract (Microsoft Technology Licensing, LLC)|17806927]])===
Line 1,324: Line 317:
 
Mathias SOEKEN
 
Mathias SOEKEN
  
 
'''Brief explanation'''
 
The abstract describes a quantum computing device that includes a circuit called CCiX, which is capable of performing a specific operation on qubits. Here is a simplified explanation of the abstract:
 
 
* The CCiX circuit prepares magic states in a preparation stage.
 
* It receives input qubit states, including a first control qubit, a second control qubit, and a target qubit.
 
* In an execution stage, the CCiX circuit performs a CCiX operation on the target qubit using local joint measurements.
 
* Some of these local joint measurements are performed between the magic states and auxiliary qubits.
 
* The CCiX operation also involves remote joint measurements of the input qubit states and interface qubits among the auxiliary qubits.
 
 
Potential applications of this technology:
 
 
* Quantum computing: The CCiX circuit can be used in quantum computers to perform complex operations on qubits, which can lead to advancements in various fields such as cryptography, optimization, and simulation.
 
* Error correction: The ability to perform joint measurements and manipulate qubits can help in error correction techniques, improving the reliability and accuracy of quantum computations.
 
 
Problems solved by this technology:
 
 
* Complex operations: The CCiX circuit enables the execution of a specific operation (CCiX) on qubits, which can be challenging to achieve with traditional computing methods.
 
* Quantum state preparation: The circuit can prepare magic states, which are essential for certain quantum algorithms and protocols.
 
 
Benefits of this technology:
 
 
* Enhanced quantum computing capabilities: The CCiX circuit expands the range of operations that can be performed on qubits, increasing the potential power and versatility of quantum computers.
 
* Improved error correction: The ability to perform joint measurements and manipulate qubits can help in detecting and correcting errors, leading to more reliable quantum computations.
 
 
'''Abstract'''
 
A quantum computing device including a doubly controlled iX (CCiX) circuit. The CCiX circuit may be configured to, in a preparation stage, prepare a plurality of magic states. The CCiX circuit may be further configured to receive a plurality of input qubit states including a first control qubit state, a second control qubit state, and a target qubit state. In an execution stage, the CCiX circuit may be further configured to perform a CCiX operation on the target qubit state at least in part by performing a plurality of local joint measurements. At least a subset of the plurality of local joint measurements may be performed between the plurality of magic states and a plurality of auxiliary qubits. Performing the CCiX operation may further include performing a plurality of remote joint measurements of the input qubit states and a plurality of interface qubits included among the plurality of auxiliary qubits.
 
  
 
===Generation and Explanation of Transformer Computation Graph Using Graph Attention Model ([[17840169. Generation and Explanation of Transformer Computation Graph Using Graph Attention Model simplified abstract (Microsoft Technology Licensing, LLC)|17840169]])===
 
===Generation and Explanation of Transformer Computation Graph Using Graph Attention Model ([[17840169. Generation and Explanation of Transformer Computation Graph Using Graph Attention Model simplified abstract (Microsoft Technology Licensing, LLC)|17840169]])===
Line 1,359: Line 325:
 
Leo Moreno BETTHAUSER
 
Leo Moreno BETTHAUSER
  
 
'''Brief explanation'''
 
The patent application describes a data processing system that analyzes attention matrices generated by a pretrained machine learning model with self-attention layers. The system then creates a computation graph based on these matrices to understand the behavior of the model across its layers. This computation graph is further analyzed by a second machine learning model trained to provide information about the behavior of the first model, specifically identifying which layers performed specific tasks related to generating predictions.
 
 
* Obtaining attention matrices from a pretrained machine learning model with self-attention layers.
 
* Analyzing the attention matrices to create a computation graph representing the behavior of the model across its layers.
 
* Using a second machine learning model to analyze the computation graph and provide information about the behavior of the first model.
 
* The second model identifies which layers of the first model performed specific tasks associated with generating predictions.
 
 
== Potential Applications ==
 
* Improving the interpretability and understanding of complex machine learning models.
 
* Enhancing model debugging and troubleshooting processes.
 
* Assisting in model optimization and performance improvement.
 
* Enabling better model explainability and transparency.
 
 
== Problems Solved ==
 
* Lack of transparency and interpretability in complex machine learning models.
 
* Difficulty in understanding the behavior and decision-making process of pretrained models.
 
* Challenges in identifying specific layers responsible for certain tasks within a model.
 
 
== Benefits ==
 
* Provides insights into the behavior of pretrained machine learning models.
 
* Facilitates model debugging and optimization.
 
* Enhances model explainability and transparency.
 
* Enables better understanding of the decision-making process within a model.
 
 
'''Abstract'''
 
A data processing system implements obtaining attention matrices from a first machine learning model that is pretrained and includes a plurality of self-attention layers. The data processing system further implements analyzing the attention matrices to generate a computation graph based on the attention matrices. The computation graph provides a representation of behavior of the first machine learning model across the plurality of self-attention layers. The data processing system is further implements analyzing the computation graph using a second machine learning model. The second machine learning model is trained to receive the computation graph to output model behavior information. The model behavior information identifying which layers of model performed specific tasks associated with generating predictions by the first machine learning model.
 
  
 
===MEETING LOCATION RECOMMENDATION SYSTEM ([[17836857. MEETING LOCATION RECOMMENDATION SYSTEM simplified abstract (Microsoft Technology Licensing, LLC)|17836857]])===
 
===MEETING LOCATION RECOMMENDATION SYSTEM ([[17836857. MEETING LOCATION RECOMMENDATION SYSTEM simplified abstract (Microsoft Technology Licensing, LLC)|17836857]])===
Line 1,395: Line 333:
 
Satish CHANDRA
 
Satish CHANDRA
  
 
'''Brief explanation'''
 
The patent application describes systems and methods for recommending meeting schedules. Here are the key points:
 
 
* The technology identifies different subgroups of meeting attendees and provides recommendations for meeting locations and times for each subgroup.
 
* It takes into account the meeting context to determine the subgroups, recommended locations, and recommended times.
 
* The system can handle complex scheduling scenarios involving multiple subgroups and meeting contexts.
 
 
Potential applications of this technology:
 
 
* Business meetings: The system can help optimize scheduling for large meetings with different teams or departments.
 
* Conference planning: It can assist in organizing conferences with multiple tracks and sessions, ensuring attendees can easily navigate the schedule.
 
* Event management: The technology can be used to schedule meetings and sessions at events, such as trade shows or conventions.
 
 
Problems solved by this technology:
 
 
* Time-consuming scheduling: The system automates the process of finding suitable meeting times and locations, saving time for organizers.
 
* Conflicting schedules: By considering subgroups and meeting contexts, the technology helps avoid scheduling conflicts among attendees.
 
* Efficient resource utilization: The system optimizes the use of meeting spaces by recommending appropriate locations for each subgroup.
 
 
Benefits of this technology:
 
 
* Improved productivity: Meeting scheduling becomes more efficient, allowing participants to focus on the content rather than logistics.
 
* Enhanced collaboration: By accommodating different subgroups and contexts, the system promotes effective collaboration among attendees.
 
* Cost savings: Optimal utilization of meeting spaces reduces the need for additional venues or resources.
 
 
'''Abstract'''
 
The systems and methods provide recommendations for scheduling meetings. The methods and systems identify different subgroups of meeting attendees for a meeting and provide recommendations for the meeting locations and meeting times for each subgroup. The methods and systems also identify a meeting context for the meeting and use the meeting context to identify the subgroups of meeting attendees, the recommended meeting locations for each subgroup, or the recommended meeting times for each subgroup.
 
  
 
===Monitoring Carbon Emissions of Computing Processes Running on a Container Orchestration Platform ([[17839541. Monitoring Carbon Emissions of Computing Processes Running on a Container Orchestration Platform simplified abstract (Microsoft Technology Licensing, LLC)|17839541]])===
 
===Monitoring Carbon Emissions of Computing Processes Running on a Container Orchestration Platform ([[17839541. Monitoring Carbon Emissions of Computing Processes Running on a Container Orchestration Platform simplified abstract (Microsoft Technology Licensing, LLC)|17839541]])===
Line 1,431: Line 341:
 
Vaughan Shields KNIGHT
 
Vaughan Shields KNIGHT
  
 
'''Brief explanation'''
 
The patent application describes a computing system that measures the amount of carbon emitted during the execution of application processes and uses this information to modify how the processes are run. Here are the key points:
 
 
* The computing system deploys application processes in containers on worker nodes of a cluster in a container orchestration platform.
 
* An agent (e.g., a daemon) is deployed on all worker nodes, including the specific node where the application process is running.
 
* The agent has privileges to measure the energy consumed by the application process within the node.
 
* The energy measurement, along with carbon intensity information, is used to calculate the amount of carbon emitted by the application process.
 
 
Potential Applications:
 
 
* Environmental monitoring and management in data centers and cloud computing environments.
 
* Optimization of application processes to reduce carbon emissions and improve energy efficiency.
 
* Carbon footprint tracking and reporting for organizations.
 
 
Problems Solved:
 
 
* Lack of visibility into the carbon emissions associated with individual application processes.
 
* Inefficient use of energy in running application processes.
 
* Difficulty in tracking and managing carbon footprints in computing environments.
 
 
Benefits:
 
 
* Enables organizations to measure and manage the environmental impact of their computing operations.
 
* Provides insights for optimizing application processes to reduce carbon emissions.
 
* Facilitates tracking and reporting of carbon footprints for compliance and sustainability purposes.
 
 
'''Abstract'''
 
A computing system measures an amount of carbon that is emitted as a consequence of the execution of individual application processes of an operation. The computing system can then leverage these measurements to modify how the application processes are run. In operation, the computing system deploys an application process in a container of a particular worker node of a cluster in a container orchestration platform. The technology further deploys an agent (e.g., a daemon) on all of the worker nodes of the cluster, including the particular worker node. The agent includes an energy-managing mechanism that is given privileges to measure the amount of energy consumed by the application process within the particular node. The computing system can use this energy measure, together with applicable carbon intensity information, to compute the amount of carbon emitted by the application process.
 
  
 
===GRAPHICAL ToF PHASE UNWRAPPING ([[18452309. GRAPHICAL ToF PHASE UNWRAPPING simplified abstract (Microsoft Technology Licensing, LLC)|18452309]])===
 
===GRAPHICAL ToF PHASE UNWRAPPING ([[18452309. GRAPHICAL ToF PHASE UNWRAPPING simplified abstract (Microsoft Technology Licensing, LLC)|18452309]])===
Line 1,468: Line 349:
 
Sergio ORTIZ EGEA
 
Sergio ORTIZ EGEA
  
 
'''Brief explanation'''
 
The patent application describes a computing system that uses a depth sensor to measure phase values of pixels. It then processes these measurements to determine the distance value for each pixel.
 
 
* The computing system includes a depth sensor with multiple pixels and a storage machine with executable instructions.
 
* For each pixel, the system makes multiple phase measurements to form a set of noisy phase measurements.
 
* It determines the location where a projection line, passing through the set of noisy phase measurements in a phase space, intersects a lower dimensional plane.
 
* The projection line is parallel to a noise-free phase evolution line.
 
* The system compares this location to a predetermined matrix of points in the lower dimensional plane.
 
* It locates a corresponding set of noiseless phase orders by referencing a look-up table using a selected set of independent terms.
 
* Based on the corresponding set of noiseless phase orders, the system determines a distance value for the pixel.
 
* Finally, it outputs the distance value for each pixel.
 
