Microsoft Technology Licensing, LLC patent applications published on December 28th, 2023

From WikiPatents
Revision as of 16:48, 1 January 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Contents

Patent applications for Microsoft Technology Licensing, LLC on December 28th, 2023

Adaptable Input Devices (17846277)

Main Inventor

James A. TRZASKOS


Brief explanation

The patent application describes input devices that can be attached to and used to control various devices. One example is a device with controls on its top surface and a recess underneath. It has a self-adjusting gripping mechanism that extends into the recess and can grip devices of different thicknesses. 
  • Input devices that can be secured to and used to control various devices
  • Example input device with controls on top surface and a recess underneath
  • Self-adjusting gripping mechanism extends into the recess and can grip devices of different thicknesses
  • Gripping mechanism is biased towards the top surface
  • Can be contacted by devices with a range of thicknesses
  • Grips individual devices within the range of thicknesses between the gripping mechanism and the top surface

Potential Applications

This technology can have various applications in different industries and fields, including:

  • Gaming consoles and controllers
  • Smart home devices and automation systems
  • Industrial control systems
  • Virtual reality and augmented reality devices
  • Medical equipment and devices
  • Automotive controls and interfaces

Problems Solved

The technology addresses several problems related to input devices and their compatibility with different devices:

  • Ensures secure attachment and control of various devices
  • Accommodates devices with different thicknesses
  • Provides a self-adjusting gripping mechanism for easy and efficient use
  • Eliminates the need for multiple input devices for different devices

Benefits

The patent application offers several benefits for users and manufacturers:

  • Versatile input device that can be used with a wide range of devices
  • Easy and secure attachment to different devices
  • Simplifies the control and operation of various devices
  • Reduces the need for multiple input devices, saving costs and space
  • Provides a comfortable and ergonomic user experience

Abstract

The description relates to input devices that can be secured to and used to control various devices. One example input device can include a housing defining a top surface that includes controls. The housing can define a recess that includes generally opposing upper and lower surfaces that extends at least partially under and parallel to the top surface. A self-adjusting gripping mechanism can extend into the recess through the lower surface and can be biased toward the upper surface. The self-adjusting gripping mechanism can be configured to be contacted by devices having a range of thicknesses and configured to grip individual devices within the range of thicknesses between the self-adjusting gripping mechanism and the upper surface.

STREAMING CHANNEL PERSONALIZATION (18130755)

Main Inventor

Mayank MISHRA


Brief explanation

The present disclosure is about devices and methods for personalizing channel parameters for streaming content to a client device. This is done by dynamically adjusting channel parameters based on learned user preferences. 
  • The devices and methods receive context information from a client device.
  • They send a rank and reward call to a reinforcement learning system for a recommendation on the value of the channel parameters.
  • The rank and reward call includes context information, a user vector, an item vector, and a reward function error.
  • The reinforcement learning system uses this information to provide a recommendation for the value of the channel parameters.
  • The devices and methods then use this recommendation to set the value of the channel parameters for streaming content to the client device.

Potential Applications

  • Personalized streaming services: This technology can be used by streaming platforms to personalize the channel parameters for each user, providing a tailored streaming experience.
  • Content recommendation systems: By learning user preferences and adjusting channel parameters accordingly, this technology can enhance content recommendation systems, improving the accuracy and relevance of recommendations.

Problems Solved

  • Lack of personalization: Traditional streaming services often provide a one-size-fits-all approach, without considering individual user preferences. This technology solves this problem by dynamically adjusting channel parameters based on learned user preferences.
  • Inaccurate content recommendations: By using reinforcement learning and user feedback, this technology addresses the issue of inaccurate content recommendations, ensuring that users receive content that aligns with their preferences.

Benefits

  • Enhanced user experience: By personalizing channel parameters, users can enjoy a streaming experience that is tailored to their preferences, resulting in higher satisfaction.
  • Improved content discovery: With more accurate content recommendations, users can discover new content that aligns with their interests, leading to increased engagement and exploration of the streaming platform's library.
  • Increased user retention: By providing a personalized and relevant streaming experience, this technology can help streaming platforms retain users and reduce churn rates.

Abstract

The present disclosure relates to devices and methods for personalizing channel parameters for streaming content to a client device by dynamically adjusting channel parameters in response to learned user preferences. The devices and methods may receive context information from a client device and may send a rank and reward call to a reinforcement learning system for a recommendation for a value of the channel parameters. The rank and reward call may include the context information, a user vector, an item vector and a reward function error. The reinforcement learning system may use the information provided in the rank and reward call to the provide a recommendation for the value of the channel parameters. The devices and methods may use the recommendation to set the value of the channel parameters to stream the content to the client device.

IDENTIFYING VEHICLE FILLING STATIONS AND GENERATING RELATED VISUAL INDICATIONS (17852030)

Main Inventor

Leon Oliver STENNETH


Brief explanation

Methods and systems for identifying vehicle filling stations and generating related visual indications are described in this patent application. The technology involves receiving vehicle data that includes information about the location and fuel/charge level changes of multiple vehicles. From this data, a subset is extracted that specifically relates to the location and fuel/charge level changes when they increase. Based on this information, the technology identifies the locations of vehicles that are filling up their fuel or charge. It then generates visual indications corresponding to these identified locations.
  • Vehicle data is received, including location and fuel/charge level changes.
  • A subset of data is extracted, focusing on location and fuel/charge level increases.
  • Locations of vehicles filling up are identified based on the extracted data.
  • Visual indications are generated to represent these identified locations.

Potential Applications

  • Navigation systems can use this technology to provide real-time information about nearby filling stations to drivers.
  • Electric vehicle charging networks can utilize this technology to identify charging stations that are currently in use and provide availability information to users.
  • Fleet management systems can benefit from this technology by monitoring the fueling activities of their vehicles and optimizing routes accordingly.

Problems Solved

  • This technology solves the problem of identifying vehicle filling stations in real-time, providing convenience to drivers and improving their overall experience.
  • It addresses the challenge of efficiently managing electric vehicle charging stations by identifying their usage and availability.
  • Fleet management systems can effectively monitor fueling activities and optimize operations based on this information.

Benefits

  • Drivers can easily locate nearby filling stations, saving time and reducing the risk of running out of fuel or charge.
  • Electric vehicle owners can quickly find available charging stations, ensuring they can charge their vehicles when needed.
  • Fleet managers can optimize routes and fueling activities, leading to cost savings and improved efficiency.

Abstract

Methods and systems for identifying vehicle filling stations and generating related visual indications are provided. In some examples, vehicle data is received that corresponds to a plurality of vehicles. From the vehicle data, a first subset of data is extracted that corresponds to location data and one of a fuel or charge level state change of each of the plurality of vehicles. One or more locations of one or more of the plurality of vehicles are identified, based on the location data, when the fuel or charge level state change corresponds to an increase in a fuel or charge level of the one or more of the plurality of vehicles. One or more visual indications are generated that correspond to the identified one or more locations.

LITHOGRAPHIC STRAIN GAUGE IN AN ELECTRICALLY CONDUCTING SUBSTRATE (17849453)

Main Inventor

Luke Thomas GREGORY


Brief explanation

The abstract describes a patent application for an electrically conducting substrate with multiple layers. A strain gauge is deposited on one of the layers to measure the stress and/or strain of the substrate. This allows the strain gauge to detect any deformation, cracking, or breaking caused by the stress or strain.
  • The patent application is for an electrically conducting substrate with multiple layers.
  • A strain gauge is deposited on one of the layers.
  • The strain gauge measures the stress and/or strain of the substrate.
  • The strain gauge can detect any deformation, cracking, or breaking caused by the stress or strain.

Potential Applications

  • Structural monitoring in buildings, bridges, and other infrastructure.
  • Monitoring the integrity of electronic components and circuit boards.
  • Quality control in manufacturing processes.
  • Monitoring the health and performance of mechanical systems.

Problems Solved

  • Allows for early detection of deformation, cracking, or breaking in the substrate.
  • Provides real-time monitoring of stress and strain.
  • Helps prevent catastrophic failures and accidents.
  • Enables proactive maintenance and repairs.

Benefits

  • Improved safety and reliability of structures and systems.
  • Cost savings through early detection and prevention of failures.
  • Enhanced performance and longevity of electronic components.
  • Increased efficiency in manufacturing processes.

Abstract

An electrically conducting substrate includes a plurality of layers. A strain gauge is deposited on a layer of the plurality of layers. The strain gauge measures the stress and/or strain of the electrically conducting substrate. This allows the strain gauge to determine whether a stress or strain of the electrically conducting substrate has caused the electrically conducting substrate to deform, crack, or break.

LEAK DETECTION SYSTEM FOR THERMAL INTERFACE FLUID (17849442)

Main Inventor

Rick Chun Kit CHEUNG


Brief explanation

The abstract describes a leak detection system for a thermal interface material (TIM) used in electronic devices. The system includes a sensor placed near a processor to detect any leakage of the TIM. This allows the operator to identify and prevent damage to the processor or other electronic components.
  • The system includes a sensor located close to a processor.
  • The sensor detects the presence of a thermal interface material (TIM) that may leak out of the gap between the processor and a thermal management device.
  • The detection of TIM leakage helps the operator identify and prevent damage to the processor or other electronic components.
  • The system is designed to detect thermal fluctuations or other events that may cause the TIM to flow out of the gap.
  • The leak detection system provides an early warning system for TIM leaks, allowing for timely maintenance or repairs.

Potential Applications

  • Electronic devices that utilize thermal interface materials, such as computers, servers, gaming consoles, or mobile devices.
  • Industrial equipment or machinery that requires thermal management and uses TIMs.
  • Automotive applications where TIMs are used for heat dissipation in electronic components.

Problems Solved

  • TIM leaks can lead to damage or malfunction of electronic components, especially processors.
  • Identifying TIM leaks can be challenging, as they may not be visible or easily detectable.
  • Early detection of TIM leaks can prevent costly repairs or replacements of electronic components.

Benefits

  • Prevents or reduces damage to processors and other electronic components.
  • Provides an early warning system for TIM leaks, allowing for timely maintenance.
  • Increases the lifespan and reliability of electronic devices.
  • Reduces the risk of overheating and potential safety hazards.

