MICROSOFT TECHNOLOGY LICENSING, LLC patent applications published on November 2nd, 2023

From WikiPatents
Jump to navigation Jump to search

Summary of the patent applications from MICROSOFT TECHNOLOGY LICENSING, LLC on November 2nd, 2023

Microsoft Technology Licensing, LLC has recently filed several patents covering a range of technologies and innovations. These patents include methods for patterning superconductor materials, manufacturing electronic device housings, provisioning computing devices on mobile communications networks, enhancing video encoding and decoding with intra-picture prediction modes, utilizing MEMS scanning devices, providing a consolidated view of reactions to content on a content sharing service, detecting anomalies in data streams, enabling mutual authentication in a communications network, securing metrics data in container orchestration platforms, and managing computing resources in a network.

Notable applications include:

  • A method for patterning superconductor materials without using a chemical etch, allowing for improved resolution and avoiding damage to other components or interfaces.
  • A method of manufacturing electronic device housings using nanograin coatings to enhance structural rigidity while maintaining RF transparency.
  • A system for provisioning computing devices on mobile communications networks, allowing customers to select SIM providers and encrypting and transmitting SIM data over encrypted channels.
  • Innovations in video encoding and decoding that optimize the use of intra-picture prediction modes when wavefront parallel processing is enabled, improving performance and efficiency.
  • A MEMS scanning device that uses laser projectors, scanning mirrors, thermometers, and display observing cameras to generate raster scans on displays and adjust temperature models for more accurate scanning.
  • Methods and systems for providing a consolidated view of reactions to content across multiple sharing locations on a content sharing service.
  • A system and method for detecting anomalies in data streams by creating models, computing distance matrices, and generating alerts.
  • The use of a service mesh in a communications network to enable mutual authentication between SIP compliant applications and external SIP devices.
  • A method for securing metrics data in container orchestration platforms by analyzing requests and only processing secure requests for metrics information.
  • A system for managing computing resources in a network, allowing an edge computing network to enter an autonomous mode and continue providing services during disconnections from the computing service provider.

Overall, these patents demonstrate Microsoft Technology Licensing, LLC's commitment to innovation across various technological domains, including materials science, electronics manufacturing, communications, video processing, scanning devices, data analytics, and network management.



Contents

Patent applications for MICROSOFT TECHNOLOGY LICENSING, LLC on November 2nd, 2023

UNIVERSAL TEMPLATE STRANDS FOR ENZYMATIC POLYNUCLEOTIDE SYNTHESIS (18219079)

Main Inventor

Bichlien NGUYEN


REGULATION OF POLYMERASE USING COFACTOR OXIDATION STATES (18221364)

Main Inventor

Bichlien Hoang NGUYEN


PROJECTION DEVICE AND PROJECTION METHOD FOR HEAD MOUNTED DISPLAY BASED ON ROTARY MEMS FAST SCANNER (18218439)

Main Inventor

Tapani Matias ALASAARELA


CONTROL OF VARIABLE-FOCUS LENSES IN A MIXED-REALITY DEVICE FOR PRESBYOPES (18350133)

Main Inventor

Robert Thomas HELD


STYLUS UPLINK ENHANCEMENT FOR TOUCHSCREEN DEVICES (18000427)

Main Inventor

Eliyahu BAREL


INTUITIVE AUGMENTED REALITY COLLABORATION ON VISUAL DATA (18221182)

Main Inventor

Michel PAHUD


DYNAMIC ON-DEMAND DATACENTER CREATION (17732050)

Main Inventor

Sagiv DRAZNIN


INTELLIGENT DYNAMIC SCALING BASED ON INTERNAL AND EXTERNAL INDICATORS (17733955)

Main Inventor

Nicolas Harry NEATE


RELIABLE VIRTUALIZED NETWORK FUNCTION SYSTEM FOR A CLOUD COMPUTING SYSTEM (18340648)

Main Inventor

Bozidar RADUNOVIC


OUT OF BAND METHOD TO CHANGE BOOT FIRMWARE CONFIGURATION (17733429)

Main Inventor

Neeraj LADKANI


OUT-OF-BAND METHOD TO CHANGE BOOT FIRMWARE CONFIGURATION (17733463)

Main Inventor

Neeraj LADKANI


System for Application Engagement Composite Index (17733256)

Main Inventor

Hongwei Liang


AUTOMATIC CORRECTNESS VALIDATION OF DATABASE MANAGEMENT SYSTEMS (17730904)

Main Inventor

Mathieu Baptiste DEMARNE


RECORDING A MEMORY VALUE TRACE FOR USE WITH A SEPARATE CACHE COHERENCY PROTOCOL TRACE (17921067)

Main Inventor

Jordi MOLA


COMMUNICATIONS FOR FIELD PROGRAMMABLE GATE ARRAY DEVICE (18344165)

Main Inventor

Peng CHENG


MULTI-PROCESSOR SYNCHRONIZATION (17732766)

Main Inventor

Nadav Shlomo BEN-AMRAM


ONLINE DETERMINATION OF RESULT SET SENSITIVITY (18345432)

Main Inventor

Alex UMANSKY


INSTRUCTION LEVEL PARALLELISM IN A DECLARATIVE GRAPH QUERY LANGUAGE (17822429)

Main Inventor

Anders Tungeland GJERDRUM


MATERIALIZED VIEW GENERATION AND PROVISION BASED ON QUERIES HAVING A SEMANTICALLY EQUIVALENT OR CONTAINMENT RELATIONSHIP (17734026)

Main Inventor

Brandon Barry HAYNES


OBSERVATION STREAM ENGINE IN A SECURITY MANAGEMENT SYSTEM (17733155)

Main Inventor

Gueorgui Bonov CHKODROV


SEPARATION OF LOGICAL AND PHYSICAL STORAGE IN A DISTRIBUTED DATABASE SYSTEM (18351258)

Main Inventor

Alejandro Hernandez SAENZ


Brief explanation

- This patent application describes distributed database systems that separate the logical and physical storage of database files.