 
== Potential Applications ==
 
* 3D scanning and modeling
 
* Augmented reality
 
* Gesture recognition
 
* Robotics and autonomous navigation
 
 
== Problems Solved ==
 
* Accurate depth measurement in noisy environments
 
* Efficient processing of depth data
 
* Reduction of noise and errors in depth sensing
 
 
== Benefits ==
 
* Improved accuracy in depth measurement
 
* Robust performance in noisy conditions
 
* Real-time processing capabilities
 
* Versatile applications in various industries
 
 
'''Abstract'''
 
One example provides a computing system comprising a depth sensor comprising a plurality of pixels, and a storage machine holding instructions executable by a logic machine to, for each pixel, make K phase measurements to form a set of noisy phase measurements, determine a location at which a projection line that passes through the set of noisy phase measurements in a K-dimensional phase space passes through a lower dimensional plane, the projection line being parallel to a noise free phase evolution line, compare the location to a plurality of independent terms of a predetermined matrix of points in the lower dimensional plane, locate a corresponding set of noiseless phase orders by using a selected set of independent terms to reference a look-up table, determine a distance value for the pixel based upon the corresponding set of noiseless phase orders, and output the distance value for the pixel.
 
  
 
===SCALABLE KNOWLEDGE DISTILLATION TECHNIQUES FOR MACHINE LEARNING ([[17837636. SCALABLE KNOWLEDGE DISTILLATION TECHNIQUES FOR MACHINE LEARNING simplified abstract (Microsoft Technology Licensing, LLC)|17837636]])===
 
===SCALABLE KNOWLEDGE DISTILLATION TECHNIQUES FOR MACHINE LEARNING ([[17837636. SCALABLE KNOWLEDGE DISTILLATION TECHNIQUES FOR MACHINE LEARNING simplified abstract (Microsoft Technology Licensing, LLC)|17837636]])===
Line 1,508: Line 357:
 
Adit KRISHNAN
 
Adit KRISHNAN
  
 
'''Brief explanation'''
 
The abstract describes a data processing system that implements a dynamic knowledge distillation process. Here is a simplified explanation of the abstract:
 
 
* The data processing system divides training data into multiple batches of samples.
 
* It uses an iterative knowledge distillation process to distill a student model from a teacher model.
 
* The system instantiates both the teacher model and the student model in its memory.
 
* It retrieves a batch of training data from the memory.
 
* The system trains both the teacher and student models using each sample in the batch.
 
* It evaluates the performance of the student model compared to the teacher model.
 
* Based on the performance, the system provides feedback to the student model to adjust its behavior.
 
 
Potential Applications:
 
 
* Education: This technology can be applied in educational settings to improve the learning process by distilling knowledge from experienced teachers to students.
 
* Machine Learning: The knowledge distillation process can be used to transfer knowledge from complex and computationally expensive models to simpler and more efficient models.
 
* Artificial Intelligence: The system can be used to improve the performance of AI models by leveraging the knowledge of more advanced models.
 
 
Problems Solved:
 
 
* Knowledge Transfer: The technology solves the problem of transferring knowledge from a teacher model to a student model, allowing for more efficient learning and improved performance.
 
* Model Optimization: By distilling knowledge from a teacher model, the system helps optimize the student model, making it more accurate and efficient.
 
 
Benefits:
 
 
* Improved Learning: The dynamic knowledge distillation process enhances the learning experience by transferring knowledge from a teacher model to a student model.
 
* Computational Efficiency: By distilling knowledge from a teacher model, the system helps create more efficient student models that require less computational resources.
 
* Performance Enhancement: The iterative knowledge distillation process helps improve the performance of the student model by adjusting its behavior based on feedback from the teacher model.
 
 
'''Abstract'''
 
A data processing system implements a dynamic knowledge distillation process including dividing training data into a plurality of batches of samples and distilling a student model from a teacher model using an iterative knowledge distillation. The process includes instantiating an instance of the teacher model and the student model in a memory of the data processing system and obtaining a respective batch of training data from the plurality of batches of samples in the memory. The process includes training the teacher and student models using each of the samples in the respective batch of the training data, evaluating the performance of the student model compared with the performance of the teacher model, and providing feedback to student model to adjust the behavior of the student model based on the performance of the student model.
 
  
 
===COMPUTERIZED INTELLIGENT ASSISTANT FOR CONFERENCES ([[18197595. COMPUTERIZED INTELLIGENT ASSISTANT FOR CONFERENCES simplified abstract (Microsoft Technology Licensing, LLC)|18197595]])===
 
===COMPUTERIZED INTELLIGENT ASSISTANT FOR CONFERENCES ([[18197595. COMPUTERIZED INTELLIGENT ASSISTANT FOR CONFERENCES simplified abstract (Microsoft Technology Licensing, LLC)|18197595]])===
Line 1,547: Line 365:
 
Adi DIAMANT
 
Adi DIAMANT
  
 
'''Brief explanation'''
 
The patent application describes a method for facilitating remote conferences by using various machines to process digital video and audio signals. Here are the key points:
 
 
* The method involves receiving a digital video and a computer-readable audio signal.
 
* A face recognition machine is used to identify the face of a first conference participant in the video.
 
* A speech recognition machine is used to convert the audio signal into text.
 
* An attribution machine attributes the text to the first conference participant.
 
* The same process is repeated for a second conference participant, resulting in a second text.
 
* A transcription machine automatically creates a transcript that includes the attributed texts of both participants.
 
 
Potential applications of this technology:
 
 
* Remote conferencing platforms can use this method to automatically transcribe and attribute speech in real-time.
 
* It can be used in video conferencing tools to provide accurate and reliable transcripts of meetings.
 
* Educational platforms can utilize this method to automatically generate transcripts of online lectures or discussions.
 
 
Problems solved by this technology:
 
 
* Manual transcription of conference calls or meetings can be time-consuming and prone to errors.
 
* It eliminates the need for participants to take detailed notes during a conference, as the transcript is automatically generated.
 
* Language barriers can be overcome by using speech recognition to translate audio into text.
 
 
Benefits of this technology:
 
 
* Saves time and effort by automating the transcription process.
 
* Provides accurate and reliable transcripts of conference calls or meetings.
 
* Enhances accessibility by providing text-based records of audio content.
 
* Facilitates communication and collaboration in remote settings.
 
 
'''Abstract'''
 
A method for facilitating a remote conference includes receiving a digital video and a computer-readable audio signal. A face recognition machine is operated to recognize a face of a first conference participant in the digital video, and a speech recognition machine is operated to translate the computer-readable audio signal into a first text. An attribution machine attributes the text to the first conference participant. A second computer-readable audio signal is processed similarly, to obtain a second text attributed to a second conference participant. A transcription machine automatically creates a transcript including the first text attributed to the first conference participant and the second text attributed to the second conference participant.
 
  
 
===MEMORY ARRAYS EMPLOYING FLYING BIT LINES TO INCREASE EFFECTIVE BIT LINE LENGTH FOR SUPPORTING HIGHER PERFORMANCE, INCREASED MEMORY DENSITY, AND RELATED METHODS ([[17836634. MEMORY ARRAYS EMPLOYING FLYING BIT LINES TO INCREASE EFFECTIVE BIT LINE LENGTH FOR SUPPORTING HIGHER PERFORMANCE, INCREASED MEMORY DENSITY, AND RELATED METHODS simplified abstract (Microsoft Technology Licensing, LLC)|17836634]])===
 
===MEMORY ARRAYS EMPLOYING FLYING BIT LINES TO INCREASE EFFECTIVE BIT LINE LENGTH FOR SUPPORTING HIGHER PERFORMANCE, INCREASED MEMORY DENSITY, AND RELATED METHODS ([[17836634. MEMORY ARRAYS EMPLOYING FLYING BIT LINES TO INCREASE EFFECTIVE BIT LINE LENGTH FOR SUPPORTING HIGHER PERFORMANCE, INCREASED MEMORY DENSITY, AND RELATED METHODS simplified abstract (Microsoft Technology Licensing, LLC)|17836634]])===
Line 1,587: Line 373:
 
Pramod KOLAR
 
Pramod KOLAR
  
 
'''Brief explanation'''
 
The patent application describes memory arrays that use flying bit lines to increase the effective bit line length, resulting in higher performance and increased memory density. Here are the key points:
 
 
* The memory array includes a first memory sub-bank and one or more second memory sub-banks.
 
* The first memory sub-bank has a first bit line for each memory column circuit.
 
* To avoid extending the length of the first bit lines to reach the second memory cells in the second sub-bank, each sub-bank has its own dedicated first and second bit lines.
 
* The second bit lines "fly" independently of the first bit lines, allowing them to access the memory cells in the second sub-bank without extending the length of the first bit lines.
 
* This design eliminates the need to extend the first bit lines, simplifying the memory array structure and increasing memory density.
 
 
Potential applications of this technology:
 
 
* Memory devices in computers, smartphones, and other electronic devices.
 
* High-performance computing systems.
 
* Data centers and cloud computing infrastructure.
 
 
Problems solved by this technology:
 
 
* Limited memory density due to the need to extend bit lines.
 
* Performance limitations caused by longer bit lines.
 
* Complex and costly memory array structures.
 
 
Benefits of this technology:
 
 
* Increased memory density, allowing for more data storage in the same physical space.
 
* Improved memory performance and access speed.
 
* Simplified memory array structure, reducing manufacturing complexity and cost.
 
 
'''Abstract'''
 
Memory arrays employing flying bit lines to increase effective bit line length for supporting higher performance, increased memory density, and related methods. To increase memory density, the memory array has a first memory sub-bank and one or more second memory sub-banks. The first memory sub-bank includes a first bit line(s) for each of its memory column circuits. To avoid the need to extend the length of the first bit lines to be coupled to the second memory bit cells in the second memory sub-bank, each memory sub-bank has its own dedicated first and second bit lines coupling their respective memory bit cells to access circuitry. The second bit lines effectively “fly” independent of the first bit lines of the first memory sub-bank. The first bit lines of the first memory sub-bank do not have to be extended in length to provide bit lines for the second memory sub-bank.
 
  
 
===TRANSFORMER-BASED GRAPH NEURAL NETWORK TRAINED WITH STRUCTURAL INFORMATION ENCODING ([[17806075. TRANSFORMER-BASED GRAPH NEURAL NETWORK TRAINED WITH STRUCTURAL INFORMATION ENCODING simplified abstract (Microsoft Technology Licensing, LLC)|17806075]])===
 
===TRANSFORMER-BASED GRAPH NEURAL NETWORK TRAINED WITH STRUCTURAL INFORMATION ENCODING ([[17806075. TRANSFORMER-BASED GRAPH NEURAL NETWORK TRAINED WITH STRUCTURAL INFORMATION ENCODING simplified abstract (Microsoft Technology Licensing, LLC)|17806075]])===
Line 1,625: Line 381:
 
Shuxin ZHENG
 
Shuxin ZHENG
  
 
'''Brief explanation'''
 
The abstract describes a computing system that uses a processor to train a model for predicting energy changes in molecular systems. The system provides a training data set that includes pre-transformation molecular graphs and corresponding energy parameter values. The pre-transformation graphs consist of normal nodes connected by edges representing distances and bonds between the nodes.
 
 
The processor is configured to encode structural information in the pre-transformation graphs as learnable embeddings. This structural information describes the relative positions of the atoms represented by the normal nodes. It includes an edge encoding that represents the type of bond between pairs of normal nodes and a spatial encoding that represents the shortest path distance along the edges between pairs of normal nodes.
 
 
* The computing system trains a model to predict energy changes in molecular systems.
 
* The training data set includes pre-transformation molecular graphs and energy parameter values.
 
* The pre-transformation graphs consist of normal nodes connected by edges representing distances and bonds.
 
* Structural information in the graphs is encoded as learnable embeddings.
 
* The structural information includes edge encoding and spatial encoding.
 