Abstract

A leak detection system for a thermal interface material (TIM) includes a sensor located proximate to a processor. As thermal fluctuations or other events cause the TIM to flow out of the gap between the processor and a thermal management device, a leak detection sensor may detect the presence of the TIM. This allows an operator of the computing device to identify TIM leaks, thereby preventing or reducing damage to the processor or other electronic components of a computing device.

ALLOCATING POWER BETWEEN OVERHEAD, BACKUP, AND COMPUTING POWER SERVICES (17849054)

Main Inventor

Ehsan NASR AZADANI


Brief explanation

Abstract:

A power controller in a datacenter reallocates power from overhead systems and backup power to computing power, increasing the overall utilization of the datacenter.

Patent/Innovation:

  • Power controller allocates input power in a datacenter.
  • Allocates power between computing power, backup power, and overhead power.
  • Reallocates overhead power and/or backup power to computing power.
  • Increases overall utilization of the datacenter.
  • Allows additional processing power of servers to be used.

Potential Applications:

  • Datacenters
  • Cloud computing facilities
  • Server farms

Problems Solved:

  • Inefficient power allocation in datacenters
  • Underutilization of computing power in servers

Benefits:

  • Increased overall utilization of datacenters
  • Improved efficiency in power allocation
  • Additional processing power available for computing services

Abstract

A power controller allocates input power to a datacenter between computing power for computing services, backup power, and overhead power for overhead systems. The power controller reallocates the overhead power and/or the backup power to the computing power. This may increase the overall utilization of the datacenter by allowing additional processing power of the servers to be used.

DEVICES, SYSTEMS, AND METHODS FOR MONITORING AN ELECTRONIC DEVICE IN TRANSIT (17849465)

Main Inventor

Luke Thomas GREGORY


Brief explanation

==Abstract==

A status monitoring system is described that is capable of monitoring the status of an electronic circuit. If the system detects a status that exceeds a certain threshold, it will record the details of the event on the electronic circuit. During transportation from a manufacturing facility to an installation location, the system operates in a low-power mode.

Patent/Innovation Explanation

  • The system includes a status sensor that monitors the status of an electronic circuit.
  • If the system detects a status that goes beyond a predefined threshold, it will record the event details on the electronic circuit.
  • During transportation, the system operates in a low-power mode to conserve energy.

Potential Applications

  • This technology can be applied in various industries where monitoring the status of electronic circuits is crucial, such as aerospace, automotive, and telecommunications.
  • It can be used in manufacturing facilities to ensure the quality and reliability of electronic circuits during transportation.

Problems Solved

  • The system solves the problem of monitoring the status of electronic circuits during transportation, where they may be subjected to various environmental factors and potential damage.
  • It addresses the need for a low-power mode during transit to conserve energy and prolong the system's battery life.

Benefits

  • The status monitoring system provides real-time monitoring of electronic circuit status, allowing for prompt action in case of any issues.
  • By recording event details on the electronic circuit, it enables easy identification and analysis of any problems that may have occurred during transportation.
  • The low-power mode during transit helps to optimize energy usage and extend the system's operational lifespan.

Abstract

A status monitoring system includes a status sensor configured to monitor a status of an electronic circuit. If the status monitoring system detects a status that exceeds a threshold, the status monitoring system records the details of the event on the electronic circuit. The status monitoring system operates in a low-power power mode during transit from a manufacturing facility to an installation location.

DETERMINING CHARGE ON A FACIAL-TRACKING SENSOR (17809520)

Main Inventor

Charles Walter BOECKER


Brief explanation

The abstract describes a patent application that relates to determining capacitance based on the charge accumulated on a sense capacitor electrode. The invention is a head-mounted device that includes a facial-tracking sensor, a controller, and a charge sensing circuit connected to the sensor. The sensor has a sense capacitor electrode that is positioned near the surface of a face and forms a capacitance based on the distance between the electrode and the face. The controller applies a reference voltage to the electrode, and the charge sensing circuit determines the capacitance by measuring the amount of charge accumulated on the electrode due to the reference voltage.
  • The invention is a head-mounted device with a facial-tracking sensor.
  • The sensor has a sense capacitor electrode that forms a capacitance based on the distance between the electrode and the face.
  • The controller applies a reference voltage to the electrode.
  • The charge sensing circuit determines the capacitance by measuring the charge accumulated on the electrode due to the reference voltage.

Potential Applications

  • Facial recognition technology
  • Virtual reality and augmented reality applications
  • Gaming and interactive experiences
  • Biometric authentication systems

Problems Solved

  • Accurate measurement of capacitance based on the charge accumulated on a sense capacitor electrode
  • Improved facial tracking and sensing capabilities
  • Enhanced user experience in various applications

Benefits

  • Accurate and reliable determination of capacitance
  • Improved facial tracking and sensing accuracy
  • Enhanced user experience in facial recognition, virtual reality, and gaming applications
  • Potential for more secure and efficient biometric authentication systems

Abstract

Examples are disclosed that relate to determining a capacitance based on a charge accumulated on a sense capacitor electrode. One example provides a head-mounted device comprising a facial-tracking sensor, a controller, and a charge sensing circuit connected to the facial-tracking sensor. The facial-tracking sensor comprises a sense capacitor electrode configured to be positioned proximate to a surface of a face and form a capacitance based upon a distance between the sense capacitor electrode and the surface of the face, and the controller configured to apply a reference voltage to the sense capacitor electrode. The charge sensing circuit is configured to determine the capacitance of the sense capacitor electrode by determining an amount of charge accumulated on the sense capacitor electrode resulting from the reference voltage.

GESTURE RECOGNITION BASED ON LIKELIHOOD OF INTERACTION (18463906)

Main Inventor

Julia SCHWARZ


Brief explanation

The patent application describes a method for evaluating gesture input using neural networks. Here are the key points:
  • The method involves receiving input data for sequential data frames, including hand tracking data for a user's hands.
  • A first neural network is trained to recognize features that indicate subsequent gesture interactions.
  • The first neural network evaluates the input data for a sequence of data frames and outputs the likelihood of the user performing gesture interactions within a specific window of data frames.
  • A second neural network is trained to recognize features that indicate whether the user is currently performing one or more gesture interactions.
  • The second neural network adjusts parameters for gesture interaction recognition based on the indicated likelihood from the first neural network.
  • The second neural network evaluates the predetermined window of data frames for performed gesture interactions using the adjusted parameters.
  • The second neural network then outputs a signal indicating whether the user is performing one or more gesture interactions during the predetermined window.

Potential applications of this technology:

  • Gesture-based user interfaces for electronic devices such as smartphones, tablets, or computers.
  • Virtual reality and augmented reality applications that rely on gesture input for interaction.
  • Gaming systems that use gestures as a control mechanism.

Problems solved by this technology:

  • Accurately recognizing and evaluating gesture interactions in real-time.
  • Adjusting parameters for gesture recognition based on the likelihood of gesture interactions.
  • Providing a reliable and efficient method for detecting and analyzing gesture input.

Benefits of this technology:

  • Improved user experience by allowing natural and intuitive gesture-based interactions.
  • Increased accuracy and reliability in recognizing and evaluating gesture input.
  • Real-time feedback on whether the user is performing gesture interactions.
  • Adaptability to different users and environments by adjusting parameters based on the likelihood of gesture interactions.

Abstract

A method for evaluating gesture input comprises receiving input data for sequential data frames, including hand tracking data for hands of a user. A first neural network is trained to recognize features indicative of subsequent gesture interactions and configured to evaluate input data for a sequence of data frames and to output an indication of a likelihood of the user performing gesture interactions during a predetermined window of data frames. A second neural network is trained to recognize features indicative of whether the user is currently performing one or more gesture interactions and configured to adjust parameters for gesture interaction recognition during the predetermined window based on the indicated likelihood. The second neural network evaluates the predetermined window for performed gesture interactions based on the adjusted parameters, and outputs a signal as to whether the user is performing one or more gesture interactions during the predetermined window.

DETERMINING AND PRESENTING ACCESS KEYS FOR A CURRENT KEYBOARD LAYOUT (17850736)

Main Inventor

Daniel William JACOBS


Brief explanation

The present disclosure is about a system that enhances accessibility to access keys on different keyboard layouts or character input devices. It involves determining access key characters to display on a graphical user interface (GUI) based on specific keys on a particular keyboard layout. This allows individuals to use access keys with any type of keyboard or input device.
  • The system provides enhanced accessibility to access keys on different keyboard layouts or character input devices.
  • It determines access key characters to display on a GUI based on specific keys on a particular keyboard layout.
  • The access key characters can be of any type, not limited to Latin-based characters.
  • The system enables individuals to use access keys with any type of keyboard or input device.

Potential Applications

  • This technology can be used in computer software or operating systems to improve accessibility for individuals with different keyboard layouts or input devices.
  • It can be applied in mobile devices, tablets, or other touch screen devices to enhance accessibility for users with different input methods.
  • The system can be used in virtual keyboards or on-screen keyboards to provide access key characters for users with different language preferences.

Problems Solved

  • This technology solves the problem of limited accessibility to access keys on different keyboard layouts or input devices.
  • It addresses the challenge of providing access key characters for individuals with non-Latin-based keyboard layouts or input devices.
  • The system solves the issue of compatibility between access keys and various types of keyboards or input devices.

Benefits

  • The system improves accessibility for individuals with different keyboard layouts or input devices.
  • It allows users to easily access access key characters regardless of their language preferences or keyboard type.
  • The technology provides a more inclusive and user-friendly experience for individuals with diverse input methods.

Abstract

The present disclosure relates to systems, methods, and computer-readable media for providing enhanced accessibility to access keys across a variety of keyboard layouts (or other character input devices). In particular, systems described herein involve determining access key characters to display in conjunction with selectable inputs via a graphical user interface (GUI) of a computing device where the access key characters are selectively determined based on display characters that are mapped to specific keys on a particular keyboard layout. This enables access key characters of all kinds (not limited to Latin-based types) to be provided in conjunction with selectable icons in a way that enables an individual to use the access keys with any type of keyboard or other input device.