- The system includes a page server and a compute node, which work together to store a logical database file that contains data and is associated with a file identifier. - Each page server can store slices (subportions) of the logical database file. - The compute node is connected to multiple page servers and is responsible for storing the logical database file based on received commands. - The storage process involves slicing the data of the logical database file into multiple slices, with each slice associated with a specific page server. - An endpoint mapping is maintained for each slice, and each slice is transmitted to the associated page server for storage.

  • Distributed database systems with separate logical and physical storage of database files.
  • Includes a page server and a compute node.
  • Logical database file contains data and is associated with a file identifier.
  • Page servers store slices of the logical database file.
  • Compute node stores the logical database file based on commands.
  • Data is sliced into multiple slices, each associated with a page server.
  • Endpoint mapping is maintained for each slice.
  • Slices are transmitted to associated page servers for storage.

Abstract

Distributed database systems including compute nodes and page servers are described herein that enable separating logical and physical storage of database files in a distributed database system. A distributed database system includes a page server and a compute node, and is configured to store a logical database file that includes data and is associated with a file identifier. Each page server is configurable to store slices (i.e., subportions) of the logical database file. The compute node is coupled to the plurality of page servers and configured to store the logical database file responsive to a received command. In an aspect, such storage may comprise slicing the data comprising the logical database file into a set of slices with each being associated with a respective page server, maintaining an endpoint mapping for each slice of the first set of slices, and transmitting each slice to the associated for storage thereby.

WEB CONTENT RELIABILITY CLASSIFICATION (18218462)

Main Inventor

Richard T. GUY


Brief explanation

- The technology described in this patent application assigns a reliability score to web content.

- The reliability score can be either high or low, representing conformance to high or low reliability sites. - The high reliability score is generated by identifying high reliability online content within a compressed web graph. - The high reliability score is used to score online content that is linked to high reliability sites. - The more links that originate from high reliability sources, the higher the reliability score for the linked content. - The low reliability score is generated by using outgoing links to low reliability sites instead of incoming links from high reliability sites.

Abstract

Technology described herein assigns a reliability score to web content, such as a web site or portion of a website. In one aspect, an output of the technology is a high reliability score and a low reliability score for a web content. The high reliability score represents conformance to high reliability sites, while the low reliability score represents conformance to low reliability sites. The high reliability score may be generated by first identifying high reliability online content within a compressed web graph. In a first iteration, the high reliability score of the seeds is used to score online content that is linked to the seed sites. At a high level, the more links that originate from high reliability sources, the higher the reliability score for the linked content. The low reliability score is similar, but uses outgoing links to low reliability sites instead of incoming links from high reliability sites.

ASSISTANCE USER INTERFACE FOR COMPUTER ACCESSIBILITY (17734029)

Main Inventor

Jacques Christopher NEWMAN


Brief explanation

The patent application describes technology for computer-user interfaces that make it easier for users with accessibility needs to access computer resources. 
  • The computer-user interface includes an assistance user interface (UI) that is presented alongside the computer resource, without blocking access to it.
  • The assistance UI includes UI controls like hyperlinks or buttons that help users access the computer resource.
  • The UI controls and their configuration are determined based on the category of the computer resource, so similar computer resources have similarly configured assistance UIs.
  • The technology can programmatically detect specific data features of a computer resource and generate corresponding UI controls, allowing users to directly access those features.
  • Users can access specific data features of the computer resource either through the presentation of the resource itself or by using the UI controls in the assistance UI.

Abstract

Technology is disclosed for computer-user interfaces to facilitate access to a computer resource by users having accessibility needs. In one implementation, a computer-user interface comprises an assistance user interface (UI) provided as a supplemental UI presented in conjunction with the computer resource and which does not inhibit access to the computer resource. The assistance UI may include UI controls, such as hyperlinks or buttons, to facilitate user access to the computer resource. Particular UI controls and their configuration may be determined based on a category of the computer resource such that computer resources of a similar category have similarly configured assistance UIs or similarly named UI controls. Moreover, particular data features of a computer resource may be programmatically detected and utilized to generate the UI controls such that a particular UI control corresponds to a particular data feature. Accordingly, users can access the particular data feature of the computer resource directly via the presentation of the computer resource or can access the particular data feature by actuating the corresponding UI control via the assistance UI.

SYSTEM AND METHOD FOR CLIENT-SIDE REWRITING OF CODE INCLUDED IN A WEB PAGE (17730776)

Main Inventor

Meir Baruch BLACHMAN


Brief explanation

- This patent application describes systems and methods for rewriting web page code on the client-side.