* The edge encoding represents the type of bond between pairs of normal nodes.
 
* The spatial encoding represents the shortest path distance between pairs of normal nodes.
 
 
==Potential Applications==
 
* Predicting energy changes in molecular systems.
 
* Drug discovery and development.
 
* Chemical reaction optimization.
 
* Material design and optimization.
 
 
==Problems Solved==
 
* Accurate prediction of energy changes in molecular systems.
 
* Efficient encoding of structural information in molecular graphs.
 
* Improved understanding of the relative positions of atoms in a molecular system.
 
 
==Benefits==
 
* More accurate predictions of energy changes in molecular systems.
 
* Faster and more efficient training of models.
 
* Improved understanding of molecular structures and properties.
 
* Potential for advancements in drug discovery, material design, and chemical reaction optimization.
 
 
'''Abstract'''
 
A computing system is provided, including a processor configured to, during a training phase, provide a training data set, including a pre-transformation molecular graph and post-transformation energy parameter value representing an energy change in a molecular system following an energy transformation. The pre-transformation graph includes a plurality of normal nodes connected by edges representing a distance and a bond between a pair of the normal nodes. The processor is further configured to encode structural information in each pre-transformation molecular graph as learnable embeddings, the structural information describing the relative positions of the atoms represented by the normal nodes. The structural information includes an edge encoding representing a type of bond between a pair of normal nodes in each pre-transformation molecular graph, and a spatial encoding representing a shortest path distance along the edges between a pair of normal nodes in each pre-transformation molecular graph.
 
  
 
===RETROSYNTHESIS AND PROXY CHEMICALS FOR LIFE-CYCLE ASSESSMENT ([[17804551. RETROSYNTHESIS AND PROXY CHEMICALS FOR LIFE-CYCLE ASSESSMENT simplified abstract (Microsoft Technology Licensing, LLC)|17804551]])===
 
===RETROSYNTHESIS AND PROXY CHEMICALS FOR LIFE-CYCLE ASSESSMENT ([[17804551. RETROSYNTHESIS AND PROXY CHEMICALS FOR LIFE-CYCLE ASSESSMENT simplified abstract (Microsoft Technology Licensing, LLC)|17804551]])===
Line 1,666: Line 389:
 
Jake Allen SMITH
 
Jake Allen SMITH
  
 
'''Brief explanation'''
 
The patent application describes a computing system that can assist in conducting life cycle assessments (LCAs) for chemical products. It uses a trained model to select proxy chemicals when the primary chemical's structure is not available in a life-cycle inventory (LCI). The system then incorporates the proxy chemical's LCI data into the estimated LCI for the LCA.
 
 
* The computing system includes a processor and memory with executable instructions.
 
* It receives a chemical structure input and retrieves retrosynthetic step data based on the input.
 
* It identifies the primary chemical used as a starting material in a retrosynthetic step.
 
* If the primary chemical's structure is not available in the LCI, the system uses a trained proxy chemical selection model.
 
* The model selects a proxy chemical for which an LCI is available.
 
* The system obtains the proxy chemical's LCI data and includes it in the estimated LCI for the LCA.
 
 
== Potential Applications ==
 
* Conducting life cycle assessments (LCAs) for chemical products.
 
* Assisting in the selection of proxy chemicals when primary chemical data is unavailable.
 
 
== Problems Solved ==
 
* Lack of primary chemical data in life-cycle inventories (LCIs) for conducting accurate LCAs.
 
* Difficulty in selecting appropriate proxy chemicals for estimating LCIs.
 
 
== Benefits ==
 
* Enables more comprehensive and accurate LCAs by incorporating proxy chemical data.
 
* Improves the efficiency of conducting LCAs by automating the selection of proxy chemicals.
 
* Facilitates the assessment of environmental impacts of chemical products.
 
 
'''Abstract'''
 
A computing system is provided. The computing system comprises a processor, and memory comprising instructions executable by the processor to receive a chemical structure input, obtain retrosynthetic step data based on the chemical structure input, determine a chemical structure of a primary chemical in the retrosynthetic step data, the primary chemical being a chemical used as a starting material in a retrosynthetic step, when the structure of the primary chemical is not available in a life-cycle inventory (LCI), input the primary chemical into a trained proxy chemical selection model to select a proxy chemical for which an LCI is available, and obtain proxy chemical LCI data to include in an estimated LCI for a life cycle assessment (LCA).
 
  
 
===PARALLELIZED DECODING OF VARIABLE-LENGTH PREFIX CODES ([[18034832. PARALLELIZED DECODING OF VARIABLE-LENGTH PREFIX CODES simplified abstract (Microsoft Technology Licensing, LLC)|18034832]])===
 
===PARALLELIZED DECODING OF VARIABLE-LENGTH PREFIX CODES ([[18034832. PARALLELIZED DECODING OF VARIABLE-LENGTH PREFIX CODES simplified abstract (Microsoft Technology Licensing, LLC)|18034832]])===
Line 1,700: Line 397:
 
Daniel LO
 
Daniel LO
  
 
'''Brief explanation'''
 
The patent application describes methods and systems for decoding variable-length codes in a parallel process. Here are the key points:
 
 
* Variable-length code words are divided into fixed length words.
 
* Multiple sets of decoder circuits work in parallel, each receiving a current fixed length word and a prior fixed length word.
 
* Each decoder circuit has a fixed leftover bit-count and generates an output that includes a decoded symbol and a new leftover bit-count.
 
* The output of each decoder circuit is determined based on the current fixed length word, the prior fixed length word, and the fixed leftover bit-count.
 
* Selected decoder circuit outputs are generated based on a set of first leftover bit-counts.
 
* A final output is selected from each set of selected decoder circuit outputs based on a second prior leftover bit-count.
 
 
Potential applications of this technology:
 
 
* Data compression: Variable-length codes are commonly used in data compression algorithms, and this technology can improve the efficiency and speed of decoding these codes.
 
* Communication systems: Variable-length codes are used in various communication protocols, and this technology can enhance the decoding process in these systems.
 
* Image and video processing: Variable-length codes are often used in image and video compression techniques, and this technology can optimize the decoding of these codes.
 
 
Problems solved by this technology:
 
 
* Efficient decoding: Variable-length codes can be challenging to decode due to their variable lengths, and this technology provides a parallel process that improves the speed and efficiency of decoding.
 
* Error correction: The use of multiple decoder circuits and the selection of the final output based on prior leftover bit-counts can help in error correction and improve the accuracy of decoding.
 
 
Benefits of this technology:
 
 
* Faster decoding: By dividing the variable-length codes into fixed length words and using parallel decoder circuits, the decoding process can be significantly accelerated.
 
* Improved efficiency: The selection of decoder circuit outputs based on leftover bit-counts allows for more accurate decoding and reduces the need for additional processing steps.
 
* Enhanced error correction: The use of multiple decoder circuits and the selection of the final output based on prior leftover bit-counts can help in error correction and improve the overall reliability of the decoding process.
 
 
'''Abstract'''
 
Methods and systems are provided for decoding variable-length codes in a parallel process. A stream of variable-length code words is divided into fixed length words. A plurality of parallel sets of decoder circuits each receive, in parallel, a current fixed length word and a prior fixed length word. Each decoder circuit has a respective fixed leftover bit-count. Each decoder circuit generates a respective output that may include a decoded symbol and a new leftover bit-count. Each respective output is determined based on the respective current fixed length word, the respective prior fixed length word, and the respective fixed leftover bit-count. A set of selected decoder circuit outputs is generated for each set of the parallel sets of decoder circuits based on a set of first leftover bit-counts. One output from each set of selected decoder circuit outputs is selected as a final output based on a second prior leftover bit-count.
 
  
 
===PACKET CAPTURE USING VXLAN ENCAPSULATION ([[18181481. PACKET CAPTURE USING VXLAN ENCAPSULATION simplified abstract (Microsoft Technology Licensing, LLC)|18181481]])===
 
===PACKET CAPTURE USING VXLAN ENCAPSULATION ([[18181481. PACKET CAPTURE USING VXLAN ENCAPSULATION simplified abstract (Microsoft Technology Licensing, LLC)|18181481]])===
Line 1,738: Line 405:
 
Darshil Jashvant KHETANI
 
Darshil Jashvant KHETANI
  
 
'''Brief explanation'''
 
Techniques are disclosed for capturing network traffic in a computing environment with multiple devices. A data capture definition is used to specify the network element of interest and the data traffic to be captured. The network element selectively identifies the packets to be captured, which are then encapsulated within a VXLAN session and sent to a storage service.
 
 
* The patent describes a method for capturing network traffic in a computing environment with multiple devices.
 
* A data capture definition is used to specify the network element of interest and the data traffic to be captured.
 
* The network element selectively identifies the packets to be captured.
 
* The identified packets are encapsulated within a VXLAN session.
 
* The encapsulated packets are then sent to a storage service for further analysis.
 
 
== Potential Applications ==
 
* Network monitoring and troubleshooting in complex computing environments.
 
* Security analysis and threat detection in network traffic.
 
* Performance optimization and analysis of network communication.
 
 
== Problems Solved ==
 
* Efficiently capturing and analyzing network traffic in a computing environment with multiple devices.
 
* Selectively capturing specific data packets of interest for analysis.
 
* Encapsulating captured packets for easy transmission and storage.
 
 
== Benefits ==
 
* Improved network monitoring and troubleshooting capabilities.
 
* Enhanced security analysis and threat detection in network traffic.
 
* More efficient performance optimization and analysis of network communication.
 
* Simplified storage and transmission of captured network packets.
 
 
'''Abstract'''
 
Techniques are disclosed for capturing network traffic in a computing environment comprising a plurality of computing devices. A data capture definition defines a network element of interest and data traffic that is to be captured for the network element. The network element to selectively identifies the data packets to be captured. The identified packets are encapsulated within a VXLAN session and sent to a storage service.
 
  
 
===CONVERTING LINKS AND STATIC DATA INTO COLLABORATIVE USER EXPERIENCES ([[18237822. CONVERTING LINKS AND STATIC DATA INTO COLLABORATIVE USER EXPERIENCES simplified abstract (Microsoft Technology Licensing, LLC)|18237822]])===
 
===CONVERTING LINKS AND STATIC DATA INTO COLLABORATIVE USER EXPERIENCES ([[18237822. CONVERTING LINKS AND STATIC DATA INTO COLLABORATIVE USER EXPERIENCES simplified abstract (Microsoft Technology Licensing, LLC)|18237822]])===
Line 1,774: Line 413:
 
Leeviana Peng GRAY
 
Leeviana Peng GRAY
  
 
'''Brief explanation'''
 
The abstract describes a messaging application that allows users to collaborate in real-time without the need for multiple messages or navigating away from the application.
 
 
* The messaging application enables users to collaborate on links or data within a message.
 
* It provides a collaborative user experience (UX) within the message interface.
 
* Users can collaborate in real-time with the sender and other recipients without exchanging additional messages.
 
* The application eliminates the need to navigate away from the messaging app to view linked content.
 
 
==Potential Applications==
 
* Business communication and collaboration
 
* Team collaboration on projects
 
* Educational collaboration and discussions
 
* Remote work collaboration
 
 
==Problems Solved==
 
* Difficulty in determining consensus or summarizing collaboration in traditional messaging applications
 
* Cumbersome exchange of multiple messages on a topic
 
* Need to navigate away from the messaging app to view linked content
 
 
==Benefits==
 
* Real-time collaboration within the messaging application
 
* Simplified and streamlined collaboration process
 
* Improved efficiency in communication and decision-making
 
* Enhanced user experience with the ability to collaborate without leaving the app
 
 
'''Abstract'''
 
Traditional messaging applications (such as email, social networking platforms, text, instant messaging, chat, etc.) are ill-equipped for collaboration. For instance, a sender and recipients corresponding regarding a topic are often required to exchange multiple messages. As a result, determining a consensus regarding the topic or summarizing the collaboration is difficult and cumbersome. Moreover, when links are included in messages, recipients are required to navigate away from the messaging application to view the linked content. A messaging application is provided that may be configured to enable users to dynamically collaborate regarding links or data within a sent message or a receive message. In aspects, a collaborative user experience (UX) is provided, which may be an interface within a message that enables real-time collaboration between a sender and one or more recipients regarding message content —without exchanging additional messages or navigating away from the messaging application.
 