WIRELESS UPLINK COMMUNICATION SYSTEM (18066466)

Main Inventor

Nir DAVID


Brief explanation

The disclosed technology is a system for controlling a digital inking device. It allows the device to communicate electrostatic inking signals with an ink-receiving computing device, enabling the digital inking device to render digital ink on the display of the computing device. 
  • The technology detects the proximity of a peripheral communication device to the digital inking device.
  • When the peripheral device is detected, the digital inking device transitions from the inking mode to a non-inking mode.
  • In the non-inking mode, the communication of electrostatic inking signals between the digital inking device and the ink-receiving computing device is terminated.
  • Instead, the digital inking device communicates electrostatic data signals with the peripheral communication device in the non-inking mode.

Potential applications of this technology:

  • Digital note-taking devices that can seamlessly switch between inking and non-inking modes.
  • Collaborative work environments where multiple digital inking devices can interact with a central computing device.
  • Interactive whiteboards or displays that can be controlled by digital inking devices.

Problems solved by this technology:

  • Seamless transition between inking and non-inking modes without interrupting the user's workflow.
  • Efficient communication between digital inking devices and peripheral communication devices.
  • Simplified control and interaction between digital inking devices and ink-receiving computing devices.

Benefits of this technology:

  • Enhanced user experience with digital inking devices.
  • Improved productivity and collaboration in various settings.
  • Flexibility in using digital inking devices for different purposes.

Abstract

The disclosed technology controls a digital inking device by communicating electrostatic inking signals between the digital inking device and an ink-receiving computing device in an inking mode enabling the digital inking device to render digital ink in a display of the ink-receiving computing device via the electrostatic inking signals, detecting proximity of a peripheral communication device relative to the digital inking device, transitioning the digital inking device from the inking mode to a non-inking mode that terminates communication of the electrostatic inking signals between the digital inking device and the ink-receiving computing device, based at least in part on the detecting operation, and communicating electrostatic data signals in the non-inking mode between the digital inking device and the peripheral communication device in the non-inking mode, based at least in part on the transitioning to the non-inking mode.

MOUSE INPUT FUNCTION FOR PEN-SHAPED WRITING, READING OR POINTING DEVICES (18464195)

Main Inventor

Yoram BENDAVID


Brief explanation

The abstract describes an invention for a pen-like device that can be used as a computer mouse. It includes an optical sensor, a clickable button, and a connection to a computer.
  • The invention is a pen-type handheld device that can be used for writing, reading, or pointing, and can also function as a computer mouse.
  • The device includes an optical sensor, which allows it to track movement on a surface.
  • A portion of the optical sensor surface can be clicked like a button, providing additional functionality.
  • The device is designed to connect to a computing device, such as a computer or tablet.
  • The invention provides a structure and function that enables the device to perform operations similar to a computer mouse.

Potential Applications

  • This technology can be used in various industries, such as graphic design, architecture, and engineering, where precise pointing and drawing capabilities are required.
  • It can also be used in educational settings, allowing teachers and students to interact with digital content more intuitively.
  • The device can be utilized in virtual reality or augmented reality applications, providing a more natural and immersive user experience.

Problems Solved

  • The invention solves the problem of limited functionality in traditional pen-type devices by adding mouse-like capabilities.
  • It eliminates the need for a separate computer mouse, reducing clutter and simplifying the user's workspace.
  • The device solves the problem of limited precision and control when using touchscreens, providing a more accurate input method.

Benefits

  • The pen-type device offers a compact and portable solution for users who require both writing and mouse-like functionality.
  • It allows for more precise and accurate pointing, making it easier to navigate and interact with digital content.
  • The device provides a familiar and comfortable user experience, as it combines the functionality of a pen with that of a computer mouse.

Abstract

An apparatus and method for providing a structure and function to a pen-type handheld writing, reading or pointing device to enable usage of the device to perform operations similar to a computer mouse for a computing device. The structure includes an optical sensor, a portion of the optical sensor surface that can perform operations of a clickable button, and a structure to support a connection to the computing device.

TOUCHSCREEN SENSOR CALIBRATION USING ADAPTIVE NOISE CLASSIFICATION (17808278)

Main Inventor

Hanan GRINBERG


Brief explanation

The abstract describes a method for calibrating the noise level of a touchscreen interface on a computing device. The method involves identifying antenna regions with high and low energy signal levels, discarding signal level information from high energy regions, and determining the noise level based on signals from low energy regions. The digitizer is then calibrated by reducing the energy levels of signals in all antenna regions by the determined noise level.
  • The method actively and adaptively calibrates the base noise level of a touchscreen interface.
  • Antenna regions forming the digitizer are allocated and categorized based on signal energy levels.
  • High energy antenna regions are identified and their signal level information is discarded.
  • The noise level caused by electrical components of the computing device is determined using low energy antenna regions.
  • The digitizer is calibrated by reducing the energy levels of signals in all antenna regions by the determined noise level.

Potential Applications

  • Touchscreen devices such as smartphones, tablets, and laptops could benefit from improved noise calibration.
  • This technology could be applied to various industries that utilize touchscreen interfaces, such as automotive, healthcare, and gaming.

Problems Solved

  • Touchscreen interfaces often suffer from noise interference, which can affect accuracy and responsiveness.
  • Existing calibration methods may not effectively account for varying noise levels in different antenna regions.
  • This technology solves the problem of accurately calibrating the noise level of a touchscreen interface by dynamically identifying and discarding high energy signal regions.

Benefits

  • Improved accuracy and responsiveness of touchscreen interfaces.
  • Enhanced user experience with reduced noise interference.
  • Increased reliability and performance of touchscreen devices.
  • Adaptability to different noise levels in different antenna regions.

Abstract

A base noise level of a touchscreen interface for a computing device is actively and adaptively calibrated. Antenna traces forming a digitizer of the touchscreen interface are allocated into antenna regions. Antenna regions with high energy signal levels and antenna regions with low energy signal levels are identified. Signal level information from high energy antenna regions is discarded. A noise level, caused by electrical components of the computing device, is determined within signals generated in the antenna traces based at least in part upon the low energy antenna regions. The digitizer is calibrated by reducing energy levels of signals carried by the antenna traces in all antenna regions by the noise level.

PIXEL-BASED AUTOMATED TESTING OF A NAVIGABLE SIMULATED ENVIRONMENT (18353327)

Main Inventor

Guoqing LIU


Brief explanation

The abstract describes a computing system that uses pixel-based automated testing to detect errors in a simulated environment. Here are the key points:
  • The system uses one or more processors to execute an application testing program during runtime.
  • The application testing program includes a machine learning model trained to detect errors in the application being tested.
  • The system processes a screen image of the simulated environment using an object detection module.
  • The object detection module determines if a key object is present in the screen image.
  • If a key object is detected, an object investigation module is executed to generate investigation inputs for further analysis.
  • If a key object is not detected, an environment exploration module is executed to generate simulated user input to explore the environment.
  • The system aims to identify errors in the application under test by analyzing the presence or absence of key objects in the simulated environment.

Potential applications of this technology:

  • Software testing: The system can be used to automate the testing of applications by detecting errors in a simulated environment.
  • Quality assurance: It can help ensure the quality and reliability of software by identifying and investigating potential issues.
  • Bug detection: The system can be used to detect and investigate bugs or glitches in software applications.
  • User experience testing: By simulating user input and analyzing the resulting environment, the system can assess the user experience of an application.

Problems solved by this technology:

  • Manual testing limitations: The system automates the testing process, reducing the need for manual testing and potentially saving time and resources.
  • Error detection: By using machine learning and object detection, the system can identify errors or anomalies in the application being tested.
  • Efficient investigation: The system generates investigation inputs to further analyze and investigate potential errors, allowing for more efficient debugging.

Benefits of this technology:

  • Increased efficiency: Automated testing can be faster and more efficient than manual testing, allowing for quicker identification of errors.
  • Improved accuracy: The machine learning model and object detection module can provide accurate detection of errors in the application.
  • Cost savings: By automating the testing process, the system can potentially reduce the need for manual testers, leading to cost savings.
  • Enhanced user experience: By identifying and addressing errors, the system can help improve the overall user experience of software applications.

Abstract

A computing system for pixel-based automated testing of a navigable simulated environment includes one or more processors configured to execute, in a run-time inference phase, an application testing program. The application testing program includes a machine learning model trained to detect errors in the application under test. A screen image of the simulated environment is processed by an object detection module to determine if a key object is present in the screen image. If a key object is present in the screen image, the application testing program executes an object investigation module to generate investigation inputs to investigate the key object. If a key object is not present in the screen image, the application testing program executes an environment exploration module to generate an environment exploration action to be provided to the application under test as simulated user input.

DEFERRED DECISIONS IN WEB BROWSER (17808885)

Main Inventor

Felix ANDREW


Brief explanation

The patent application describes a method for deferring interactions with web data by using a browser-based notes application. Here is a simplified explanation of the abstract:
  • The method starts with a web browser displaying a web page.
  • When a user selects a quick note link within the web browser, the browser receives a payload containing note properties.
  • Based on this payload, a browser-based notes application is launched within the web browser.
  • The payload is transmitted to the notes application, which creates a new note.
  • The note is then displayed within the web browser alongside the web page.

Potential applications of this technology:

  • Enhancing productivity by allowing users to quickly take notes while browsing the web.
  • Facilitating organization and information management by providing a seamless way to capture and store web-based information.
  • Supporting collaboration by enabling users to easily share and collaborate on web-based notes.

Problems solved by this technology:

  • Users often need to take notes while browsing the web, but switching between different applications can be cumbersome and disrupt the workflow.
  • Existing note-taking applications may not integrate well with web browsers, making it difficult to capture and reference web-based information efficiently.

Benefits of this technology:

  • Streamlines the note-taking process by eliminating the need to switch between different applications.
  • Improves organization and accessibility of web-based information by keeping notes within the same browser environment.
  • Enhances collaboration by allowing users to share and collaborate on web-based notes in real-time.

Abstract

Systems and methods for deferring interactions with web data. An example computer-implemented method includes displaying, by a web browser, a web page; receiving, by a web browser, a selection of a quick note link displayed within the web browser; receiving a payload of the quick note link, the payload including note properties for generating a note; based on receiving the payload of the quick note link, launching a browser-based notes application within the web browser; transmitting the payload to the browser-based notes application to cause a new note to be created; and displaying the note within the web browser concurrently with the web page.