- A proxy computing device receives a web page from a server computing device and analyzes it to identify a code component. - The proxy computing device then generates a modified version of the web page by replacing the identified code component with a wrapped code component. - The modified web page also includes a code rewriting and evaluation function. - The wrapped code component includes a call to the code rewriting and evaluation function, with the identified code component as an argument. - The code rewriting and evaluation function is designed to rewrite the identified code component and evaluate the rewritten code component. - The modified version of the web page is sent to a client computing device, which is configured to load and display the modified web page. - The innovation allows for dynamic modification of web page code on the client-side, providing flexibility and customization options for users.

Abstract

Systems and methods are described for client-side rewriting of web page code. A proxy computing device receives a web page from a server computing device and analyzes the web page to identify a code component. The proxy computing device generates a modified version of the web page by replacing the identified code component with a wrapped code component and including a code rewriting and evaluation function in the web page. The wrapped code component includes a call to the code rewriting and evaluation function that includes the identified code component as an argument thereof. The code rewriting and evaluation function is configured to generate a rewritten code component by rewriting the identified code component and to evaluate the rewritten code component. The proxy computing device sends the modified version of the web page to a client computing device that is configured to load the modified version of the web page.

METHOD AND SYSTEM OF PROVIDING ACCESS TO DOCUMENTS STORED IN PERSONAL STORAGE MEDIUMS (17731045)

Main Inventor

David MOWATT


Brief explanation

The abstract describes a system and method for accessing data stored in a personal storage medium. Here is a simplified explanation of the patent application:
  • The system receives a search query from a searching entity.
  • It checks if the data being searched for is stored in the personal storage medium of a user.
  • If the data is found in the personal storage medium, it checks if the user has given consent to provide access to the data.
  • If consent is given, it searches a search index associated with the personal storage medium for the data.
  • Finally, it provides the searching entity with one or more search results or notifies that no results were found.

Abstract

A system and method for providing access to data stored in a personal storage medium includes receiving a search query from a searching entity for searching for the data, determining if the data includes data stored in the personal storage medium of a user, upon determining that the data includes data stored in the personal storage medium, determining if the user has consented to provide access to the data to the searching entity and if so, searching a search index associated with the personal storage medium for the data, and providing one or more search results or a notification that no search results were identified to the searching entity.

SCAN SURFACE REDUCTION FOR SENSITIVE INFORMATION SCANNING (17733530)

Main Inventor

Assefa SEMEGN


Brief explanation

- The patent application discusses devices, systems, and methods for reducing the scanning surface in sensitive information scanning.

- The method involves receiving a document and using an evidence checker to determine if there is a keyword indicating sensitive information present in the document. - If the keyword is found, a sensitive information scanner uses a regular expression associated with the sensitive information type to determine if sensitive information is present in the document. - If sensitive information is detected, a sensitive information mitigation operation is performed to mitigate the sensitive information.

Abstract

Generally discussed herein are devices, systems, and methods for scan surface reduction in sensitive information scanning. A method can include receiving a document, determining, by an evidence checker, a keyword that indicates sensitive information of a sensitive information type, is present in the document, responsive to determining the keyword is present, determining, by a sensitive information scanner and based on a regular expression associated with the sensitive information type, that sensitive information is present in the document, and performing a sensitive information mitigation operation to mitigate the sensitive information.

Presenting Intelligently Suggested Content Enhancements (17791260)

Main Inventor

Erez Kikin GIL


Brief explanation

- The patent application describes a method and system for suggesting enhancements for a document and displaying them in a user-friendly way.

- The system examines the document to identify areas that can be improved. - It allows users to preview the suggested enhancements before selecting them. - Users can then accept the suggested enhancements through a second user interface element. - The first user interface element provides a preview of the document after the enhancements have been applied.

Abstract

A method and system for identifying enhancement suggestions for a document and displaying the identified suggestions in a user-friendly manner may include examining the document to identify an enhancement fora portion of content in the document, enabling display of a first user interface element for previewing the identified enhancement as applied to the content, receiving a request to select the identified enhancement, and upon receiving the request enabling display of a second user interface element for accepting the identified enhancement. The first user interface element may provide a preview of the document post enhancement.

CUSTOM DISPLAY POST PROCESSING IN SPEECH RECOGNITION (17815211)

Main Inventor

Wei LIU


Brief explanation

The patent application describes a solution for custom display post processing (DPP) in speech recognition (SR).
  • The solution uses a multi-stage DPP pipeline to transform a stream of SR tokens from lexical form to display form.
  • The first transformation stage of the pipeline converts a specific aspect of the tokens (e.g., disfluency, inverse text normalization, capitalization) from lexical form to display form.
  • The upstream filter and/or downstream filter can modify the tokens to customize the behavior of the DPP pipeline.
  • Additional transformation stages in the pipeline allow for further customization of the output text in a display format tailored to each user.
  • This enables users to efficiently utilize a common baseline DPP pipeline to generate customized output.

Abstract

Solutions for custom display post processing (DPP) in speech recognition (SR) use a customized multi-stage DPP pipeline that transforms a stream of SR tokens from lexical form to display form. A first transformation stage of the DPP pipeline receives the stream of tokens, in turn, by an upstream filter, a base model stage, and a downstream filter, and transforms a first aspect of the stream of tokens (e.g., disfluency, inverse text normalization (ITN), capitalization, etc.) from lexical form into display form. The upstream filter and/or the downstream filter alter the stream of tokens to change the default behavior of the DPP pipeline into custom behavior. Additional transformation stages of the DPP pipeline perform further transforms, allowing for outputting final text in a display format that is customized for a specific user. This permits each user to efficiently leverage a common baseline DPP pipeline to produce a custom output.