  
 
===FORK AND RETURN POINT SELECTION FOR SIDEBAR COMMUNICATION THREADS ([[17836586. FORK AND RETURN POINT SELECTION FOR SIDEBAR COMMUNICATION THREADS simplified abstract (Microsoft Technology Licensing, LLC)|17836586]])===
 
===FORK AND RETURN POINT SELECTION FOR SIDEBAR COMMUNICATION THREADS ([[17836586. FORK AND RETURN POINT SELECTION FOR SIDEBAR COMMUNICATION THREADS simplified abstract (Microsoft Technology Licensing, LLC)|17836586]])===
Line 1,810: Line 421:
 
Amer Aref Hassan
 
Amer Aref Hassan
  
 
'''Brief explanation'''
 
The patent application describes methods and systems for creating sidebar communication threads related to a main thread. These sidebar threads include messages from the main thread and discussions about a proposed message for the main thread. Once the sidebar thread reaches a termination condition, the proposed message may become an accepted message for the main thread or be rejected. Users can select a fork point and a return point from the main thread.
 
 
* Sidebar communication threads can be created from a main thread.
 
* Messages in the sidebar thread include a history of the main thread and discussions about a proposed message.
 
* Once the sidebar thread ends, the proposed message may become an accepted message for the main thread or be rejected.
 
* Users can select a fork point and a return point from the main thread.
 
 
== Potential Applications ==
 
* Collaborative discussions and decision-making in online forums or messaging platforms.
 
* Enhancing communication and organization in project management tools.
 
* Facilitating group discussions and brainstorming sessions in virtual meetings.
 
 
== Problems Solved ==
 
* Streamlining and organizing discussions related to a main thread.
 
* Allowing for parallel conversations and discussions without cluttering the main thread.
 
* Providing a structured way to propose and discuss potential messages for the main thread.
 
 
== Benefits ==
 
* Improved organization and clarity in threaded discussions.
 
* Increased efficiency in decision-making processes.
 
* Enhanced collaboration and engagement in online communication platforms.
 
 
'''Abstract'''
 
Disclosed in some examples are methods, systems, devices, and machine-readable mediums which provide for sidebar communication threads forked from, or related to, a principal thread. Messages in the sidebar communication thread may include a history of the principal thread, including one or more messages from the principal thread, and may include a proposed principal thread message that is the subject of the sidebar thread discussion. The sidebar thread may also include sidebar thread messages that carries the conversation of the sidebar thread participants. Once a termination condition is reached for the sidebar thread, the sidebar thread terminates and either the proposed principal thread message (as potentially modified by participants of the sidebar thread) becomes an accepted principal thread message and it is posted to the principal thread as if it was sent by the sidebar initiator or no message is posted (e.g., the proposed principal thread message is rejected). In some examples, users may select a fork point and a return point from the principal thread.
 
  
 
===SIDEBAR COMMUNICATION THREADS WITHIN PRE-EXISTING THREADS ([[17836745. SIDEBAR COMMUNICATION THREADS WITHIN PRE-EXISTING THREADS simplified abstract (Microsoft Technology Licensing, LLC)|17836745]])===
 
===SIDEBAR COMMUNICATION THREADS WITHIN PRE-EXISTING THREADS ([[17836745. SIDEBAR COMMUNICATION THREADS WITHIN PRE-EXISTING THREADS simplified abstract (Microsoft Technology Licensing, LLC)|17836745]])===
Line 1,844: Line 429:
 
Amer Aref HASSAN
 
Amer Aref HASSAN
  
 
'''Brief explanation'''
 
The patent application describes methods and systems for creating sidebar communication threads related to a main thread. These sidebar threads include messages from the main thread and discussions about a proposed message for the main thread. Once the sidebar thread reaches a termination condition, the proposed message may become an accepted message for the main thread or be rejected.
 
 
* Sidebar communication threads are created from a main thread.
 
* Messages in the sidebar thread include a history of the main thread and discussions about a proposed message.
 
* Sidebar thread messages carry the conversation of the sidebar participants.
 
* When the sidebar thread reaches a termination condition, the proposed message may become an accepted message for the main thread or be rejected.
 
* The sidebar thread can take place within a second, similar thread.
 
 
== Potential Applications ==
 
* Online discussion platforms
 
* Collaborative document editing tools
 
* Project management software
 
 
== Problems Solved ==
 
* Facilitates focused discussions on specific topics within a larger conversation
 
* Allows for parallel discussions without cluttering the main thread
 
* Provides a structured way to propose and evaluate messages for the main thread
 
 
== Benefits ==
 
* Improved organization and clarity in online discussions
 
* Efficient collaboration and decision-making process
 
* Enables better management of complex conversations
 
 
'''Abstract'''
 
Disclosed in some examples are methods, systems, devices, and machine-readable mediums which provide for sidebar communication threads forked from, or related to, a principal thread. Messages in the sidebar communication thread may include a history of the principal thread, including one or more messages from the principal thread, and may include a proposed principal thread message that is the subject of the sidebar thread discussion. The sidebar thread may also include sidebar thread messages that carries the conversation of the sidebar thread participants. Once a termination condition is reached for the sidebar thread, the sidebar thread terminates and either the proposed principal thread message (as potentially modified by participants of the sidebar thread) becomes an accepted principal thread message and it is posted to the principal thread as if it was sent by the sidebar initiator or no message is posted (e.g., the proposed principal thread message is rejected). In some examples, the sidebar thread may take place within a second, similar thread.
 
  
 
===DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION ([[17840035. DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION simplified abstract (Microsoft Technology Licensing, LLC)|17840035]])===
 
===DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION ([[17840035. DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION simplified abstract (Microsoft Technology Licensing, LLC)|17840035]])===
Line 1,879: Line 437:
 
Riley Joseph MCKENNA
 
Riley Joseph MCKENNA
  
 
'''Brief explanation'''
 
The abstract describes a method for identifying and resolving hardware vulnerabilities in a distributed manner. Here is a simplified explanation of the abstract:
 
 
* The method starts by conducting an inventory of devices on a network.
 
* A queue of scanning jobs is generated for each device in the inventory to discover possible ways that the network can be accessed through each device.
 
* Devices that are to be blocked based on an expected configuration are scanned to identify devices of interest.
 
* A new job is queued for a deep scan of each device of interest, which searches a greater portion and in greater detail of the device compared to prior scanning.
 
* The results of the deep scan are passed to an incident manager, which opens an incident ticket for each device of interest.
 
 
Potential applications of this technology:
 
 
* Network security: The method can be used to identify and resolve hardware vulnerabilities in a network, enhancing overall security.
 
* Incident management: The incident tickets generated can be used to track and resolve identified vulnerabilities efficiently.
 
 
Problems solved by this technology:
 
 
* Efficient vulnerability identification: The method automates the process of scanning devices on a network and deep scanning devices of interest, allowing for the efficient identification of hardware vulnerabilities.
 
* Distributed approach: By distributing the scanning and resolution process, the method can handle large networks and ensure comprehensive coverage.
 
 
Benefits of this technology:
 
 
* Enhanced network security: By identifying and resolving hardware vulnerabilities, the method improves the overall security of a network.
 
* Time and resource efficiency: The method automates the scanning process and focuses on devices of interest, saving time and resources compared to manual scanning.
 
* Scalability: The distributed approach allows the method to scale and handle networks of various sizes.
 
 
'''Abstract'''
 
Various embodiments herein include distributed hardware vulnerability identification and resolution. One method embodiment includes conducting an inventory of devices on a network and generating a queue of scanning jobs for each inventoried device to discover possible modes of network entry via each device. The method then proceeds by scanning devices on the network that are to be blocked according to a stored representation of an expected configuration of each device to identify devices of interest and queuing a new job for a deep scan of each device of interest. Each deep scan is executed to search one or both of a greater portion and in greater detail of a device of interest than prior scanning. The method then passes deep scan results to an incident manager to open an incident ticket for each device of interest.
 
  
 
===MACHINE LEARNING APPROACH FOR SOLVING THE COLD START PROBLEM IN STATEFUL MODELS ([[17806889. MACHINE LEARNING APPROACH FOR SOLVING THE COLD START PROBLEM IN STATEFUL MODELS simplified abstract (Microsoft Technology Licensing, LLC)|17806889]])===
 
===MACHINE LEARNING APPROACH FOR SOLVING THE COLD START PROBLEM IN STATEFUL MODELS ([[17806889. MACHINE LEARNING APPROACH FOR SOLVING THE COLD START PROBLEM IN STATEFUL MODELS simplified abstract (Microsoft Technology Licensing, LLC)|17806889]])===
Line 1,915: Line 445:
 
Andrey Karpovsky
 
Andrey Karpovsky
  
 
'''Brief explanation'''
 
The patent application describes a computing system that generates an initial profile based on user input and extracts features from received datasets to determine if their behavioral patterns are anomalous. The system includes both first and second machine-learning models trained on subsets of the received datasets.
 
 
* The computing system generates an initial profile based on user input.
 
* The initial profile specifies expected behavioral patterns of received datasets.
 
* Features indicative of behavioral patterns are extracted from the received datasets.
 
* The initial profile is provided to first machine-learning models.
 
* The first machine-learning models determine if the received datasets have anomalous behavioral patterns.
 
* The system also includes second machine-learning models trained on subsets of the received datasets.
 
* The second machine-learning models train a second profile based on the extracted features.
 
* The second profile specifies the behavioral patterns learned by the second machine-learning models.
 
 
== Potential Applications ==
 
This technology can have various applications in fields such as:
 
 
* Cybersecurity: Detecting anomalous patterns in network traffic or user behavior.
 
* Fraud detection: Identifying unusual patterns in financial transactions.
 
* Predictive maintenance: Monitoring equipment behavior to detect potential failures.
 
* Quality control: Identifying deviations in manufacturing processes.
 
 
== Problems Solved ==
 
The technology addresses the following problems:
 
 
* Identifying anomalous patterns in large datasets can be time-consuming and challenging for humans.
 
* Traditional rule-based systems may not capture all possible anomalies.
 
* Training machine-learning models on subsets of datasets allows for more accurate anomaly detection.
 
* The system provides a way to continuously learn and update behavioral patterns based on new data.
 
 
== Benefits ==
 
The technology offers several benefits:
 
 
* Improved accuracy in detecting anomalous patterns in datasets.
 
* Reduction in false positives and false negatives compared to traditional methods.
 
* Ability to adapt and learn from new data to improve anomaly detection over time.
 
* Automation of the process, saving time and resources for manual analysis.
 
 
'''Abstract'''
 
A computing system generates from received user input an initial profile. The initial profile specifies expected behavioral patterns of datasets that are to be received by the computing system. The computing system extracts from received datasets features that are indicative of behavioral patterns of the received datasets. The computing system provides the initial profile to first machine-learning models. The first machine-learning models have been trained using a subset of the received datasets. The first machine-learning models use the initial profile to determine if the behavioral patterns of the received datasets are anomalous. The computing system includes second machine-learning models that have been trained using a subset of the received datasets. The second machine-learning models train a second profile based on the extracted features to specify behavioral patterns of the received datasets that are learned by the second machine-learning model.
 