STORAGE POLICY CHANGE USAGE ESTIMATION (17850607)

Main Inventor

Kenyon James HENSLER


Brief explanation

The present disclosure relates to estimating storage usage when changing storage policies. 
  • A base storage utilization is generated for a storage object based on the current storage policy.
  • The current storage policy includes the RAID level and fault tolerance level of the storage object.
  • An estimated storage utilization is generated for the storage object based on the base storage utilization and a new storage policy.
  • The base storage utilization does not include the overhead associated with the current storage policy.
  • The estimated storage utilization provides an estimate of the physical storage utilization if the new storage policy is implemented.

Potential Applications

  • Storage management systems
  • Data centers
  • Cloud storage providers

Problems Solved

  • Accurately estimating storage utilization when changing storage policies
  • Accounting for overhead associated with RAID levels and fault tolerance levels

Benefits

  • Improved accuracy in estimating storage utilization
  • Better decision-making when changing storage policies
  • Optimal allocation of storage resources

Abstract

Aspects of the present disclosure relate to storage policy change usage estimation. In examples, a base storage utilization is generated for a storage object according to a current storage policy. The current storage policy may comprise a RAID (“redundant array of independent disks”) level and/or a fault tolerance level with which the storage object is stored. An estimated storage utilization may then be generated for the storage object based on the base storage utilization and a new storage policy accordingly. Thus, the base storage utilization may omit or otherwise account for overhead associated with the RAID level and/or fault tolerance level indicated by the current storage policy, while the resulting estimated storage utilization may indicate an estimated physical storage utilization for the storage object if the new storage policy is implemented in place of the current storage policy.

USING A SEMANTIC TREE OF A COMPILER TO EXECUTE A SEMANTIC CODE QUERY AGAINST SOURCE CODE (17851434)

Main Inventor

Vatsalya AGRAWAL


Brief explanation

The techniques described in this patent application involve using a semantic tree of a compiler to execute a semantic code query against source code. Here are the key points:
  • An object model representing the source code is generated, including a semantic tree based on a grammar defined by the object model and an API exposed by the compiler.
  • A semantic code query, written in a code query language associated with the compiler, is received as input.
  • The query includes search criteria, and the API is used to determine a portion of the source code that satisfies the criteria.
  • The result of the query is provided, identifying the portion of the source code that meets the search criteria.

Potential Applications

  • Code analysis and debugging: This technology can be used to search for specific patterns or issues in source code, helping developers identify and fix bugs or optimize their code.
  • Code refactoring: By querying the source code, developers can identify areas that need to be refactored or improved, making their code more efficient and maintainable.
  • Documentation generation: The semantic code query can be used to extract relevant information from the source code, which can then be used to automatically generate documentation for the codebase.

Problems Solved

  • Efficient code search: Traditional text-based code search can be slow and imprecise. By using a semantic tree and a code query language, this technology allows for more accurate and efficient searching of source code.
  • Code understanding: The semantic tree provides a structured representation of the source code, making it easier to understand and analyze complex codebases.
  • Integration with compiler APIs: By leveraging the compiler's API, this technology can access detailed information about the source code, enabling more powerful and context-aware code queries.

Benefits

  • Improved developer productivity: By providing a more efficient and accurate way to search and analyze source code, this technology can help developers save time and effort in understanding and maintaining codebases.
  • Enhanced code quality: The ability to query and analyze source code can help identify and fix issues, leading to higher-quality code.
  • Automation and documentation: By automatically extracting information from the source code, this technology can assist in generating documentation and other automated tasks, reducing manual effort.

Abstract

Techniques are described herein that are capable of using a semantic tree of a compiler to execute a semantic code query against source code. An object model representing the source code is generated. The object model includes the semantic tree, which is based at least in part on a grammar defined at least in part by the object model and an application programming interface (API) exposed by the compiler. The semantic code query, which is written in a code query language associated with the compiler, is received as an input to the compiler. The semantic code query includes search criteria. A portion of the source code that satisfies the search criteria is determined using the API. A result of the semantic code query is provided. The result identifies the portion of the source code that satisfies the search criteria.

NATIVE EMULATION COMPATIBLE APPLICATION BINARY INTERFACE FOR SUPPORTING EMULATION OF FOREIGN CODE (18333709)

Main Inventor

Pedro Miguel SEQUEIRA DE JUSTO TEIXEIRA


Brief explanation

The abstract describes a method for processing calls between different application binary interfaces (ABI) using a common reference address. The method involves determining whether the reference address is within a memory range storing native code or not, and whether the callee is native or foreign. Based on this determination, the execution of the callee is initiated using different approaches.
  • The method uses a lookup structure to determine the nature of the reference address and the callee.
  • When the caller is native and the callee is foreign, the callee is called using the reference address within an emulator.
  • When the caller is foreign and the callee is native, an entry thunk is called.
  • When the caller is native and the callee is foreign, an exit thunk is called.
  • When both the caller and callee are native, the callee is directly called using the reference address.

Potential applications of this technology:

  • Cross-platform software development, allowing seamless integration between native and foreign code.
  • Emulation of foreign code within a native environment.
  • Facilitating communication and interoperability between different application binary interfaces.

Problems solved by this technology:

  • Incompatibility issues between different application binary interfaces.
  • Efficient execution of foreign code within a native environment.
  • Simplifying the process of integrating native and foreign code.

Benefits of this technology:

  • Improved compatibility between different application binary interfaces.
  • Enhanced performance by directly calling native code.
  • Simplified development process for cross-platform software.

Abstract

Using a common reference address when processing calls between a native application binary interface (ABI) and a foreign ABI. Based on a caller calling using a reference address, a lookup structure is used to determine whether the reference address is within a memory range storing native code and that the callee is native, or a memory range not storing native code and that the callee is foreign. Execution of a callee is initiated based on one of (i) calling the callee using the reference address within an emulator when the caller is native and the callee is foreign; (ii) calling an entry thunk when the caller is foreign and the callee is native; (iii) calling an exit thunk when the caller is native and the callee is foreign; or (iv) directly calling the callee using the reference address when the caller is native and the callee is native.

CONTROLLING OPERATING SYSTEM UPGRADES BASED ON USAGE DATA OF CLIENT DEVICE (17852043)

Main Inventor

Wei HUANG


Brief explanation

The patent application describes a system and method for selectively allowing or blocking operating system upgrades based on the probability of the upgrade causing a fault condition. Here are the key points:
  • The technology evaluates usage data from a client device to determine if an operating system upgrade should be provided.
  • It identifies a root-cause factor that is likely to lead to a fault condition with the upgrade.
  • Based on the usage data, it calculates a fault probability for the root-cause factor.
  • The fault probability is compared to a fault threshold for the root-cause factor.
  • Depending on the comparison, the technology either blocks the upgrade from being installed or provides it for installation on the client device.

Potential applications of this technology:

  • Operating system providers can use this technology to ensure that only stable upgrades are provided to users.
  • IT departments can utilize this technology to prevent potential issues caused by faulty operating system upgrades.
  • Device manufacturers can implement this technology to enhance the reliability and performance of their products.

Problems solved by this technology:

  • It helps prevent the installation of operating system upgrades that may result in fault conditions, reducing the risk of system failures.
  • By evaluating usage data and identifying root-cause factors, it allows for a more targeted approach to determining the suitability of an upgrade.
  • It provides a proactive solution to minimize the impact of faulty operating system upgrades on users and devices.

Benefits of this technology:

  • Users can have more confidence in the stability and reliability of their operating system upgrades.
  • It reduces the likelihood of system failures and the associated downtime and inconvenience.
  • Device manufacturers and operating system providers can enhance their reputation by delivering more reliable and high-quality products.

Abstract

Systems and methods for selectively allowing or blocking operating system upgrades based on probabilities that the upgraded operating system may result in a fault condition. In an example, the technology may perform a method that includes receiving usage data from a client device to evaluate providing an operating system upgrade for the client device; accessing a root-cause factor that is likely to lead to a fault condition with the operating system upgrade; based on the usage data, identifying a fault probability for the root-cause factor; comparing the fault probability to a fault threshold for the root-cause factor; based on the comparison of the fault probability and the fault threshold, performing one of: blocking the operating system upgrade from being installed on the client device; or providing the operating system upgrade for installation on the client device.

PROVIDING EXTENDED BRANCH TARGET BUFFER (BTB) ENTRIES FOR STORING TRUNK BRANCH METADATA AND LEAF BRANCH METADATA (17808916)

Main Inventor

Saransh JAIN


Brief explanation

The abstract describes a patent application for an extended branch target buffer (BTB) that can store trunk branch metadata and leaf branch metadata. The BTB circuit in a processor is designed to store trunk branch metadata for a first branch instruction in an extended BTB entry, which corresponds to a memory block containing the address of the first branch instruction. It also stores leaf branch metadata for a second branch instruction in the same extended BTB entry, along with the trunk branch metadata. The address of the second branch instruction is located after the target address of the first branch instruction in a different memory block.
  • The patent application is for an extended branch target buffer (BTB) that can store both trunk branch metadata and leaf branch metadata.
  • The BTB circuit in a processor is configured to store trunk branch metadata for a first branch instruction in an extended BTB entry.
  • The extended BTB entry corresponds to a memory block that contains the address of the first branch instruction.
  • The BTB circuit is also designed to store leaf branch metadata for a second branch instruction in the same extended BTB entry, along with the trunk branch metadata.
  • The address of the second branch instruction is located after the target address of the first branch instruction in a different memory block.

Potential Applications

  • This technology can be applied in processors to improve branch prediction accuracy and performance.
  • It can be used in various computing systems that rely on branch instructions, such as servers, desktop computers, and mobile devices.

Problems Solved

  • The extended BTB entries allow for more efficient storage of branch metadata, reducing the need for additional memory.
  • Storing both trunk branch metadata and leaf branch metadata in the same extended BTB entry improves the accuracy of branch prediction.

Benefits

  • Improved branch prediction accuracy leads to better overall processor performance.
  • The extended BTB entries optimize memory usage by storing multiple types of branch metadata in a single entry.

Abstract

Providing extended branch target buffer (BTB) entries for storing trunk branch metadata and leaf branch metadata is disclosed herein. In one aspect, a processor comprises a BTB circuit comprising a BTB comprising a plurality of extended BTB entries. The BTB circuit is configured to store trunk branch metadata for a first branch instruction in an extended BTB entry of the plurality of extended BTB entries, wherein the extended BTB entry corresponds to a first aligned memory block containing an address of the first branch instruction. The BTB circuit is also configured to store leaf branch metadata for a second branch instruction in the extended BTB entry in association with the trunk branch metadata, wherein an address of the second branch instruction is subsequent to a target address of the first branch instruction within a second aligned memory block.