NEURAL NETWORKS IMPLEMENTED WITH DSD CIRCUITS (18204363)

Main Inventor

Karin STRAUSS


Brief explanation

- This patent application describes a method of implementing neural networks using DNA strand displacement (DSD) circuits.

- The neural networks are designed and trained using computer simulations, considering the behavior of DSD circuits. - Oligonucleotides, which are short DNA or RNA molecules, are synthesized and combined to create the neural network. - The neural network described in this implementation is a binary neural network, where each neuron's output is a binary value and the weight of each neuron either maintains or flips the binary value. - The inputs to the neural network can be synthetic oligonucleotides containing digital data or natural oligonucleotides like mRNA. - The outputs from the neural network can be read directly by sequencing the oligonucleotides or by generating signals through the release of fluorescent reporters.

Abstract

Neural networks can be implemented with DNA strand displacement (DSD) circuits. The neural networks are designed and trained in silico taking into account the behavior of DSD circuits. Oligonucleotides comprising DSD circuits are synthesized and combined to form a neural network. In an implementation, the neural network may be a binary neural network in which the output from each neuron is a binary value and the weight of each neuron either maintains the incoming binary value or flips the binary value. Inputs to the neural network are one more oligonucleotides such as synthetic oligonucleotides containing digital data or natural oligonucleotides such as mRNA. Outputs from the neural networks may be oligonucleotides that are read by directly sequencing or oligonucleotides that generate signals such as by release of fluorescent reporters.

DECENTRALIZED CROSS-NODE LEARNING FOR AUDIENCE PROPENSITY PREDICTION (17735020)

Main Inventor

Boyi Chen


Brief explanation

The disclosed technologies involve a process for combining data from different sources to improve a trained model.
  • The process starts by receiving a trained model and data from a first-party system.
  • A third-party data set is also received and combined with the first-party data set in a protected environment called a data clean room.
  • The combined data set is then used to fine-tune the trained model, resulting in a third-party tuned model.
  • The model parameter data learned during the tuning process is sent to an aggregator node.
  • The aggregator node provides a globally tuned version of the trained model.
  • This globally tuned model is applied to a second third-party data set, producing a scored third-party data set.
  • Finally, the scored third-party data set is provided to a content distribution service of the first-party system.

Abstract

Embodiments of the disclosed technologies receive a first-party trained model and a first-party data set from a first-party system into a protected environment, receive a first third-party data set into the protected environment, and, in a data clean room, joining the first-party data set and the first third-party data set to create a joint data set for the particular segment, tuning a first-party trained model with the joint data set to create a third-party tuned model, sending model parameter data learned in the data clean room as a result of the tuning to an aggregator node, receiving a globally tuned version of the first-party trained model from the aggregator node, applying the globally tuned version of the first-party trained model to a second third-party data set to produce a scored third-party data set, and providing the scored third-party data set to a content distribution service of the first-party system.

DISTRIBUTED MACHINE LEARNING MODEL (18004868)

Main Inventor

Yotam LIVNY


Brief explanation

The patent application describes a method for training machine learning models using distributed computer equipment.
  • The method involves obtaining an input data point consisting of a set of values representing different elements of an input feature vector.
  • The input data point is then used as input for a first machine learning model on the first computer equipment, which generates at least one output label based on the input data point.
  • A partial data point, containing only a subset of the feature vector values, is sent to a second computer equipment.
  • The associated label is also sent to the second computer equipment, along with the partial data point.
  • This causes the second computer equipment to train a second machine learning model based on the sent partial data and associated label.

Abstract

A method comprising, by first computer equipment: obtaining an input data point comprising a set of values, each being a value of a different element of an input feature vector; inputting the input data point to a first machine learning model on the first computer equipment to generate at least one associated output label based on the input data point; sending a partial data point to second computer equipment, the partial data point comprising the values of only part of the feature vector; and sending the associated label to the second computer equipment in association with the partial data point, thereby causing the second computer equipment to train a second machine learning model on the second computer equipment based on the sent part and the associated label.

EMPLOYEE INTERACTION ASSISTANT (17733621)

Main Inventor

Satish CHANDRA


Brief explanation

- The patent application describes systems and methods that assist in employee interactions.

- These systems and methods automatically schedule meetings between a manager and a report based on changes in human resource data. - The systems and methods also track the meetings between the manager and the report over a specific time period. - Meeting minutes for these meetings are obtained and analyzed by the systems and methods. - Based on the analysis of the meeting minutes, the systems and methods automatically generate feedback. - The feedback generated can be provided to either the report or the manager.

Abstract

The systems and methods provide assistance in employee interactions. The systems and methods automatically schedule meetings between a manager and a report in response to changes in human resource data. The systems and methods track the meetings between the manager and the report during a time period and obtain meeting minutes for the meetings. The systems and methods analyze the meeting minutes and automatically generate feedback based on the analysis of the meeting minutes. The feedback is provided to the report or the manager.

GENERATING AN INPAINTED IMAGE FROM A MASKED IMAGE USING A PATCH-BASED ENCODER (17733634)

Main Inventor

Dongdong CHEN


Brief explanation

- This patent application describes a method for generating an inpainted image from a masked image using a patch-based encoder and an unquantized transformer.