  
 
===SECURITY INCIDENT DETECTION BASED ON HISTORIAN CONFIGURATION DATA COLLECTED OVER TIME ([[17835552. SECURITY INCIDENT DETECTION BASED ON HISTORIAN CONFIGURATION DATA COLLECTED OVER TIME simplified abstract (Microsoft Technology Licensing, LLC)|17835552]])===
 
===SECURITY INCIDENT DETECTION BASED ON HISTORIAN CONFIGURATION DATA COLLECTED OVER TIME ([[17835552. SECURITY INCIDENT DETECTION BASED ON HISTORIAN CONFIGURATION DATA COLLECTED OVER TIME simplified abstract (Microsoft Technology Licensing, LLC)|17835552]])===
Line 1,962: Line 453:
 
Arun Ramadasan MANNENGAL
 
Arun Ramadasan MANNENGAL
  
 
'''Brief explanation'''
 
The patent application describes a method for detecting security incidents based on the configuration data of a computing device. Here are the key points:
 
 
* The historic configuration data of a computing device is continuously updated whenever there is a change in its configuration.
 
* This historic configuration data represents the changes made to the device's configurations over a period of time.
 
* By analyzing the updated historic configuration data, it is possible to determine if there has been a change in the relationship between the computing device and an entity in the computer system.
 
* The updated historic configuration data is then fed into a machine learning model that is trained to identify security incidents.
 
* If the machine learning model detects a security incident based on the updated historic configuration data, a security alert is generated.
 
 
Potential applications of this technology:
 
 
* Enhancing the security of computer systems by detecting and responding to security incidents in real-time.
 
* Improving incident response and investigation processes by providing detailed information about the changes in device configurations.
 
 
Problems solved by this technology:
 
 
* Traditional security incident detection methods may not be able to detect subtle changes in device configurations that could indicate a security incident.
 
* Manual analysis of configuration data can be time-consuming and prone to human error.
 
 
Benefits of this technology:
 
 
* Enables proactive detection of security incidents by analyzing the historic configuration data of computing devices.
 
* Reduces the time and effort required for incident response and investigation by automating the analysis process.
 
* Provides a more accurate and reliable method for identifying security incidents based on machine learning algorithms.
 
 
'''Abstract'''
 
Security incident detection based on historian configuration data collected over time is described. Historic configuration data associated with a computing device is updated based on received configuration data indicative of a change in configuration of the computing device in a computer system. The historic configuration data indicates changes to configurations of the computing device over a time period. A determination that relationship between the computing device and an entity of the computer system has changed is made based on the updated historic configuration data. The updated historic configuration data is provided as input to a machine learning (ML) model configured to generate an indication of whether the updated historic configuration data evidences a security incident. In response to the ML model generating an indication that the updated historic configuration data evidences a security incident, a security alert indicative of the evidenced security incident is generated.
 
  
 
===DYNAMIC CONTROL OF THE DELIVERY OF NOTIFICATIONS CAPABLE OF INVOKING EVENT RECORDINGS ([[17840560. DYNAMIC CONTROL OF THE DELIVERY OF NOTIFICATIONS CAPABLE OF INVOKING EVENT RECORDINGS simplified abstract (Microsoft Technology Licensing, LLC)|17840560]])===
 
===DYNAMIC CONTROL OF THE DELIVERY OF NOTIFICATIONS CAPABLE OF INVOKING EVENT RECORDINGS ([[17840560. DYNAMIC CONTROL OF THE DELIVERY OF NOTIFICATIONS CAPABLE OF INVOKING EVENT RECORDINGS simplified abstract (Microsoft Technology Licensing, LLC)|17840560]])===
Line 1,998: Line 461:
 
Hitesh RATHI
 
Hitesh RATHI
  
 
'''Brief explanation'''
 
The patent application describes a system that can send notifications to absent users based on participant activity in a meeting. The system can also provide customizable policies for receiving notifications and allow users to decline notifications and record the meeting. Users can invoke a recording without joining the meeting.
 
 
* The system monitors meeting activity to identify when to send notifications to absent users.
 
* Notifications can be triggered by specific participant activity, such as someone joining the meeting or a critical mass of participants joining.
 
* Absent users can receive reminders and have the option to decline the notification and record the meeting.
 
* Customizable policies allow users to receive notifications based on specific scenarios or conditions.
 
* Users can initiate a recording without joining the meeting, reducing interruptions.
 
 
== Potential Applications ==
 
* Remote collaboration tools
 
* Virtual meetings and conferences
 
* Online education platforms
 
* Team communication and coordination systems
 
 
== Problems Solved ==
 
* Ensures absent users are aware of important meeting activity and can stay informed.
 
* Reduces interruptions caused by absent users joining a meeting to record it.
 
* Allows users to receive notifications only when relevant conditions are met, improving communication efficiency.
 
 
== Benefits ==
 
* Improved communication and collaboration among remote participants.
 
* Increased productivity by reducing interruptions and unnecessary meeting attendance.
 
* Customizable policies provide flexibility and control over notifications.
 
* Simplifies the process of recording meetings without joining them.
 
 
'''Abstract'''
 
Disclosed systems have dynamic control of notifications capable of invoking actions. A system monitors activity of a meeting to identify participant activity that causes a notification to be sent to an absent user. When participant activity meets one or more criteria, e.g., a person joining a meeting, a critical mass joining a meeting, the system delivers a reminder to one or more absent users. The notification can cause a display of a user-selectable option that allows the absent user to decline the notification and record the meeting. The system can provide customizable policies that allow users to receive notifications, e.g., conditional notifications, when specific scenarios are detected. This way, a person may only receive notifications when contextually relevant conditions are detected. This makes a computer more effective in how information is communicated to users. Users can also invoke a recording without the need to join a meeting and cause interruptions.
 
  
 
===ENCRYPTION OF PROXY SESSION ACTIVITY DATA USING USER-PROVIDED ENCRYPTION KEYS ([[18335073. ENCRYPTION OF PROXY SESSION ACTIVITY DATA USING USER-PROVIDED ENCRYPTION KEYS simplified abstract (Microsoft Technology Licensing, LLC)|18335073]])===
 
===ENCRYPTION OF PROXY SESSION ACTIVITY DATA USING USER-PROVIDED ENCRYPTION KEYS ([[18335073. ENCRYPTION OF PROXY SESSION ACTIVITY DATA USING USER-PROVIDED ENCRYPTION KEYS simplified abstract (Microsoft Technology Licensing, LLC)|18335073]])===
Line 2,035: Line 469:
 
Itamar AZULAY
 
Itamar AZULAY
  
 
'''Brief explanation'''
 
==Abstract==
 
The patent application describes an apparatus that can obtain an encryption key from a user and use it to encrypt session activity data during a proxy session. The encrypted data is then stored for further use.
 
 
==Patent/Innovation Explanation==
 
* An apparatus is described that includes a processor and memory.
 
* Machine-readable instructions are stored in the memory.
 
* When executed by the processor, these instructions allow the processor to obtain an encryption key from a user.
 
* The processor can identify session activity data during a proxy session of the user.
 
* The identified session activity data is encrypted using the encryption key obtained from the user.
 
* The encrypted session activity data is then stored for future use.
 
 
==Potential Applications==
 
* Secure communication: This technology can be used to encrypt and store session activity data during proxy sessions, ensuring the security and privacy of communication.
 
* Data analysis: The encrypted session activity data can be stored and later analyzed for various purposes, such as identifying patterns or trends in user behavior.
 
 
==Problems Solved==
 
* Data security: By encrypting session activity data, this technology helps protect sensitive information from unauthorized access.
 
* Privacy protection: Storing encrypted session activity data ensures that user activities remain private and cannot be easily accessed or analyzed without proper decryption.
 
 
==Benefits==
 
* Enhanced security: Encryption of session activity data adds an extra layer of security, making it difficult for unauthorized individuals to access or understand the data.
 
* Privacy preservation: By storing encrypted session activity data, user privacy is protected, as the data cannot be easily deciphered or linked back to specific individuals.
 
 
'''Abstract'''
 
According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to obtain an encryption key from a user. The processor may identify session activity data during a proxy session of the user and may encrypt the identified session activity data using the encryption key obtained from the user. The processor may store the encrypted session activity data.
 
  
 
===CUSTOMIZATION OF A USER INTERFACE DISPLAYING A RENDERING OF MULTIPLE PARTICIPANTS OF A HYBRID COMMUNICATION SESSION ([[17835918. CUSTOMIZATION OF A USER INTERFACE DISPLAYING A RENDERING OF MULTIPLE PARTICIPANTS OF A HYBRID COMMUNICATION SESSION simplified abstract (Microsoft Technology Licensing, LLC)|17835918]])===
 
===CUSTOMIZATION OF A USER INTERFACE DISPLAYING A RENDERING OF MULTIPLE PARTICIPANTS OF A HYBRID COMMUNICATION SESSION ([[17835918. CUSTOMIZATION OF A USER INTERFACE DISPLAYING A RENDERING OF MULTIPLE PARTICIPANTS OF A HYBRID COMMUNICATION SESSION simplified abstract (Microsoft Technology Licensing, LLC)|17835918]])===
Line 2,070: Line 477:
 
Amer Aref HASSAN
 
Amer Aref HASSAN
  
 
'''Brief explanation'''
 
The patent application describes systems for customizing user interfaces that display images of multiple participants in a communication session. Here are the key points:
 
 
* The system allows users to select specific attendees from a video stream that includes multiple participants.
 
* In response to the selection, the system generates new video streams or images for each selected attendee by extracting their images from the conference room camera's video stream.
 
* The system then displays these additional renderings alongside the original video stream of the conference room camera.
 
* This allows viewers to control the display of details for each person that may not be visible in the initial group image.
 
 
== Potential Applications ==
 
This technology has potential applications in various fields, including:
 
 
* Video conferencing: Users can customize their view by focusing on specific participants during a conference call.
 
* Remote collaboration: Team members can have a more personalized view of each other during virtual meetings.
 
* Education: Teachers can highlight specific students or participants during online classes or webinars.
 
* Security: Surveillance systems can provide customized views of individuals in crowded areas for better identification.
 
 
== Problems Solved ==
 
The system addresses the following problems:
 
 
* Limited visibility: In a group video, it can be challenging to observe details of each participant. This technology allows users to focus on specific individuals for a better view.
 
* Personalization: By allowing users to customize their view, the system enhances the user experience and provides more control over the displayed content.
 
 
== Benefits ==
 
The benefits of this technology include:
 
 
* Improved communication: Users can focus on specific participants, leading to better engagement and understanding during communication sessions.
 
* Enhanced collaboration: Customized views enable participants to have a more personalized and immersive experience during remote collaboration.
 
* Increased security: By providing better visibility of individuals in crowded areas, the system can aid in identifying potential threats or suspicious activities.
 
 
'''Abstract'''
 
Systems for customizing user interfaces displaying an image of multiple participants of a communication session are disclosed. A system allows a user to make one or more selections of attendees from a video stream that includes multiple attendees, such as video captured by a conference room camera. In response to the selection, the system generates new video streams or images for each of the selected attendee(s) by extracting images of the selected attendee(s) from the video stream of the conference room camera. The system displays additional renderings for the new video streams or images to accompany the rendering of the video stream of the conference room camera. By allowing users to generate additional renderings of people from images that are initially displayed in a group video, the system can allow viewers to control the display of details of each person that may not be observable from the initial group image.
 