FILE OPENING OPTIMIZATION (17849200)

Main Inventor

David MOWATT


Brief explanation

The patent application describes a system and method for opening files on a client device. Here is a simplified explanation of the abstract:
  • The system receives a request to open a file and determines the file type.
  • It identifies a list of software applications that can open the file type.
  • Metadata about each software application on the list is retrieved.
  • User preference data of the user requesting to open the file is also retrieved.
  • Scores for the software applications are determined based on the metadata and user preference data.
  • Finally, one software application is selected to open the file on the client device based on the determined scores.

Potential applications of this technology:

  • File management systems that automatically select the most suitable software application to open a file based on user preferences and file type.
  • Operating systems or file explorers that provide recommendations for opening files based on user preferences and file type.
  • Cloud storage platforms that suggest the best software application for opening files based on user preferences and file type.

Problems solved by this technology:

  • Simplifies the process of opening files by automatically selecting the most appropriate software application.
  • Reduces the need for users to manually search for and select the correct software application for opening a specific file type.
  • Improves user experience by considering user preferences and file type to make informed decisions.

Benefits of this technology:

  • Saves time and effort for users by eliminating the need to manually search for the right software application.
  • Enhances user productivity by quickly opening files with the most suitable software application.
  • Provides a personalized and efficient file opening experience based on user preferences.

Abstract

Systems and methods for opening files on a client device include receiving a request to open a file and identifying a file type pertaining to the file. A list of software applications is identified that are capable of opening the identified file type, and metadata pertaining to each of the software applications on the list is retrieved. User preference data pertaining to a user requesting to open the file is also retrieved. Scores for the software applications on the list are then determined based at least on the metadata and the user preference data. At least one software application on the list is then selected to open the file on the client device based on the determined scores.

PROVIDING NAME RESOLUTION SERVICES TO COMPONENTS EXECUTING IN A VIRTUALIZED ENVIRONMENT (17852171)

Main Inventor

Keith Edgar HORTON


Brief explanation

The patent application describes technologies for providing name resolution services to components in a virtualized environment. Here is a simplified explanation of the abstract:
  • The technology intercepts a name resolution request generated by a component in a virtualized environment and forwards it to the host operating system.
  • A user process is executed to request the host OS to resolve the name specified in the intercepted request.
  • Once the user process receives a response from the host OS, a response to the original name resolution request made by the component in the virtualized environment is generated based on the response received by the user process.
  • The generated response is then provided to the component in the virtualized environment that requested the name resolution.

Potential applications of this technology:

  • Virtualized environments: This technology can be used in virtualized environments to provide efficient and reliable name resolution services to components running within the virtual machines.
  • Cloud computing: It can be applied in cloud computing environments where virtualization is commonly used to provide scalable and flexible infrastructure.
  • Network management: The technology can be used in network management systems to improve the name resolution process for components operating in virtualized environments.

Problems solved by this technology:

  • Efficient name resolution: The technology improves the efficiency of name resolution by intercepting and forwarding requests to the host OS, reducing the overhead and latency associated with resolving names within a virtualized environment.
  • Seamless integration: It allows components in a virtualized environment to seamlessly integrate with the host OS for name resolution, ensuring compatibility and consistency in resolving names.
  • Scalability: The technology enables scalable name resolution services in virtualized environments, accommodating a large number of components and their name resolution requests.

Benefits of this technology:

  • Improved performance: By leveraging the host OS for name resolution, the technology can provide faster and more efficient resolution of names for components in a virtualized environment.
  • Compatibility: It ensures compatibility with the host OS, allowing components to utilize the same name resolution mechanisms as non-virtualized components.
  • Simplified management: The technology simplifies the management of name resolution services in virtualized environments by centralizing the resolution process at the host OS level.

Abstract

Technologies are disclosed for providing name resolution services to components executing in a virtualized environment. A name resolution request generated by a component executing within a virtualized environment is intercepted and forwarded from the virtualized environment to a host operating system (“OS”). A user process is then executed that requests that the host OS resolve a name specified by the intercepted name resolution request. Once the user process has received a response to the name resolution request made to the host OS, a response to the original name resolution request made by the component executing within the virtualized environment can be generated based on the response received by the user process. The response to the original name resolution request can then be provided to the component executing in the virtualized environment that requested name resolution.

ENVIRONMENT-BASED DEVICE CONDITION INDICATOR FOR PRIORITIZED DEVICE-CLOUD INTERACTIONS (18315210)

Main Inventor

Hanumantha Rao KOMMALAPATI


Brief explanation

The patent application describes a method to reduce delays in detecting and responding to anomalies in an IoT device. 
  • Analyzing sensor data collected by the IoT device to evaluate predefined anomaly criteria.
  • Dynamically assigning a condition indicator to the IoT device based on the evaluation of the predefined anomaly criteria.
  • The condition indicator indicates whether one or more potential anomalies have been detected or not.
  • Selectively implementing an IoT event prioritization scheme based on the dynamically-assigned condition indicator.

Potential Applications

  • Anomaly detection and response in IoT devices.
  • Improving the efficiency and effectiveness of IoT device monitoring and maintenance.
  • Enhancing the security and reliability of IoT systems.

Problems Solved

  • Reducing latencies in detecting and responding to anomalies in IoT devices.
  • Streamlining the process of analyzing sensor data and evaluating anomaly criteria.
  • Prioritizing IoT events based on the severity of potential anomalies.

Benefits

  • Faster detection and response to anomalies in IoT devices.
  • More efficient allocation of resources for monitoring and maintaining IoT systems.
  • Enhanced security and reliability of IoT networks.

Abstract

A method for reducing latencies associated with anomaly detection and response in an internet-of-things (IoT) device includes analyzing sensor data collected by the IoT device to evaluate various predefined anomaly criteria and dynamically assigning the IoT device a condition indicator based on the evaluation of the predefined anomaly criteria, where the condition indicator is indicative of detection or non-detection one or more potential anomalies. The method further provides for selectively implementing an IoT event prioritization scheme based on the dynamically-assigned condition indicator.

FILE UPLOAD MODIFICATIONS FOR CLIENT SIDE APPLICATIONS (18342486)

Main Inventor

Guy LEWIN


Brief explanation

Methods and systems are provided for a client computing device with a browser that can upload data using a web page. The invention involves generating a mock upload event and a corresponding mock data transfer object to simulate the uploading process. These mock objects are then sent to an upload event listener of the web page and executed. 
  • The invention involves generating a mock upload event and a corresponding mock data transfer object for uploading data using a web page.
  • The mock upload event and mock data transfer object are sent to an upload event listener of the web page and executed.
  • Prior to generating the mock upload event and mock data transfer object, an embedded upload event listener may receive an upload event, read it, and drop it from the event handler pipeline.
  • The embedded upload event listener can then perform logic on the received upload event to generate the mock upload event and corresponding mock data transfer object.

Potential Applications

  • This technology can be used for testing and debugging web applications that involve uploading data.
  • It can be used to simulate different scenarios and test the behavior of the web page during the uploading process.
  • Developers can use this technology to create automated tests for their web applications that involve data uploads.

Problems Solved

  • This technology solves the problem of testing and debugging the uploading functionality of web applications.
  • It provides a way to simulate and test different scenarios without actually uploading real data.
  • It allows developers to automate the testing process and ensure the reliability and correctness of their web applications.

Benefits

  • The invention simplifies the testing and debugging process for web applications that involve data uploads.
  • It provides a way to simulate different scenarios and test the behavior of the web page without actually uploading real data.
  • Developers can save time and effort by automating the testing process using the mock upload event and mock data transfer object.

Abstract

Methods and systems are provided for a client computing device including a browser that renders a web page. Program code generates a mock upload event and a corresponding mock data transfer object for uploading data using the web page. The mock upload event and the corresponding mock data transfer object are propagated to an upload event listener of the web page and executed. Prior to generating the mock upload event and corresponding mock data transfer object, an embedded upload event listener may receive an upload event, read the upload event, drop the received upload event from an event handler pipeline, and call synchronously or asynchronously, code to perform logic on the received upload event for the generation of the mock upload event and a corresponding mock data transfer object.

REAL TIME DETECTION OF METRIC BASELINE BEHAVIOR CHANGE (18327400)

Main Inventor

Raphael FETTAYA


Brief explanation

The patent application describes techniques for real-time detection of changes in metric baseline behavior. These techniques involve comparing historic and sample time series information for a component metric to determine if there is a significant difference. If a significant difference is detected, an alert notification is generated to identify the period of time when the baseline change occurred.
  • Techniques for real-time detection of changes in metric baseline behavior
  • Generating reference and sample distance signatures based on historic and sample time series information
  • Comparing the reference and sample distance signatures to determine a signature difference
  • Determining if the second period of time is a baseline change candidate based on the signature difference being greater than a distance threshold
  • Presenting an alert notification to identify the second period of time as the baseline change candidate

Potential Applications

  • Monitoring and detecting changes in performance metrics for software systems
  • Identifying anomalies in network traffic patterns
  • Detecting changes in sensor data for industrial equipment

Problems Solved

  • Provides a method for real-time detection of changes in metric baseline behavior
  • Allows for proactive identification of baseline changes, which can help prevent system failures or performance issues
  • Reduces the need for manual monitoring and analysis of metric data

Benefits

  • Enables early detection of baseline changes, leading to faster response times and improved system reliability
  • Reduces the risk of system failures or performance degradation
  • Automates the process of monitoring and analyzing metric data, saving time and resources

Abstract

Example aspects include techniques for real-time detection of metric baseline behavior change. These techniques may include generating a reference distance signature based on historic time series information for a component metric, the historic time series information corresponding to a first period of time, generating a sample distance signature based on sample time series information for the component metric, the sample time series information corresponding to a second period of time, and comparing the reference distance signature to the sample distance signature to determine a signature difference. In addition, the techniques may include determining that the second period of time is a baseline change candidate based on the signature difference being greater than a distance threshold, and presenting, based at least in part on the signature difference, an alert notification identifying the second period of time as the baseline change candidate.