- The method involves receiving an image that has both a masked region and an unmasked region. - The received image is divided into patches, with some of the patches being masked patches. - Each patch is encoded into a feature vector using a patch-based encoder. - A predicted token is generated for each masked patch using the feature vector encoded from that patch, using a transformer. - A quantized vector of the masked patch is determined using the generated predicted token and a masked patch-specific codebook. - The determined quantized vector of the masked patch is included in a set of quantized vectors associated with all the patches. - Finally, an output image is generated from the set of quantized vectors using a decoder.

Abstract

The disclosure herein describes generating an inpainted image from a masked image using a patch-based encoder and an unquantized transformer. An image including a masked region and an unmasked region is received, and the received image is divided into a plurality of patches including masked patches. The plurality of patches is encoded into a plurality of feature vectors, wherein each patch is encoded to a feature vector. Using a transformer, a predicted token is generated for each masked patch using a feature vector encoded from the masked patch, and a quantized vector of the masked patch is determined using generated predicted token and a masked patch-specific codebook. The determined quantized vector of the masked patch is included into a set of quantized vectors associated with the plurality of patches, and an output image is generated from the set of quantized vectors using a decoder.

MOMENT LOCALIZATION IN MEDIA STREAM (17768815)

Main Inventor

Houwen Peng


Brief explanation

The patent application is about moment localization in a media stream.
  • The application describes extracting a two-dimensional temporal feature map from the media stream.
  • The feature map represents a plurality of moments in the media stream, with one dimension indicating the start of each moment and the other dimension indicating the end.
  • The application explains that the correlation between these moments and an action in the media stream can be determined based on the feature map.

Abstract

Various implementations of the subject matter relate to moment localization in media stream. In some implementations, a two-dimensional temporal feature map representing a plurality of moments within a media stream is extracted from the media stream, wherein the two-dimensional temporal feature map comprises a first dimension representing a start of a respective one of the plurality of moments and a second dimension representing an end of a respective one of the plurality of moments. A correlation between the plurality of moments and an action in the media stream is determined based on the two-dimensional temporal feature map.

STREAMING PUNCTUATION FOR LONG-FORM DICTATION (17732971)

Main Inventor

Piyush BEHRE


Brief explanation

The patent application describes systems that generate segments of spoken language utterances using various segmentation boundaries. These systems can also format the segments by adding punctuation tags at the boundaries and generate final sentences from these segments.
  • Systems generate segments of spoken language utterances.
  • Segmentation boundaries are used to determine the segments.
  • Punctuation tags are assigned at the segmentation boundaries to format the segments.
  • Final sentences are generated from the formatted segments.

Abstract

Systems generate segments of spoken language utterances based on different sets of segmentation boundaries. The systems are also configured to generate one or more formatted segments by assigning a punctuation tags at segmentation boundaries and to generate one or more final sentences from the one or more segments.

RETROACTIVE RECORDING OF A MEETING (18328240)

Main Inventor

Dhirendra Kumar BHUPATI


Brief explanation

- The patent application describes a technology for recording virtual meetings with a retroactive record feature.

- Users can choose to initiate the recording from the beginning or an earlier time in the meeting even after it has started. - The system processes meeting content streams to create data segments that make up the meeting recording. - Each data segment includes meeting content associated with a specific user/attendee and a timestamp or time duration. - The data segments can be stored on a blockchain, ensuring an unchangeable meeting record. - The recorded meeting can be played back based on the user's selection to record the meeting and consent from the attendees.

Abstract

Systems and methods for recording a meeting using a retroactive record feature. The present technology provides for improved systems and methods for providing a recording of a virtual meeting, where a selection to initiate the recording from the beginning or an earlier time in the meeting from a current time may be received after the virtual meeting has started. The system may process received meeting content streams to generate a plurality of data segments that may collectively form a meeting recording. Each data segment, for example, may include meeting content associated with a particular user/attendee and associated with a timestamp and/or time duration. In some examples, the plurality of data segments may be stored on a blockchain, which may provide an immutable meeting record that may be concatenated together and made available for playback based on a selection to record the meeting and consent given by the users/attendees.

SECURE AUTHENTICATION ARTIFACT SIGNING SERVICE FOR AUTHENTICATION SYSTEM (17732749)

Main Inventor

Sarvani Kumar BHAMIDIPATI


Brief explanation

The patent application describes a system for authenticating a user or entity.
  • The system includes two authentication systems and an authentication artifact signing service.
  • The first authentication system receives a request from the second authentication system, which includes an authentication artifact (a piece of information that verifies the identity of the user) and specifications for modifications to be made to it.
  • The authentication artifact is generated by the second authentication system, signed using a key, and stored by the first authentication system.
  • The signing service receives the request and applies the specified modifications to the authentication artifact.
  • The signing service then signs the modified authentication artifact using a key from the second authentication system.
  • The signed modified authentication artifact is returned to the first authentication system for use in authenticating the user.
  • The first authentication system operates in a different security domain than the signing service and does not have access to the key used by the signing service.

Abstract

A system for authenticating a principal comprises first and second authentication systems and an authentication artifact signing service. The first authentication system issues a request comprising an authentication artifact associated with the principal and a specification of one or more modifications to be made thereto, the authentication artifact being generated by a second authentication system, signed thereby using a key, and stored by the first authentication system. The signing service receives the request and, responsive thereto: applies the modification(s) to the authentication artifact to generate a modified authentication artifact, signs the modified authentication artifact using a key of the second authentication system, and returns the signed modified authentication artifact to the first authentication system for use in authenticating the principal. The first authentication system executes in a different security domain than the signing service and is unable to access the key used thereby.