  
 
===SPAD ARRAY FOR INTENSITY IMAGE CAPTURE AND TIME OF FLIGHT CAPTURE ([[18454587. SPAD ARRAY FOR INTENSITY IMAGE CAPTURE AND TIME OF FLIGHT CAPTURE simplified abstract (Microsoft Technology Licensing, LLC)|18454587]])===
 
===SPAD ARRAY FOR INTENSITY IMAGE CAPTURE AND TIME OF FLIGHT CAPTURE ([[18454587. SPAD ARRAY FOR INTENSITY IMAGE CAPTURE AND TIME OF FLIGHT CAPTURE simplified abstract (Microsoft Technology Licensing, LLC)|18454587]])===
Line 2,110: Line 485:
 
Raymond Kirk PRICE
 
Raymond Kirk PRICE
  
 
'''Brief explanation'''
 
The abstract describes a system that facilitates capturing intensity images and time-of-flight (TOF) images. The system includes an image sensor array with multiple pixels, processors, and storage devices. The system is configured to perform interleaved intensity image capture and TOF capture operations using the image sensor array.
 
 
* The system enables capturing both intensity images and TOF images.
 
* It uses an image sensor array with multiple pixels.
 
* The system includes processors and storage devices to facilitate the capture operations.
 
* The system performs interleaved intensity image capture and TOF capture operations.
 
* The instructions stored in the hardware storage devices configure the system for the capture operations.
 
 
== Potential Applications ==
 
* 3D imaging and mapping
 
* Augmented reality and virtual reality
 
* Gesture recognition and tracking
 
* Robotics and autonomous navigation
 
* Biometric identification and authentication
 
 
== Problems Solved ==
 
* Simultaneous capture of intensity images and TOF images
 
* Efficient utilization of the image sensor array
 
* Interleaved capture operations for improved performance
 
* Configurable system for different capture requirements
 
 
== Benefits ==
 
* Enhanced depth perception and spatial understanding
 
* Accurate distance measurements and object tracking
 
* Real-time image capture and processing
 
* Versatile system adaptable to various applications
 
* Improved efficiency and performance in capturing both intensity and TOF images.
 
 
'''Abstract'''
 
A system for facilitating intensity image capture and time of flight capture. The system includes an image sensor array comprising a plurality of image sensor pixels, one or more processors, and one or more hardware storage devices storing instructions that are executable by the one or more processors to configure the system to facilitate intensity image capture and time of flight capture by configuring the system to perform interleaved intensity image capture and time of flight capture operations using the image sensor array.
 
  
 
===SYSTEMS AND METHODS FOR RESTRICTING VIDEO CONTENT ([[17839271. SYSTEMS AND METHODS FOR RESTRICTING VIDEO CONTENT simplified abstract (Microsoft Technology Licensing, LLC)|17839271]])===
 
===SYSTEMS AND METHODS FOR RESTRICTING VIDEO CONTENT ([[17839271. SYSTEMS AND METHODS FOR RESTRICTING VIDEO CONTENT simplified abstract (Microsoft Technology Licensing, LLC)|17839271]])===
Line 2,150: Line 493:
 
Prabhakaran SETHURAMAN
 
Prabhakaran SETHURAMAN
  
 
'''Brief explanation'''
 
The patent application describes methods and systems for restricting video content based on audience groups. Here is a simplified explanation of the abstract:
 
 
* The invention provides a way to restrict certain portions of a video during playback for specific audience groups.
 
* An interface is used to display a recommended preview of the video portion that can be restricted.
 
* Users can indicate whether they want to restrict the video portion for specific audience groups through the interface.
 
* The indication is stored and used to enforce the restriction during playback for the specified audience groups.
 
 
Potential Applications:
 
 
* Video streaming platforms can use this technology to allow content creators to restrict certain parts of their videos for different audience groups, such as age-restricted content.
 
* Educational platforms can utilize this technology to restrict sensitive or inappropriate video content from being viewed by students.
 
* Parental control applications can benefit from this technology to restrict certain video content from being accessed by children.
 
 
Problems Solved:
 
 
* This technology solves the problem of efficiently restricting video content for specific audience groups without the need for manual editing or separate versions of the video.
 
* It provides a streamlined way for content creators to manage and enforce restrictions on their videos.
 
* Users can easily indicate their preferences for restricting video content, ensuring a personalized viewing experience.
 
 
Benefits:
 
 
* Content creators have more control over who can access certain parts of their videos, allowing them to comply with regulations or cater to specific audience needs.
 
* Users can have a safer and more tailored viewing experience, as they can choose to restrict content that may be inappropriate or sensitive for certain audience groups.
 
* The technology simplifies the process of managing and enforcing video content restrictions, saving time and effort for both content creators and viewers.
 
 
'''Abstract'''
 
Methods, systems are computer program products are provided for restricting video content including displaying, via an interface, an output of a portion of a video that is recommended for preview to facilitate restricting of the portion of the video during playback for one or more audience groups, receiving, via the interface and for a user profile, an indication of whether to restrict the portion of the video during playback for the one or more audience groups, and storing the indication for use in restricting the portion of the video during playback for the one or more audience groups.
 
  
 
===SHARED WINDOW FOR COMPUTING DEVICE CAMERA LENSES AND PHOTOFLASH ([[17837560. SHARED WINDOW FOR COMPUTING DEVICE CAMERA LENSES AND PHOTOFLASH simplified abstract (Microsoft Technology Licensing, LLC)|17837560]])===
 
===SHARED WINDOW FOR COMPUTING DEVICE CAMERA LENSES AND PHOTOFLASH ([[17837560. SHARED WINDOW FOR COMPUTING DEVICE CAMERA LENSES AND PHOTOFLASH simplified abstract (Microsoft Technology Licensing, LLC)|17837560]])===
Line 2,187: Line 501:
 
Eeva Liisa Lehtola
 
Eeva Liisa Lehtola
  
 
'''Brief explanation'''
 
The patent application describes a technology for mobile computing devices that have a digital camera module with separate photoflash LEDs and digital cameras.
 
* The photoflash LEDs are physically separated from the digital cameras and sensors by an optical barrier.
 
* A flat translucent window is typically used to cover the digital cameras, but it is not shared with the photoflash LEDs.
 
* This separation can create gaps that allow moisture and particles to enter the device.
 
* The technology introduces a shared flat translucent window that covers both the digital cameras and the photoflash LEDs.
 
* The window has features that provide enough optical separation between the LEDs and the nearby cameras.
 
 
Potential applications of this technology:
 
* Mobile phones and tablets with digital cameras and photoflash capabilities.
 
* Other mobile computing devices with camera modules.
 
 
Problems solved by this technology:
 
* Visual and tactile separation efforts are eliminated, providing a more seamless design.
 
* Gaps that can allow moisture and particles to enter the device are eliminated.
 
 
Benefits of this technology:
 
* Improved aesthetics with a single flat translucent window covering both the cameras and LEDs.
 
* Reduced risk of moisture and particle entry, improving the durability and longevity of the device.
 
 
'''Abstract'''
 
Mobile computing devices often incorporate a digital camera module to capture photographs and/or record video using one or more built-in digital cameras and photoflash LEDs. The photoflash LEDs are separated from the digital cameras and sensors within the digital camera module to provide an optical barrier therebetween. To aid the physical separation, a flat translucent window over the digital cameras is typically not shared with the photoflash LEDs. Such separation efforts are visually and tactilely evident to a user and introduce gaps that can be a source of moisture and/or particulate entry into the computing device. The presently disclosed technology introduces a common flat translucent window over the digital camera and photoflash LEDs within the digital camera module. Features adopted into the shared flat translucent window provide sufficient optical separation between the photoflash LEDs and the nearby cameras within the digital camera module.
 
  
 
===DEVICE COMMUNICATION OVER TELEVISION WHITE SPACE ([[18457317. DEVICE COMMUNICATION OVER TELEVISION WHITE SPACE simplified abstract (Microsoft Technology Licensing, LLC)|18457317]])===
 
===DEVICE COMMUNICATION OVER TELEVISION WHITE SPACE ([[18457317. DEVICE COMMUNICATION OVER TELEVISION WHITE SPACE simplified abstract (Microsoft Technology Licensing, LLC)|18457317]])===
Line 2,218: Line 509:
 
Heping SHI
 
Heping SHI
  
 
'''Brief explanation'''
 
The patent application describes a multi-narrowband transceiver that enables communication within the television white space (TVWS) frequency spectrum using a log periodic filter. The filter consists of multiple filter elements, each with a filter frequency that increases periodically in the same factor (K). These filters are designed to filter out second harmonics within a specific frequency range. The disclosure determines the appropriate TVWS channel for communication and switches to the corresponding filter element. This allows for narrowband communication over the TVWS channel.
 
 
* The patent application describes a multi-narrowband transceiver for communication within the TVWS frequency spectrum.
 
* The transceiver uses a log periodic filter with multiple filter elements.
 
* Each filter element has a filter frequency that increases periodically in the same factor (K).
 
* The filters are designed to filter out second harmonics within a defined frequency range.
 
* The transceiver determines the TVWS channel for communication and switches to the corresponding filter element.
 
* Data can be transmitted and received over the TVWS channel using the selected filter element.
 
* This technology enables narrowband communication over the TVWS channel.
 
 
== Potential Applications ==
 
This technology has potential applications in various fields, including:
 
 
* Wireless communication systems
 
* Internet of Things (IoT) devices
 
* Rural broadband connectivity
 
* Smart grid systems
 
* Wireless sensor networks
 
 
== Problems Solved ==
 
This technology solves several problems related to communication within the TVWS frequency spectrum, including:
 
 
* Efficient utilization of TVWS spectrum
 
* Filtering out unwanted second harmonics
 
* Enabling narrowband communication in TVWS channels
 
* Adapting to different TVWS channels
 
 
== Benefits ==
 
The benefits of this technology include:
 
 
* Improved utilization of TVWS spectrum
 
* Enhanced communication efficiency
 
* Increased capacity for wireless communication systems
 
* Expanded coverage for IoT devices
 
* Cost-effective solution for rural broadband connectivity
 
 
'''Abstract'''
 
The disclosure described herein configures a multi-narrowband transceiver for communication within the television white space (TVWS) frequency spectrum using a log periodic filter, wherein the log periodic filter comprises a plurality of filter elements each having a filter frequency increasing periodically in a same frequency increasing factor (K). Each filter of the plurality of filter elements is configured to filter out second harmonics in a defined frequency range. The disclosure determines a TVWS channel for the communication and switches to a filter element of the plurality of filter elements corresponding to the determined TVWS channel. Data is transmitted and/or received over the TVWS channel using the filter element, thereby allowing narrowband communication over the TVWS channel.
 
  
 
===FACILITATING COLLECTION OF EVENTS DETECTED BY RADIO ACCESS NETWORK COMPONENTS ([[17749081. FACILITATING COLLECTION OF EVENTS DETECTED BY RADIO ACCESS NETWORK COMPONENTS simplified abstract (Microsoft Technology Licensing, LLC)|17749081]])===
 
===FACILITATING COLLECTION OF EVENTS DETECTED BY RADIO ACCESS NETWORK COMPONENTS ([[17749081. FACILITATING COLLECTION OF EVENTS DETECTED BY RADIO ACCESS NETWORK COMPONENTS simplified abstract (Microsoft Technology Licensing, LLC)|17749081]])===
Line 2,266: Line 517:
 
Bhushan Mangesh KANEKAR
 
Bhushan Mangesh KANEKAR
  
 
'''Brief explanation'''
 
The present disclosure is about systems, methods, and computer-readable media for collecting operational data across multiple radio access network (RAN) components. These systems can identify data signals tracked by RAN components and define network events to be tracked by event tracking agents deployed on each RAN component. The RAN components then provide event instances to the systems for collecting, analyzing, and utilizing the network event data.
 
 
* The technology collects operational data from multiple radio access network components.
 