INCREMENTALLY IMPROVING CLUSTERING OF CROSS PARTITION DATA IN A DISTRIBUTED DATA SYSTEM (18463941)

Main Inventor

Babatunde Micheal OKUTUBO


Brief explanation

Methods and systems are provided for improved access to rows of data in a distributed data system. 
  • The data rows are associated with partitions and distributed in one or more files.
  • An impure file includes data rows associated with multiple partitions.
  • A clustering set is generated by selecting a candidate impure file based on file access activity metrics and neighbor impure files.
  • Data rows of the impure files in the clustering set are sorted according to their associated partitions.
  • A set of disjoint partition range files is generated based on the sorted data rows.
  • Each file in the set is transferred to a respective target partition.

Potential Applications

This technology can be applied in various industries and scenarios where there is a need for improved access to rows of data in a distributed data system. Some potential applications include:

  • Big data analytics platforms
  • Distributed databases
  • Cloud computing environments
  • Data-intensive applications

Problems Solved

The technology addresses the following problems:

  • Inefficient access to rows of data in a distributed data system
  • Difficulty in managing and organizing data rows associated with multiple partitions
  • Performance bottlenecks caused by impure files with data rows from multiple partitions

Benefits

The use of this technology offers several benefits:

  • Improved efficiency and speed in accessing data rows
  • Enhanced organization and management of data rows associated with partitions
  • Reduction of performance bottlenecks and improved overall system performance

Abstract

Methods and systems are provided for improved access to rows of data in a distributed data system. Each data row is associated with a partition. Data rows are distributed in one or more files and an impure file includes data rows associated multiple partitions. A clustering set is generated from a plurality of impure files by selecting a candidate impure file based on file access activity metrics and one or more neighbor impure files. Data rows of the impure files included in the clustering set are sorted according to their respective associated partitions. A set of disjoint partition range files are generated based on the sorted data rows of the impure files included in the clustering set. Each file of the set of disjoint partition range files is transferred to a respective target partition.

DYNAMIC ASSET MONITORING AND MANAGEMENT USING A CONTINUOUS EVENT PROCESSING PLATFORM (18243438)

Main Inventor

Roman Schindlauer


Brief explanation

The disclosed architecture uses realtime continuous event processing (CEP) to import a dynamic set of event types and implement monitoring and management tasks on an asset level.
  • The architecture leverages realtime continuous event processing (CEP) to address monitoring and management tasks on an asset level.
  • It uses a general input interface framework to import a dynamic set of event types.
  • The architecture uses a declarative, expressive query model to implement monitoring and management tasks.
  • It models assets as realtime event types using the CEP data model.
  • Queries can be formulated per asset and not just per single stream.
  • The architecture formulates asset management and monitoring tasks as standing, declarative queries.
  • It correlates data from different data sources with different dynamic properties using the input interface of a CEP platform.

Potential Applications

  • Asset management and monitoring in various industries such as manufacturing, logistics, and healthcare.
  • Real-time monitoring and analysis of financial markets and trading activities.
  • Network monitoring and security analysis in telecommunications and IT industries.

Problems Solved

  • Traditional approaches look separately at single values from static databases and/or realtime streams, limiting the ability to perform asset-level monitoring and management tasks.
  • Existing systems may not have a flexible and expressive query model to handle dynamic event types and correlate data from different sources.

Benefits

  • Enables asset-level monitoring and management tasks, providing a more comprehensive view of the system.
  • Allows for the formulation of standing, declarative queries for asset management and monitoring.
  • Correlates data from different data sources with different dynamic properties, enhancing the accuracy and effectiveness of analysis.
  • Provides a flexible and expressive query model to handle dynamic event types.

Abstract

The disclosed architecture leverages realtime continuous event processing (CEP) to address using a general input interface framework to import a dynamic set of event types (e.g., assets), and using a declarative, expressive query model to implement monitoring and management tasks on an asset level. This is in contrast to looking separately at single values from static databases and/or realtime streams as is common conventionally. The architecture uses the CEP data model to model assets as realtime event types. Thus, queries can be formulated per asset and not just per single stream. The architecture uses the query capabilities of CEP to formulate asset management and monitoring tasks as standing, declarative queries, and uses the input interface of a CEP platform to correlate data from different data sources with different dynamic properties.

RESPONDING TO TASK PROMPT ON DECLARATIVE CODE USING LANGUAGE MODEL (17849056)

Main Inventor

Benjamin Goth ZORN


Brief explanation

The patent application describes a method for generating a response to a task prompt related to declarative code using a language model trained on imperative code. Here are the key points:
  • The invention involves using a language model trained on imperative code to generate a response to a task prompt related to declarative code.
  • Declarative code contains data declarations, while imperative code includes instructions on how to perform a task.
  • The method involves converting a portion of the declarative code and task prompt into input imperative code.
  • This input imperative code is then provided to the language model, which generates output imperative code.
  • The generated output imperative code is then converted into a response to the task prompt.

Potential Applications

This technology has potential applications in various fields, including:

  • Software development: It can assist developers in generating code snippets or providing guidance on how to perform tasks on declarative code.
  • Data analysis: The method can be used to automate the generation of code for analyzing and manipulating declarative data.
  • Natural language processing: The language model can be used to improve the understanding and generation of code from natural language instructions.

Problems Solved

The technology addresses the following problems:

  • Bridging the gap between declarative and imperative code: It enables the generation of imperative code from declarative code and task prompts, facilitating the execution of tasks on declarative data.
  • Code generation assistance: It provides developers with a tool to automatically generate code snippets or instructions based on declarative code and task prompts, saving time and effort.
  • Improving code understanding: The language model helps in understanding and interpreting task prompts related to declarative code, leading to more accurate and relevant responses.

Benefits

The technology offers several benefits, including:

  • Increased productivity: It automates the process of generating code, reducing the time and effort required for developers to perform tasks on declarative code.
  • Enhanced code quality: The generated code is based on a language model trained on imperative code, which can improve the accuracy and reliability of the generated responses.
  • Improved code comprehension: The method aids in understanding and interpreting task prompts related to declarative code, assisting developers in effectively working with declarative data.

Abstract

The generation of a response to a task prompt that represents a task to perform on declarative code. The response is generated with the aid of a language model that was trained on imperative code. The declarative code includes declarations about data. A task prompt represents a task to perform on the declarative code. At least a portion of the declarative code and at least a portion of the task prompt are converted into input imperative code. The input imperative code is then caused to be provided as input to the language model, resulting in the language model generating output imperative code. At least a portion of the output imperative code is then converted into a response to the task prompt.

QUERY SET OPTIMIZATION IN A DATA ANALYTICS PIPELINE (17808216)

Main Inventor

Jyoti LEEKA


Brief explanation

The patent application describes a method for optimizing data analytics queries that involve multiple operators and dependencies between queries. 
  • The method identifies the relationships between queries, where each query can either produce data for another query or consume data from another query.
  • Based on these relationships, the method identifies optimizations that can be applied to improve the performance of the queries.
  • The identified optimizations are then applied to the queries to enhance their efficiency and effectiveness.

Potential Applications

  • This technology can be applied in various data analytics scenarios where multiple queries are involved, such as business intelligence, data mining, and machine learning.
  • It can be used in industries like finance, healthcare, e-commerce, and telecommunications to optimize data analysis processes.

Problems Solved

  • Traditional data analytics queries often lack optimization techniques, leading to inefficient and time-consuming processes.
  • The method addresses the problem of optimizing queries with multiple operators and dependencies, improving the overall performance of data analytics tasks.

Benefits

  • The method improves the efficiency and effectiveness of data analytics queries by identifying and applying optimizations.
  • It reduces the time and resources required for data analysis, leading to faster insights and decision-making.
  • By optimizing the queries, it enhances the overall performance of data analytics systems, enabling organizations to handle larger datasets and complex analysis tasks.

Abstract

In a set of data analytics queries, at least a one of the queries comprising more than one operator, and each query being at least one of i) a producer of data for an other query in the set, and ii) a consumer of data from an other query in the set. In such examples, one or more computing devices identify each producer/consumer relationship between the queries. The one or more computing devices identify one or more optimizations among the queries based on the identified relationships. The one or more computing devices then apply at least one identified optimization to at least one of the queries.

COMPUTING RESOURCE CONSERVATION WITH BALANCED TRAVERSALS AND PRECOMPUTATIONS FOR CONNECTED DATA SETS (17847146)

Main Inventor

Anders Tungeland GJERDRUM


Brief explanation

The patent application describes a solution for balancing traversals and precomputations for connected data sets with access control. It introduces a process that starts with the highest hierarchy tier of a request and traverses the current hierarchy tier laterally. At each node, it determines if the requested operation is permitted. If not, the node and its subtree are omitted, and the recursion halts for that branch. If permitted, the node is included in the cumulative result, and the recursion continues to lower hierarchy tiers. Some examples utilize precomputed aggregates to avoid traversing branches with aggregates.
  • The solution balances traversals and precomputations for connected data sets with access control.
  • It starts with the highest hierarchy tier of a request and traverses laterally.
  • It determines if the requested operation is permitted at each node.
  • Nodes and their subtrees are omitted if the operation is not permitted.
  • Nodes are included in the cumulative result if the operation is permitted.
  • Precomputed aggregates are used to avoid traversing branches with aggregates.

Potential Applications

This technology can be applied in various domains where connected data sets with access control are involved, such as:

  • Social media platforms
  • Enterprise resource planning systems
  • Healthcare information systems
  • Financial systems
  • Supply chain management systems

Problems Solved

The technology solves the following problems:

  • Balancing traversals and precomputations for connected data sets
  • Ensuring access control for commutative operations
  • Efficiently omitting nodes and subtrees that are not permitted
  • Leveraging precomputed aggregates to optimize traversal

Benefits

The technology offers the following benefits:

  • Improved performance by balancing traversals and precomputations
  • Enhanced security by enforcing access control for commutative operations
  • Efficient processing by omitting unnecessary nodes and subtrees
  • Optimization through the use of precomputed aggregates

Abstract

Example solutions balance traversals and precomputations for connected data sets subject to access control. When a request for a commutative operation on a connected data set is received, a downwardly recursive process starts with the current hierarchy tier set to a highest hierarchy tier of the request. The process traverses the current hierarchy tier laterally. At each discovered node in the current hierarchy tier, a determination is made whether the requested operation is permitted to include a discovered node. If not, that node and any nodes hierarchically below it are omitted from the operation. That node and its subtree are skipped and the recursion halts for that branch. If, however, the requested operation is permitted to include the node, it is incorporated into the cumulative result and the recursion continues while there remains a lower hierarchy tier. Some examples leverage precomputed aggregates to avoid traversing branches having aggregates.