MUTUAL AUTHENTICATION BETWEEN CLUSTERS (17852302)

Main Inventor

Alex John HOCKEY


Brief explanation

The patent application describes a method for processing traffic to provide a service.
  • The method involves using a secure communications protocol with mutual authentication to ensure traffic is communicated within a cluster.
  • A client in the first cluster sends traffic to a second cluster for processing, and the second cluster has access to a root certificate.
  • The traffic is routed to the second cluster using the secure communications protocol with mutual authentication.
  • Mutual authentication is carried out between the first and second clusters using certificate chains with the root certificate.
  • If the mutual authentication is successful, application data is routed to the second cluster using the secure communications protocol.
  • The application data is then processed at the second cluster to provide the desired service.

Abstract

A method of processing traffic to provide a service is described. A first service mesh in a first cluster is used to ensure traffic is communicated within the first cluster using a secure communications protocol with mutual authentication accomplished using a certificate chain having a root certificate. A client in the first cluster originates traffic to a second cluster for processing, the second cluster having access to the root certificate. Using the first service mesh, routing the traffic to the second cluster is done using a secure communications protocol with mutual authentication. Mutual authentication is carried out between the first cluster and the second cluster using certificate chains having the root certificate; and in response to the mutual authentication being successful, application data is routed to the second cluster using the secure communications protocol such that the application data may be processed at the second cluster to provide the service.

EYE CONTACT ASSISTANCE IN VIDEO CONFERENCE (17732603)

Main Inventor

Ryen William White


Brief explanation

The patent application discusses devices, systems, and methods for eye contact assistance in a video conference.
  • The method involves determining the position of the web camera in relation to the display.
  • A user interface of the video conference is provided on the display.
  • The user interface includes a graphic display of information at the pixels closest to the camera's position.
  • The purpose is to assist in maintaining eye contact during a video conference.

Abstract

Generally discussed herein are devices, systems, and methods for eye contact assistance in a video conference. A method can include determining a location of the web camera relative to a display, providing a user interface of the video conference on the display, and providing, on the user interface, a graphic display of information at pixels of the display that are most proximate the location.

ALLOCATING A PACKET TO A MEDIA SESSION CONTROLLER (17852275)

Main Inventor

Robert Keith DAY


Brief explanation

The abstract describes a network device that allocates packets to a Media Session Controller (MSC) based on the port number in the packet header. 
  • The network device receives a packet and inspects the port number in the packet header.
  • It compares the port number with MSC-port allocations stored in a database.
  • Based on this comparison, it selects an MSC from a group of MSCs.
  • The network device then forwards the received packet to the selected MSC.

Abstract

A network device comprising: a processor; and a memory comprising instructions which when executed by the processor cause the device to allocate a packet to a Media Session Controller (MSC) by receiving the packet; inspecting a port number in the packet header of the packet; comparing the port number with one or more MSC-port allocations in a database; selecting based on the comparison an MSC from a plurality of MSCs; and forwarding the received packet to the selected MSC.

AUTONOMOUS OPERATION OF EDGE-BASED DEPLOYMENTS (17733745)

Main Inventor

Rahul BOSE


Brief explanation

The patent application describes a system for managing computing resources in a network that includes a computing service provider and an edge computing network.
  • The edge computing network is notified when there is a disconnection between the computing service provider and the edge computing network.
  • In response to the disconnection, the edge computing network enters an autonomous mode.
  • The edge computing network is designed to continue providing computing and network services even while operating in the autonomous mode.

Abstract

Computing resources are managed in a computing network comprising a computing service provider and an edge computing network. The edge computing network receives an indication of a disconnection of communications between the computing service provider and the edge computing network. In response to the indication, the edge computing network initiates an autonomous mode at the edge computing network. The edge computing network is configured to continue providing computing and network services at the edge computing network while the edge computing network is operating in the autonomous mode.

SECURING METRICS FOR A POD (17847356)

Main Inventor

Alex John HOCKEY


Brief explanation

This patent application describes a method for securing metrics data in a container orchestration platform before transmitting it to a metrics collection service. Here are the key points:
  • The method involves receiving a secure request at a pod IP address and forwarding it to a container within the pod.
  • It also involves receiving an insecure request at the pod IP address and examining its content.
  • The content of the insecure request is analyzed to determine if it is requesting metrics information.
  • If the request is not for metrics information, it is passed to the original destination within the pod.
  • If the request is indeed for metrics information, it is rejected to ensure the security of the data.

Overall, this method ensures that only secure requests for metrics information are processed, providing enhanced security for the container orchestration platform.

Abstract

A computer-implemented method, data processing system and computer-readable medium for a pod of a container orchestration platform to secure metrics relating to the pod prior to transmission of metrics to a metrics collection service. The method comprising: receiving a secure request at a pod IP address and forwarding the request to a container of the pod; and receiving an insecure request at the pod IP address; examining the content of the received insecure request; from the examining, determining whether the received insecure request is requesting metrics information; if it was determined that the received insecure request does not request metrics information, passing the request to an original destination within the pod, and if it was determined that the received insecure request does request metrics information, rejecting the received insecure request.