* It identifies data signals tracked by these components.
 
* It defines network events to be tracked by event tracking agents on each component.
 
* The RAN components provide event instances to the systems for analysis and utilization.
 
 
==Potential Applications==
 
This technology has potential applications in various industries and sectors, including:
 
 
* Telecommunications: It can be used to monitor and analyze network events in a radio access network, helping optimize network performance and troubleshoot issues.
 
* Internet of Things (IoT): The technology can collect operational data from IoT devices connected to a radio access network, enabling monitoring and analysis of device behavior and network performance.
 
* Smart Cities: By collecting operational data from various RAN components in a city's infrastructure, the technology can help monitor and manage different systems, such as traffic lights, surveillance cameras, and environmental sensors.
 
 
==Problems Solved==
 
This technology addresses several problems in the field of radio access networks:
 
 
* Lack of comprehensive operational data: By collecting data from multiple RAN components, the technology provides a more complete picture of network performance and behavior.
 
* Inefficient troubleshooting: The system's ability to track network events and collect event instances allows for more efficient troubleshooting and issue resolution.
 
* Limited visibility into IoT device behavior: By collecting operational data from IoT devices, the technology enables better monitoring and analysis of device behavior, leading to improved performance and reliability.
 
 
==Benefits==
 
The use of this technology offers several benefits:
 
 
* Improved network performance: By analyzing network event data, operators can identify and address performance issues, leading to a more efficient and reliable network.
 
* Enhanced troubleshooting: The ability to collect and analyze event instances allows for quicker identification and resolution of network issues.
 
* Better IoT device management: By monitoring and analyzing operational data from IoT devices, operators can optimize device performance and ensure reliable connectivity.
 
 
'''Abstract'''
 
The present disclosure relates to systems, methods, and computer-readable media for collecting operational data across a plurality of radio access network (RAN) components. For example, the systems described herein can identify data signals that are tracked by one or more RAN components. Based on these data signals, the systems can define any number of network events that may be tracked by event tracking agents that are deployed on each of the RAN component(s). The RAN components may then provide a stream of event instances to the systems for collecting, analyzing, and otherwise utilizing the network event data that is locally tracked by the respective RAN components.
 
  
 
===HINGED DEVICE ([[17840317. HINGED DEVICE simplified abstract (Microsoft Technology Licensing, LLC)|17840317]])===
 
===HINGED DEVICE ([[17840317. HINGED DEVICE simplified abstract (Microsoft Technology Licensing, LLC)|17840317]])===
Line 2,306: Line 525:
 
Daniel C. PARK
 
Daniel C. PARK
  
 
'''Brief explanation'''
 
The abstract describes a patent application for hinged computing devices, specifically a device with two portions that are connected by a hinge assembly. The hinge assembly allows for rotation of each portion using hinge guide pins and guide tracks.
 
 
* The patent application is for hinged computing devices.
 
* The device consists of two portions with displays.
 
* The portions are connected by a hinge assembly.
 
* The hinge assembly allows for rotation of each portion.
 
* Rotation is achieved using hinge guide pins and guide tracks.
 
 
==Potential Applications==
 
* Laptops with a hinged design for improved portability and flexibility.
 
* Tablets with a hinged design for better multitasking and productivity.
 
* Convertible devices that can switch between laptop and tablet modes.
 
 
==Problems Solved==
 
* Provides a solution for creating hinged computing devices with multiple displays.
 
* Enables easy rotation and adjustment of the device for different viewing angles.
 
* Improves the overall usability and versatility of the device.
 
 
==Benefits==
 
* Enhanced portability and flexibility for users.
 
* Improved multitasking capabilities with multiple displays.
 
* Increased productivity and efficiency with adjustable viewing angles.
 
* Enables seamless transition between different modes (e.g., laptop and tablet).
 
 
'''Abstract'''
 
The description relates to hinged devices, such as hinged computing devices. One example can include a first portion having a first display and a second portion having a second display and a hinge assembly rotatably securing the first and second portions. The hinge assembly can define rotation of the first portion by a first pair of hinge guide pins riding in a first guide track and rotation of the second portion by a second pair of hinge guide pins riding in a second guide track.
 
  
 
===DEVICES, SYSTEMS, AND METHODS FOR LOCKING A SERVER IN A RACK ([[17840355. DEVICES, SYSTEMS, AND METHODS FOR LOCKING A SERVER IN A RACK simplified abstract (Microsoft Technology Licensing, LLC)|17840355]])===
 
===DEVICES, SYSTEMS, AND METHODS FOR LOCKING A SERVER IN A RACK ([[17840355. DEVICES, SYSTEMS, AND METHODS FOR LOCKING A SERVER IN A RACK simplified abstract (Microsoft Technology Licensing, LLC)|17840355]])===
Line 2,342: Line 533:
 
Rick Chun Kit CHEUNG
 
Rick Chun Kit CHEUNG
  
 
'''Brief explanation'''
 
The abstract describes a rack security system that includes a locking mechanism connected to a server. The locking mechanism is designed to lock onto the busbar of a rack, preventing the removal of the server when locked and allowing for removal when unlocked.
 
 
* The locking mechanism is connected to a server and can be locked onto the busbar of a rack.
 
* When locked, the locking mechanism prevents the server from being removed from the rack.
 
* When unlocked, the server can be easily removed from the rack.
 
 
== Potential Applications ==
 
* Data centers and server rooms where physical security of servers is crucial.
 
* Any environment where unauthorized access to servers needs to be prevented.
 
 
== Problems Solved ==
 
* Unauthorized removal or tampering of servers from racks.
 
* Ensuring physical security of servers in data centers or server rooms.
 
 
== Benefits ==
 
* Enhanced security by preventing unauthorized access to servers.
 
* Easy removal and replacement of servers when needed.
 
* Simplified management of server racks.
 
 
'''Abstract'''
 
A rack security system includes a locking mechanism connected to a server. The locking mechanism is configured to lock onto the busbar of a rack. When the locking mechanism is locked to the busbar, the locking mechanism may prevent removal of the server from the rack. When the locking mechanism is unlocked, the server may be removable from the rack.
 
  
 
===Pressure Based Phase Immersion Cooling System ([[17840338. Pressure Based Phase Immersion Cooling System simplified abstract (Microsoft Technology Licensing, LLC)|17840338]])===
 
===Pressure Based Phase Immersion Cooling System ([[17840338. Pressure Based Phase Immersion Cooling System simplified abstract (Microsoft Technology Licensing, LLC)|17840338]])===
Line 2,373: Line 541:
 
Vaidehi ORUGANTI
 
Vaidehi ORUGANTI
  
 
'''Brief explanation'''
 
The patent application describes techniques for dynamically changing the pressure within a pressurized cooling system to allow for different cooling rates in cooling electronic equipment. The system uses a two-phase immersion cooling container filled with dielectric heat transfer fluid to cool heat generating components.
 
 
* The pressurized cooling system can maintain different pressure levels.
 
* A pressure system is used to modify the pressure within the container.
 
* The system operates in a first state when the pressure is above a threshold level.
 
* The system operates in a second state when the pressure is at the threshold level.
 
* The operating state of the heat generating component determines whether the system operates in the first or second state.
 
 
== Potential Applications ==
 
* Cooling electronic equipment, such as servers, data centers, or high-performance computing systems.
 
* Cooling heat generating components in electric vehicles or aerospace systems.
 
 
== Problems Solved ==
 
* Provides a way to dynamically change the cooling rate based on the operating state of the heat generating component.
 
* Allows for more efficient cooling of electronic equipment by adjusting the pressure within the cooling system.
 
 
== Benefits ==
 
* Improved cooling efficiency and performance of electronic equipment.
 
* Ability to adapt the cooling rate to the specific needs of different heat generating components.
 
* Potential for energy savings by optimizing the cooling process.
 
 
'''Abstract'''
 
Techniques for dynamically changing a pressure within a pressurized cooling system to thereby allow different cooling rates to be used to cool electronic equipment are disclosed. A pressurized cooling system cools electronic heat generating components using dielectric heat transfer fluid disposed within a two-phase immersion cooling container. This container is operable to maintain different pressure levels. The pressurized cooling system includes a pressure system structured to modify a pressure within the container. The system operates in a first state when the pressure is above a threshold pressure. The system operates in a second state when the pressure is at the threshold pressure. The system operates in either one of the first state or the second state based on an operating state of the heat generating component.
 
  
 
===SYSTEMS AND METHODS FOR IMMERSION-COOLED DATACENTERS ([[18238046. SYSTEMS AND METHODS FOR IMMERSION-COOLED DATACENTERS simplified abstract (Microsoft Technology Licensing, LLC)|18238046]])===
 
===SYSTEMS AND METHODS FOR IMMERSION-COOLED DATACENTERS ([[18238046. SYSTEMS AND METHODS FOR IMMERSION-COOLED DATACENTERS simplified abstract (Microsoft Technology Licensing, LLC)|18238046]])===
Line 2,405: Line 548:
  
 
Husam Atallah ALISSA
 
Husam Atallah ALISSA
 
 
'''Brief explanation'''
 
The abstract describes a thermal management system for cooling electronic devices. The system includes an immersion cooling system, a vapor buffer tank, and a liquid buffer tank.
 
 
* The immersion cooling system consists of an immersion tank with an immersion chamber, a working fluid, and a condenser.
 
* The working fluid has a liquid portion that forms an immersion bath in the immersion chamber and a vapor portion that forms a headspace above the immersion bath.
 
* The condenser condenses the vapor portion of the working fluid back into the liquid portion.
 
* The vapor buffer tank is connected to the headspace and has a vapor valve that controls the flow of fluid between the vapor buffer tank and the headspace.
 
* The liquid buffer tank is connected to the immersion chamber and has a liquid valve that controls the flow of fluid between the liquid buffer tank and the immersion chamber.
 
 
Potential applications of this technology:
 
* Cooling electronic devices such as computer servers, data centers, or high-performance computing systems.
 
* Cooling power electronics in electric vehicles or renewable energy systems.
 
* Cooling components in aerospace or defense systems.
 
 
Problems solved by this technology:
 
* Efficiently cooling electronic devices that generate a significant amount of heat.
 
* Managing the temperature of electronic components to prevent overheating and potential damage.
 
* Reducing the reliance on traditional air cooling methods that may be less effective in certain applications.
 
 
Benefits of this technology:
 
* Improved cooling efficiency and thermal management for electronic devices.
 
* Enhanced reliability and performance of electronic components by maintaining optimal operating temperatures.
 
* Potential for compact and space-saving cooling solutions compared to traditional methods.
 
* Possibility of reducing energy consumption and environmental impact by using more efficient cooling techniques.
 
 
'''Abstract'''
 
A thermal management system for cooling electronic devices includes an immersion cooling system, a vapor buffer tank, and a liquid buffer tank. The immersion cooling system includes an immersion tank defining an immersion chamber, a working fluid in the immersion chamber, and a condenser. A liquid portion of the working fluid defines an immersion bath in the immersion chamber and a vapor portion defines a headspace above the immersion bath in the immersion chamber. The condenser condenses the vapor portion of the working fluid to the liquid portion of the working fluid. The vapor buffer tank is in fluid communication with the headspace, and a vapor valve selectively allows fluid communication between the vapor buffer tank and the headspace. The liquid buffer tank is in fluid communication with the immersion chamber, and a liquid valve selectively allows fluid communication between the liquid buffer tank and the immersion chamber.
 