AUTOMATIC LABELING OF LARGE DATASETS (17847755)

Main Inventor

Sriram Vasudevan


Brief explanation

The patent application describes methods, systems, and computer programs for labeling datasets. It involves generating rules to label data records based on their match with query criteria, creating an aggregated label for each data record using these rules, and training a machine learning model using the labeled dataset. The method also includes receiving user engagement feedback and combining it with the aggregated label to generate a score.
  • The patent application proposes a method for labeling datasets.
  • Rules are generated to indicate the extent of match between data records and query criteria.
  • Aggregated labels are created for data records based on these rules.
  • A machine learning model is trained using the labeled dataset.
  • User engagement feedback is received and combined with the aggregated label to generate a score.

Potential Applications

This technology has potential applications in various fields, including:

  • Data analysis and classification
  • Information retrieval and search engines
  • Recommender systems
  • Fraud detection and anomaly detection

Problems Solved

The technology addresses the following problems:

  • Efficient and accurate labeling of large datasets
  • Incorporating user engagement feedback to improve labeling quality
  • Training machine learning models using labeled datasets

Benefits

The use of this technology offers several benefits, such as:

  • Improved accuracy and efficiency in labeling datasets
  • Enhanced performance of machine learning models through better training data
  • Incorporation of user engagement feedback to refine labeling and improve user experience

Abstract

Methods, systems, and computer programs are presented for labeling datasets. An example method can include generating rules for labeling data records within a first dataset. The rules can indicate an extent to which a data record matches query criteria. The method can further include generating an aggregated label for the corresponding data record based on the rules and training a machine learning model using the first dataset and the aggregated label. The method can include receiving an indication of user engagement and combining the indication of user engagement with the aggregated label to generate a score.

CONNECTION NATURE BETWEEN NODES IN GRAPH STRUCTURE (18244440)

Main Inventor

Leo Moreno BETTHAUSER


Brief explanation

The abstract describes a computing system that interprets a graph data structure by determining the most dominant intermediary entity (node or edge) on a path between a pair of nodes. The system calculates a detour path by removing the intermediary entity and compares it to the original path to determine the significance of the intermediary entity. Multiple intermediary entities can be evaluated in the same way.
  • The system interprets a graph data structure by analyzing the dominance of intermediary entities on a path between nodes.
  • It calculates a detour path by removing an intermediary entity and compares it to the original path.
  • The difference between the detour path and the original path determines the significance of the intermediary entity.
  • Multiple intermediary entities can be evaluated using this method.

Potential Applications

  • Network routing optimization: The system can be used to optimize network routing by identifying and prioritizing dominant intermediary entities in a graph data structure.
  • Transportation planning: It can be applied to optimize transportation routes by determining the most significant factors (intermediary entities) affecting travel time.
  • Social network analysis: The system can help analyze social networks by identifying the most influential nodes or edges in a graph data structure.

Problems Solved

  • Efficient interpretation of graph data: The system provides a method for interpreting graph data structures by determining the significance of intermediary entities.
  • Path optimization: By identifying the most dominant intermediary entities, the system can help optimize paths in various applications, such as network routing and transportation planning.

Benefits

  • Improved efficiency: The system allows for more efficient interpretation of graph data structures, leading to better decision-making and optimization.
  • Enhanced path optimization: By considering the significance of intermediary entities, the system can optimize paths by avoiding or prioritizing certain nodes or edges.
  • Better understanding of complex systems: The analysis of dominant intermediary entities provides insights into the importance and influence of different components in a graph data structure.

Abstract

The interpretation of a graph data structure represented on a computing system in which the connection between a pair of nodes in the graph may be interpreted by which intermediary entity (node or edge) on a path (e.g., a shortest path) between the node pair is most dominant. That is, if the intermediary entity were not present, a detour path is determined. The greater the difference between the detour path and the original path, the more significant that intermediary entity is. The significance of multiple intermediary entities in the original path may be determined in this way.

QUERY INTERPRETER TRAINING WITH ADVERSARIAL TABLE PERTURBATIONS (17808281)

Main Inventor

Yan GAO


Brief explanation

The patent application describes a method for generating adversarial training examples to train a query interpreter. Here are the key points:
  • The method starts by obtaining a target data table for a natural language query.
  • The primary entity of the target data table is identified.
  • A set of candidate identifiers is generated for a target domain associated with the target data table.
  • Each candidate identifier is evaluated using an NLI (Natural Language Inference) model to generate an entailment score.
  • A subset of candidate identifiers is selected based on the entailment scores.
  • Each candidate identifier from the subset is applied as a table perturbation to the target data table, generating a perturbed data table.
  • The perturbed data tables are outputted as adversarial training examples.

Potential applications of this technology:

  • Improving the accuracy and performance of query interpreters in natural language processing systems.
  • Enhancing the training process of query interpreters by generating diverse and challenging training examples.

Problems solved by this technology:

  • Lack of diverse and challenging training examples for query interpreters.
  • Difficulty in generating realistic and representative perturbations to data tables.

Benefits of this technology:

  • Improved accuracy and performance of query interpreters.
  • Enhanced training process leading to better understanding and interpretation of natural language queries.
  • Increased robustness of query interpreters to handle a wide range of input variations.

Abstract

A set of adversarial training examples for training a query interpreter are generated by: obtaining a target data table for a natural language query; identifying a primary entity of the target data table; for a target domain of the target data table, generating a set of candidate identifiers that are each semantically associated with an identifier of the target domain; for each candidate identifier, providing a premise-hypothesis pair to an NLI model to generate an entailment score; selecting a first subset of candidate identifiers from among the set of candidate identifiers based on the entailment score generated for each premise-hypothesis pair; for each candidate identifier of the first subset, applying the candidate identifier to an instance of the target data table as a table perturbation to generate a perturbed data table; and outputting each perturbed data table as part of an adversarial training example.

MULTI-MODEL ENRICHMENT MEMORY AND CATALOG FOR BETTER SEARCH RECALL WITH GRANULAR PROVENANCE AND LINEAGE (17849444)

Main Inventor

Kevin Corley WONUS


Brief explanation

The patent application describes a multi-model data store that includes an enrichment catalog and an enrichment memory graph. Here are the key points:
  • The data store takes raw data from a source raw datastore and enriches it using an enrichment function.
  • The enriched data is stored in graph nodes, with edge associations indicating the type of enrichment and the confidence level.
  • The enriched data is also stored in the enrichment catalog, along with breadcrumb provenance and lineage information that identifies the enrichment steps.
  • Users can add additional enriched values and associations to the graph.
  • Queries to the multi-model database start in the graph and then move to the enrichment catalog.
  • Query results include the complete chain of enrichments from the source raw data records and fields.
  • The system can generate virtual enrichment catalog records that link search values not found in the catalog to existing records via the graph.

Potential applications of this technology:

  • Data enrichment and analysis in various industries such as finance, healthcare, and e-commerce.
  • Building recommendation systems based on enriched data.
  • Fraud detection and prevention by analyzing enriched data.

Problems solved by this technology:

  • Efficiently storing and querying enriched data.
  • Providing a comprehensive view of the enrichment process and lineage.
  • Allowing users to easily add additional enriched values and associations.

Benefits of this technology:

  • Improved data analysis and decision-making through enriched data.
  • Enhanced data provenance and lineage tracking.
  • Flexibility to add and query additional enriched values.

Abstract

A multi-model data store comprises an enrichment catalog and an enrichment memory graph. Raw data from a source raw datastore is enriched based on an enrichment function. Enriched data is stored in graph nodes with edge associations indicating the enrichment type and confidence level. The enriched data is also stored in the enrichment catalog with full breadcrumb provenance and lineage identifying, with cataloged enrichment steps, down to a record and field in the source raw datastore. Additional enriched values and associations between graph nodes can be entered in the graph by a user. Queries to the multi-model database begin in the graph and continue to the enrichment catalog. Query results include the full sequential chain of enrichments to source raw data records and fields, and may include dynamically generated virtual enrichment catalog records that link search values not found in the enrichment catalog to enrichment catalog records via the graph.

TRANSFERRING LINK CONTEXT FROM DESKTOP APPLICATION TO BROWSER (17808878)

Main Inventor

Felix ANDREW


Brief explanation

The patent application describes systems and methods for transferring link context from a desktop application to a web browser. Here is a simplified explanation of the abstract:
  • The web browser receives a web address from a desktop application when a link is selected in a document displayed in the desktop application.
  • The web browser also receives link context from the desktop application, which includes the identification of the desktop application and the document.
  • The web browser loads the web page corresponding to the received web address.
  • Based on the link context, the web browser identifies a browser-based application that corresponds to the desktop application.
  • The web browser launches the browser-based application within itself.
  • The link context is transmitted to the browser-based application.
  • At least a portion of the document is displayed within the web browser.

Potential applications of this technology:

  • Seamless integration between desktop applications and web browsers.
  • Improved user experience when navigating between desktop applications and web content.
  • Enhanced functionality for web-based applications.

Problems solved by this technology:

  • Difficulty in transferring link context from desktop applications to web browsers.
  • Inefficient navigation between desktop applications and web content.
  • Limited integration between desktop applications and web-based applications.

Benefits of this technology:

  • Streamlined workflow for users by seamlessly transferring link context.
  • Enhanced productivity by allowing users to access web content within desktop applications.
  • Improved user experience by providing a consistent interface for desktop and web-based applications.

Abstract

Systems and methods for transferring link context to a web browser. An example method includes receiving, by a web browser, a web address from a desktop application based on a selection of a link in document displayed in the desktop application; receiving, by a web browser from the application, link context for the selected link, the link context including an identification of the desktop application and an identification of the document; loading a web page corresponding to the received web address; based on the link context, identifying a browser-based application corresponding to the desktop application; launching the browser-based application within the web browser; transmitting the link context to the browser-based application; and displaying at least a portion of the document within the web browser.