MUTUALLY AUTHENTICATED COMMUNICATION WITH REMOTE SIP DEVICE (17852317)

Main Inventor

Alex John HOCKEY


Brief explanation

- This patent application describes the use of a service mesh in a cluster of a communications network to enable mutual authentication between a SIP compliant application and a SIP device external to the cluster.

- Mutual authentication is achieved by using a certificate of the application that matches a naming system name used for the application. - Once mutual authentication is successful, a secure communication session is established between the application and the external SIP device. - The method involves modifying SIP messages originating from the application to indicate the use of a secure communications protocol. - These modified SIP messages are then sent to the external SIP device over the established secure communication session.

Abstract

Using a service mesh in a cluster of a communications network to carry out mutual authentication between a session initiation protocol SIP compliant application in the cluster and a SIP device external to the cluster is described. The mutual authentication is accomplished using a certificate of the application that matches a naming system name used for the application. In response to the mutual authentication succeeding, a secure communication session is established between the application and the SIP device external to the cluster. The method comprises modifying SIP messages originating from the application to indicate that a secure communications protocol is in use. The modified SIP message are sent to the SIP device external to the cluster over the secure communication session.

ANOMALOUS PATTERN DETECTION FOR CONTROL OF COMPUTER NETWORKS (18020909)

Main Inventor

Ananth GEETHANATH


Brief explanation

The patent application describes a system and method for detecting anomalies in a data stream.
  • The system receives a data stream that contains values of metrics derived from observations of a computing entity's operation over a specific time window.
  • A model is created using the variances of the data over the time window, which helps identify operating thresholds for each metric in the data stream.
  • The system computes a steady state distance matrix of the data stream and determines if it exceeds a steady state threshold.
  • If the steady state distance matrix exceeds the threshold, the system computes a pattern distance matrix based on the steady state distance matrix.
  • The anomaly in the data stream is detected based on the pattern distance matrix.
  • Finally, the system generates an alert to indicate the presence of an anomaly.

Abstract

A system and method for detecting anomalies in a data stream is described. The system receives the data stream that comprises values of metrics derived from observations of operation of a computing entity over a time window. A model comprising variances of the data over the time window is formed. The model identifies operating thresholds for each metric based on the variances of the data for each metric in the data stream. The system computes a steady state distance matrix of the data stream. The system determines that the steady state distance matrix exceeds a steady state threshold. In response to determining that the steady state distance matrix exceeds the steady state threshold, the system computes a pattern distance matrix based on the steady state distance matrix. The anomaly in the data stream is detected based on the pattern distance matrix. The system generates an alert indicating the anomaly.

LINKED FILE ENGAGEMENT (18219486)

Main Inventor

Samuel Robert CUNDALL


Brief explanation

The patent application describes methods and systems for providing a consolidated view of reactions to content across multiple sharing locations of a network-based content sharing service.
  • The system can track and determine reactions to content from different sharing locations within a single content sharing service or across multiple services.
  • Reactions from sharing locations accessible by a user can be aggregated and displayed to that user.
  • Reactions may also be viewable from all sources, regardless of user access.
  • The invention aims to provide an aggregated and comprehensive view of reactions to content across various sharing locations.

Abstract

Disclosed in some examples are methods, systems, machine-readable mediums, and devices for providing an aggregated view of reactions to content across multiple sharing locations of a network-based content sharing service and in some examples across multiple sharing locations of multiple network-based content sharing services. The system may track or determine reactions across different sharing locations of a single content sharing service (such as a unified communication service) or across multiple services. In some examples, only reactions to the content that are from sharing locations accessible by a particular user are aggregated and displayed to the particular user. In other examples, reactions may be viewable from all sources regardless of access by a user.

AMPLITUDE AND BIPHASE CONTROL OF MEMS SCANNING DEVICE (18218940)

Main Inventor

Michael Edward SAMPLES


Brief explanation

The patent application describes a MEMS scanning device that uses laser projectors and scanning mirrors to generate a raster scan on a display. The device also includes a thermometer to detect the current temperature and a display observing camera to capture images of the display.
  • The device uses laser projectors and scanning mirrors to create a raster scan on a display.
  • A thermometer is used to detect the current temperature.
  • A display observing camera captures images of the display.
  • The captured images are used to extract features.
  • The extracted features are compared with ideal features to identify any discrepancies.
  • If the identified discrepancy is above a certain threshold, temperature models are updated accordingly.
  • The temperature models are custom-built using machine learning algorithms.
  • This innovation allows for more accurate temperature modeling and adjustment in the MEMS scanning device.

Abstract

A MEMS scanning device (“Device”) includes at least (1) laser projector(s) controlled by a laser drive to project a laser beam, (2) MEMS scanning mirror(s) controlled by a MEMS drive to scan the laser beam to generate a raster scan, (3) a display configured to receive the raster scan, (4) a thermometer configured to detect a current temperature, (5) a display observing camera configured to capture an image of a predetermined area of the display, and (6) a computer-readable media that stores temperature model(s), each of which is custom-built using machine learning. The device uses the display observing camera to capture image(s) of predetermined pattern(s), which are then used to extract feature(s). The extracted feature(s) are compared with ideal feature(s) to identify a discrepancy. When the identified discrepancy is greater than a threshold, the temperature model(s) are updated accordingly.