Latest revision as of 16:40, 1 January 2024

Summary of the patent applications from Microsoft Technology Licensing, LLC on December 14th, 2023

Microsoft Technology Licensing, LLC has recently filed several patents related to various technologies. These patents cover areas such as thermal management systems for cooling electronic devices, dynamically changing pressure within cooling systems, rack security systems, hinged computing devices, collecting operational data in radio access networks, multi-narrowband transceivers for TV white space communication, mobile computing devices with improved camera modules, restricting video content based on audience groups, capturing intensity images and time-of-flight images, and customizing user interfaces for video communication.

Summary: - Patents cover a range of technologies including thermal management systems, cooling systems, rack security, hinged computing devices, data collection in radio access networks, TV white space communication, camera modules, video content restriction, image capture, and user interface customization. - These technologies aim to improve cooling efficiency, enhance security, provide flexibility in device design, optimize network performance, enable communication in TV white space, improve camera functionality, personalize video content, capture high-quality images, and enhance user experience in video communication.

Notable Applications:

  • Cooling electronic devices such as computer servers, data centers, or high-performance computing systems.
  • Cooling power electronics in electric vehicles or renewable energy systems.
  • Cooling components in aerospace or defense systems.
  • Monitoring and analyzing network events in a radio access network for telecommunications or IoT applications.
  • Restricting video content for specific audience groups in video streaming platforms or educational platforms.
  • Enabling narrowband communication in TV white space for wireless communication systems or IoT devices.
  • Improving camera functionality in mobile phones and tablets.
  • Customizing user interfaces for video communication in video conferencing or remote collaboration.



Contents

Patent applications for Microsoft Technology Licensing, LLC on December 14th, 2023

LIFT WITH SWIVELING AND HORIZONTALLY SLIDING PLATFORM (17840359)

Main Inventor

Jose Seah DELAPAZ


TEMPERATURE COMPENSATION FOR STRAIN SENSOR (17747898)

Main Inventor

Xiao Chuan ONG


OPTICAL SENSOR FOR TWO-PHASE COOLING VAPOR LEVEL MEASUREMENT (17837412)

Main Inventor

Robert Craig MCFARLANE, JR.


ELECTROCHEMICAL SENSOR FOR SENSING TWO-PHASE COOLING FLUID CONTAMINATION (17837366)

Main Inventor

Robert Craig MCFARLANE, JR.


FULL BODY TRACKING USING FUSION DEPTH SENSING (17838139)

Main Inventor

Ruben CABALLERO


ADAPTIVE CHORD TYPING SYSTEM (18062563)

Main Inventor

Dany KHALIFE


STYLUS HAPTIC COMPONENT ARMING AND POWER CONSUMPTION (18454983)

Main Inventor

Shoham DEKEL


INTERACTIVE USER INTERFACE CONTROLS FOR SHARED DYNAMIC OBJECTS (18455855)

Main Inventor

Jonathan Seth KAUFTHAL


VOICE ASSISTANT-ENABLED CLIENT APPLICATION WITH USER VIEW CONTEXT (18231333)

Main Inventor

Jaclyn Carley KNAPP


SOFTWARE DEPLOYMENT TO MULTIPLE COMPUTING DEVICES (18208682)

Main Inventor

Madhur Joshi


CONTEXTUALIZATION OF CODE DEVELOPMENT (17836267)

Main Inventor

Bjarte SJURSEN


Video-Based Progress Tracker for Mobile Application Development (17840529)

Main Inventor

Vishal Goyal


SOFTWARE ISOLATION OF VIRTUAL MACHINE RESOURCES (17837688)

Main Inventor

Jin LIN


SYSTEM AND METHOD OF DYNAMICALLY ADJUSTING VIRTUAL MACHINES FOR A WORKLOAD (17806191)

Main Inventor

Soumya RAM


SYNCHRONIZED SYSTEM-ON-CHIP TELEMETRY AGGREGATION AND BUFFERING (17835834)

Main Inventor

Richard Gerard HOFMANN


EMPLOYING SAMPLED REGISTER VALUES TO INFER MEMORY ACCESSES BY AN APPLICATION (17837507)

Main Inventor

Danny CHEN


ADDRESS TRANSLATION PREFETCHING FOR INPUT/OUTPUT DEVICES (17836936)

Main Inventor

Ramakrishna HUGGAHALLI


CONTROL SYSTEM FOR CONTROLLING MANAGEMENT OF DIGITAL CARDS STORED IN DECENTRALIZED CONTENT STORAGE (17839012)

Main Inventor

Salil DAS


GRAPHIC SEARCH BAR WITH RESPONSIVE RESULTS (17838604)

Main Inventor

Laralyn MCWILLIAMS


SYSTEM FOR CREATING AND ACCESSING DIGITAL CARDS STORED IN DECENTRALIZED CONTENT STORAGE (17839003)

Main Inventor

Salil Das


TECHNIQUES FOR AUTOMATICALLY IDENTIFYING AND FIXING ONE WAY CORRECTNESS ISSUES BETWEEN TWO LARGE COMPUTING SYSTEMS (17837571)

Main Inventor

Shravya THANDRA


CROSS-APPLICATION COMPONENTIZED DOCUMENT GENERATION (17836311)

Main Inventor

Sumit MEHRA


ASYNCHRONOUS CONTENT SWITCHING (17839362)

Main Inventor

Tao Cai


TENANT NETWORK FOR REWRITING OF CODE INCLUDED IN A WEB PAGE (17838789)

Main Inventor

Meir Baruch BLACHMAN


COMPUTING INVERSE TEMPERATURE UPPER AND LOWER BOUNDS (17806440)

Main Inventor

Haohai YU


TRUSTED ROOT RECOVERY (18188438)

Main Inventor

Cristian Iuliu POP


SECURE USER ASSIGNED DEVICE FROM MANUFACTURER (18236725)

Main Inventor

Anni Dong


GENERIC FEATURE EXTRACTION FOR IDENTIFYING MALICIOUS PACKAGES (17837703)

Main Inventor

Rahul PANDITA


CONTROLLING APPLICATION ACCESS TO SENSITIVE DATA (17835050)

Main Inventor

Arash VAHIDNIA


SYSTEMS AND METHODS FOR MANUFACTURING ADAPTIVE PERIPHERAL DEVICES (17840383)

Main Inventor

Elizabeth Rose MILLER


SYSTEMS AND METHODS FOR MANUFACTURING ADAPTIVE PERIPHERAL DEVICES (17840379)

Main Inventor

Elizabeth Rose MILLER


Techniques for Pretraining Document Language Models for Example-Based Document Classification (17836977)

Main Inventor

Guoxin WANG


Automatic Speech Recognition Systems and Processes (17836390)

Main Inventor

Kshitiz KUMAR


TRANSFORMER-BASED GRAPH NEURAL NETWORK TRAINED WITH THREE-DIMENSIONAL DISTANCE DATA (17806076)

Main Inventor

Shuxin ZHENG


MULTI-DOMAIN JOINT SEMANTIC FRAME PARSING (18457708)

Main Inventor

Dilek Z. Hakkani-Tur


COMBINED TABLE LOOKUP AT QUANTUM COMPUTING DEVICE (17806923)

Main Inventor

Mathias SOEKEN


DOUBLY CONTROLLED iX CIRCUIT (17806927)

Main Inventor

Mathias SOEKEN


Generation and Explanation of Transformer Computation Graph Using Graph Attention Model (17840169)

Main Inventor

Leo Moreno BETTHAUSER


MEETING LOCATION RECOMMENDATION SYSTEM (17836857)

Main Inventor

Satish CHANDRA


Monitoring Carbon Emissions of Computing Processes Running on a Container Orchestration Platform (17839541)

Main Inventor

Vaughan Shields KNIGHT


GRAPHICAL ToF PHASE UNWRAPPING (18452309)

Main Inventor

Sergio ORTIZ EGEA


SCALABLE KNOWLEDGE DISTILLATION TECHNIQUES FOR MACHINE LEARNING (17837636)

Main Inventor

Adit KRISHNAN


COMPUTERIZED INTELLIGENT ASSISTANT FOR CONFERENCES (18197595)

Main Inventor

Adi DIAMANT


MEMORY ARRAYS EMPLOYING FLYING BIT LINES TO INCREASE EFFECTIVE BIT LINE LENGTH FOR SUPPORTING HIGHER PERFORMANCE, INCREASED MEMORY DENSITY, AND RELATED METHODS (17836634)

Main Inventor

Pramod KOLAR


TRANSFORMER-BASED GRAPH NEURAL NETWORK TRAINED WITH STRUCTURAL INFORMATION ENCODING (17806075)

Main Inventor

Shuxin ZHENG


RETROSYNTHESIS AND PROXY CHEMICALS FOR LIFE-CYCLE ASSESSMENT (17804551)

Main Inventor

Jake Allen SMITH


PARALLELIZED DECODING OF VARIABLE-LENGTH PREFIX CODES (18034832)

Main Inventor

Daniel LO


PACKET CAPTURE USING VXLAN ENCAPSULATION (18181481)

Main Inventor

Darshil Jashvant KHETANI


CONVERTING LINKS AND STATIC DATA INTO COLLABORATIVE USER EXPERIENCES (18237822)

Main Inventor

Leeviana Peng GRAY


FORK AND RETURN POINT SELECTION FOR SIDEBAR COMMUNICATION THREADS (17836586)

Main Inventor

Amer Aref Hassan


SIDEBAR COMMUNICATION THREADS WITHIN PRE-EXISTING THREADS (17836745)

Main Inventor

Amer Aref HASSAN


DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION (17840035)

Main Inventor

Riley Joseph MCKENNA


MACHINE LEARNING APPROACH FOR SOLVING THE COLD START PROBLEM IN STATEFUL MODELS (17806889)

Main Inventor

Andrey Karpovsky


SECURITY INCIDENT DETECTION BASED ON HISTORIAN CONFIGURATION DATA COLLECTED OVER TIME (17835552)

Main Inventor

Arun Ramadasan MANNENGAL


DYNAMIC CONTROL OF THE DELIVERY OF NOTIFICATIONS CAPABLE OF INVOKING EVENT RECORDINGS (17840560)

Main Inventor

Hitesh RATHI


ENCRYPTION OF PROXY SESSION ACTIVITY DATA USING USER-PROVIDED ENCRYPTION KEYS (18335073)

Main Inventor

Itamar AZULAY


CUSTOMIZATION OF A USER INTERFACE DISPLAYING A RENDERING OF MULTIPLE PARTICIPANTS OF A HYBRID COMMUNICATION SESSION (17835918)

Main Inventor

Amer Aref HASSAN


SPAD ARRAY FOR INTENSITY IMAGE CAPTURE AND TIME OF FLIGHT CAPTURE (18454587)

Main Inventor

Raymond Kirk PRICE


SYSTEMS AND METHODS FOR RESTRICTING VIDEO CONTENT (17839271)

Main Inventor

Prabhakaran SETHURAMAN


SHARED WINDOW FOR COMPUTING DEVICE CAMERA LENSES AND PHOTOFLASH (17837560)

Main Inventor

Eeva Liisa Lehtola


DEVICE COMMUNICATION OVER TELEVISION WHITE SPACE (18457317)

Main Inventor

Heping SHI


FACILITATING COLLECTION OF EVENTS DETECTED BY RADIO ACCESS NETWORK COMPONENTS (17749081)

Main Inventor

Bhushan Mangesh KANEKAR


HINGED DEVICE (17840317)

Main Inventor

Daniel C. PARK


DEVICES, SYSTEMS, AND METHODS FOR LOCKING A SERVER IN A RACK (17840355)

Main Inventor

Rick Chun Kit CHEUNG


Pressure Based Phase Immersion Cooling System (17840338)

Main Inventor

Vaidehi ORUGANTI


SYSTEMS AND METHODS FOR IMMERSION-COOLED DATACENTERS (18238046)

Main Inventor

Husam Atallah ALISSA