RULES FOR INTRA-PICTURE PREDICTION MODES WHEN WAVEFRONT PARALLEL PROCESSING IS ENABLED (18218796)

Main Inventor

Bin Li


Brief explanation

The abstract describes various innovations that enhance the use of intra-picture prediction modes in video encoding and decoding when wavefront parallel processing (WPP) is enabled.
  • Intra-picture prediction modes include palette prediction mode, intra block copy mode, intra line copy mode, and intra string copy mode.
  • The innovations focus on enabling an encoder or decoder to efficiently utilize these prediction modes when WPP is enabled.
  • For palette coding/decoding mode, the encoder or decoder predicts a palette for a unit in a current WPP row using previous palette data from a unit in a previous WPP row.
  • This allows for more accurate and efficient encoding or decoding of palette information in the video.
  • For intra copy modes (e.g., intra block copy mode, intra string copy mode, intra line copy mode), the encoder enforces constraints specific to WPP, ensuring the encoded data adheres to the requirements of WPP.
  • Similarly, the decoder receives and decodes encoded data that satisfies the constraints imposed by WPP.
  • These innovations improve the overall performance and efficiency of video encoding and decoding when utilizing intra-picture prediction modes with WPP enabled.

Abstract

Various innovations facilitate the use of intra-picture prediction modes such as palette prediction mode, intra block copy mode, intra line copy mode and intra string copy mode by an encoder or decoder when wavefront parallel processing (“WPP”) is enabled. For example, for a palette coding/decoding mode, an encoder or decoder predicts a palette for an initial unit in a current WPP row of a picture using previous palette data from a previous unit in a previous WPP row of the picture. Or, as another example, for an intra copy mode (e.g., intra block copy mode, intra string copy mode, intra line copy mode), an encoder enforces one or more constraints attributable to the WPP, or a decoder receives and decodes encoded data that satisfies one or more constraints attributable to WPP.

ENCRYPTED FLOW OF SIM DATA BETWEEN REGIONS AND EDGE NETWORKS (17733831)

Main Inventor

Prateek MITTAL


Brief explanation

The abstract describes a system where multiple computing devices are provisioned to communicate on a mobile communications network operated by an edge computing network. The edge computing network belongs to a customer of a computing service provider and extends computing resources to the customer.
  • The system allows the customer to select a SIM provider and the number of SIM profiles needed for the computing devices to access the mobile communications network.
  • The system receives SIM data corresponding to the selected number of SIM profiles.
  • The received SIM data is encrypted and transmitted over an encrypted channel.

Abstract

A plurality of computing devices are provisioned configured to communicate on a mobile communications network operated, in part, by an edge computing network. The edge computing network is associated with a customer of a computing service provider. The edge computing network comprises computing and storage devices configured to extend computing resources of the computing service provider to the customer of the computing service provider. A selection is received of a SIM provider and a quantity of SIM profiles for enabling the plurality of computing devices to access the mobile communications network. SIM data corresponding to the quantity of SIM profiles is received. The SIM data is encrypted and received over an encrypted channel.

SYSTEMS AND METHODS FOR MANUFACTURING ELECTRONIC DEVICE HOUSINGS (18221239)

Main Inventor

Zhicong YAO


Brief explanation

- The patent application describes a method of manufacturing an electronic device housing.

- The method involves obtaining a monolithic body made of RF transparent material. - The surface of the monolithic body is then plated with a nanograin coating. - The purpose of the nanograin coating is to increase the structural rigidity of the monolithic body. - After plating, a portion of the nanograin coating is removed to create an RF window. - The RF window allows for the transmission of radio frequency signals. - The innovation lies in the use of the nanograin coating to enhance the structural integrity of the housing while maintaining RF transparency. - The method provides a solution for manufacturing electronic device housings that require both structural rigidity and RF transparency.

Abstract

A method of manufacturing an electronic device housing includes obtaining a monolithic body of RF transparent material and plating a surface of the monolithic body with a nanograin coating to increase the structural rigidity of the monolithic body. A portion of the nanograin coating is thereafter removed to create an RF window.

METHOD OF PATTERNING A LAYER OF SUPERCONDUCTOR MATERIAL (18044780)

Main Inventor

Asbjørn Cennet Cliff DRACHMANN


Brief explanation

- The patent application describes a method for patterning a layer of superconductor material without using a chemical etch.

- The method involves forming a mask over the superconductor material and depositing a layer of anodizable metal in the openings of the mask. - The mask is then removed, and anodic oxidation is performed, where the layer of anodizable metal protects the superconductor material from oxidation. - The superconductor material used in this method is aluminum. - This method allows for improved resolution in patterning the superconductor material and avoids damage to other components or interfaces. - The patent application also mentions the use of a titanium layer to protect an aluminum layer from anodic oxidation. - The method described in the patent application can be used to obtain a semiconductor-superconductor hybrid device.

Abstract

A method of patterning a layer of superconductor material comprises: forming a mask over the layer of superconductor material, the mask having at least one opening; depositing a layer of anodizable metal in the at least one opening, over a portion of the layer of superconductor material; removing the mask; and performing anodic oxidation, whereby the layer of anodizable metal protects the portion of the layer of the superconductor material from the anodic oxidation. The superconductor material is aluminium. The method allows for patterning of the superconductor material without the use of a chemical etch. This may in turn allow for improvements in resolution, and/or may avoid damage to further components or interfaces between components which may be present during the patterning. Also provided are the use of a titanium layer to protect an aluminium layer from anodic oxidation, and a semiconductor-superconductor hybrid device obtainable by the method.