AUTOMATIC THRESHOLDING FOR CLASSIFICATION MODELS (17849105)

Main Inventor

Oren BARKAN


Brief explanation

The patent application describes a method for automatically generating threshold values for machine learning models based on a desired precision or recall performance. Here are the key points:
  • The method involves executing a trained machine learning model against a dataset using different threshold values.
  • The accuracy of the model is determined based on the execution, and evaluation metrics are modeled using the accuracy results.
  • The method calculates the probability that a modeled evaluation metric value has a relationship with a target metric value.
  • If the probability meets a certain confidence level, the threshold value is added to a set of candidate threshold values.
  • The final threshold value is selected from the set of candidate values based on the largest second modeled evaluation metric value.

Potential applications of this technology:

  • Improving the performance of machine learning models by automatically generating optimal threshold values.
  • Enhancing precision or recall performance in various domains such as fraud detection, medical diagnosis, or recommendation systems.

Problems solved by this technology:

  • Manual selection of threshold values for machine learning models can be time-consuming and subjective.
  • This method automates the process and ensures that the threshold values are optimized for the desired precision or recall performance.

Benefits of this technology:

  • Saves time and effort by automating the threshold value generation process.
  • Improves the performance of machine learning models by selecting optimal threshold values.
  • Provides a more objective approach to threshold selection, reducing the risk of human bias.

Abstract

Embodiments are described for automatically generating threshold values based on a target metric value that specifies a desired precision or recall performance of an ML model. For instance, a trained ML model is executed against a data set using possible threshold values. Accuracy metric(s) of the ML model is determined based on the execution. Using the accuracy metric(s), evaluation metrics are modeled. A probability that a first modeled evaluation metric value has a relationship with a target metric value is determined. A determination is made that the probability has a relationship with a confidence level. Responsive to determining that the probability has the relationship with the confidence level, the threshold value is added to a set of candidate threshold values. The threshold value from among the set of candidate threshold values is selected by selecting the candidate threshold value associated with the largest second modeled evaluation metric value.

AUTHENTICATION USING MUTABLE DATA (17848235)

Main Inventor

Jonathan J. CARUANA


Brief explanation

The abstract of this patent application describes a software-based authentication technique that uses mutable authentication data to prevent counterfeiters from making clones of authentic clients. 
  • Software-based authentication technique using mutable authentication data to deter counterfeiters
  • Authentication service issues mutable authentication data to a client and stores it with the client's identifier
  • Client authenticates by presenting the most recently issued mutable authentication data to the authentication service
  • Upon successful authentication, the authentication service issues updated mutable authentication data to the client
  • Clones without the most recent mutable authentication data are rejected by the authentication service
  • Changing the mutable authentication data prevents counterfeiters from creating multiple clones that all work at the same time

Potential Applications

  • Online banking and financial transactions
  • E-commerce platforms
  • Secure access to sensitive information or systems
  • Mobile device authentication

Problems Solved

  • Counterfeiters making clones of authentic clients
  • Unauthorized access to systems or sensitive information
  • Fraudulent transactions or activities

Benefits

  • Enhanced security against counterfeiters and unauthorized access
  • Protection against fraudulent activities and transactions
  • Ability to detect and reject cloned clients
  • Increased trust and confidence in software-based authentication systems

Abstract

Software-based authentication techniques may use mutable authentication data that changes to deter counterfeiters from making clones of authentic clients. An authentication service may issue mutable authentication data to a client and store the mutable authentication data in association with an identifier of the client. The client may authenticate by presenting the most recently issued mutable authentication data to the authentication service. Upon successful authentication, the authentication service may issue updated mutable authentication data to the client. Any clones that cannot present the most recent mutable authentication data may be rejected by the authentication service. By changing the mutable authentication data, counterfeiters cannot make a large number of clones that all work at the same time.

OPTIMIZING ACCURACY OF SECURITY ALERTS BASED ON DATA CLASSIFICATION (17808481)

Main Inventor

Andrey KARPOVSKY


Brief explanation

The patent application describes a computing system and method for training machine-learning models to detect anomalies. Here are the key points:
  • The system accesses a training dataset and determines an overall sensitivity score, indicating the amount of sensitive data in the dataset.
  • Machine-learning models are trained using the training dataset and the overall sensitivity score.
  • The models use the overall sensitivity score to determine a threshold for anomaly detection.
  • The threshold is set relatively low for datasets with a large amount of sensitive data and relatively high for datasets with a small amount of sensitive data.
  • When the models receive a dataset with a second overall sensitivity score similar to the training dataset, they extract features and calculate a probability score.
  • If the probability score is above the determined threshold, the models generate an alert.

Potential applications of this technology:

  • Data security: The system can be used to detect anomalies in datasets containing sensitive information, helping to identify potential security breaches or unauthorized access.
  • Fraud detection: By training the models on datasets with known fraudulent activities, the system can be used to detect anomalies indicative of fraudulent behavior.
  • Network monitoring: The models can be applied to network traffic data to identify unusual patterns or activities that may indicate a cyber attack.

Problems solved by this technology:

  • Efficient anomaly detection: The machine-learning models provide a more automated and accurate way to detect anomalies in datasets, reducing the need for manual inspection and analysis.
  • Adaptability to sensitivity: By considering the overall sensitivity score, the system can adjust the anomaly detection threshold based on the level of sensitivity in the dataset, improving the accuracy of detection.

Benefits of this technology:

  • Improved data security: By detecting anomalies, the system helps to protect sensitive data from unauthorized access or breaches.
  • Time and cost savings: The automated anomaly detection provided by the machine-learning models reduces the need for manual inspection and analysis, saving time and resources.
  • Enhanced accuracy: The models consider the overall sensitivity score to determine the threshold, resulting in more accurate detection of anomalies.

Abstract

A computing system and method for training one or more machine-learning models to perform anomaly detection. A training dataset is accessed. An overall sensitivity score is determined that indicates an amount of sensitive data in the training dataset. Machine-learning models are trained based on the training dataset and the overall sensitivity score. The machine-learning models use the overall sensitivity score to determine a threshold. The threshold is relatively low for datasets having a large amount of sensitive data and is relatively high for dataset having a small among of sensitive data. When executed, the machine-learning models determine if a probability score of features extracted from a received dataset are above the determined threshold when a second overall sensitivity score of the received dataset is substantially similar to the overall sensitivity score. When the probability score is above the determined threshold, the machine-learning models cause an alert to be generated.

UNSUPERVISED METHOD TO GENERATE ANNOTATIONS FOR NATURAL LANGUAGE UNDERSTANDING TASKS (18243782)

Main Inventor

Hany Mohamed Hassan AWADALLA


Brief explanation

The abstract describes a method for training a machine learning model using parallel annotations of source instances while ensuring the security of the source instances. This is achieved by generating a coupled machine learning model from two existing models: one trained on unannotated natural language and the other trained on populated target templates. The coupled model can then transform unannotated natural language into annotated machine-readable text.
  • The method involves training a machine learning model with parallel annotations of source instances.
  • The source instances are kept secure during the training process.
  • A coupled machine learning model is generated by combining two existing models.
  • One model is trained on unannotated natural language.
  • The other model is trained on populated target templates.
  • The coupled model can transform unannotated natural language into annotated machine-readable text.

Potential Applications

  • Natural language processing and understanding
  • Machine translation
  • Text summarization
  • Sentiment analysis
  • Chatbots and virtual assistants

Problems Solved

  • Ensuring the security of source instances during machine learning model training
  • Improving the accuracy and efficiency of natural language processing tasks
  • Enabling the transformation of unannotated natural language into annotated machine-readable text

Benefits

  • Enhanced security and privacy of source instances
  • Improved accuracy and quality of machine learning models
  • Faster and more efficient processing of natural language data
  • Enables the development of advanced natural language processing applications

Abstract

A method for training a machine learning model with parallel annotations of source instances and while facilitating security of the source instances can be performed by a system that generates a coupled machine learning model from (1) a first machine learning model trained on a first set of training data comprising unannotated natural language and (2) a second machine learning model trained on populated target templates which are populated with a plurality of vocabulary words. Once formed, the coupled machine learning model is configured to transform unannotated natural language into annotated machine-readable text.

GENERATING PREDICTED INK STROKE INFORMATION USING INK-BASED SEMANTICS (17851275)

Main Inventor

Steven N. BATHICHE


Brief explanation

The patent application describes systems and methods for generating predicted ink strokes using ink-based semantics. Here are the key points:
  • Ink stroke data is received as input.
  • The ink stroke data and a semantic context are used as input for a model.
  • The model determines one or more predicted ink strokes.
  • An indication of the predicted ink strokes is generated.

Potential Applications

This technology has potential applications in various fields, including:

  • Digital note-taking applications: The predicted ink strokes can assist users in quickly and accurately capturing their handwritten notes digitally.
  • Digital art and design: Artists and designers can benefit from the ability to generate predicted ink strokes, which can help them create digital artwork more efficiently.
  • Handwriting recognition: The predicted ink strokes can be used to improve the accuracy of handwriting recognition systems by providing additional context and guidance.

Problems Solved

The technology addresses several problems:

  • Efficiency: By generating predicted ink strokes, users can save time and effort in creating digital ink-based content.
  • Accuracy: The semantic context used in the model helps in generating more accurate and contextually relevant predicted ink strokes.
  • User experience: The ability to generate predicted ink strokes enhances the user experience by providing real-time feedback and assistance while writing or drawing digitally.

Benefits

The technology offers several benefits:

  • Improved productivity: Users can create digital ink-based content more quickly and efficiently with the assistance of predicted ink strokes.
  • Enhanced creativity: Artists and designers can explore new possibilities and experiment with different strokes and styles, supported by the generated predictions.
  • Better user experience: The real-time indication of predicted ink strokes helps users stay focused and provides a more intuitive and natural writing or drawing experience.

Abstract

In some examples, systems and methods for generating predicted ink strokes, using ink-based semantics, are provided. Ink stroke data may be received, the ink stroke data and a semantic context may be input into a model. From the model, one or more predicted ink strokes may be determined. Further, an indication of the one or more predicted ink strokes may be generated.

GENERATING PREDICTED INK STROKE INFORMATION USING TEXT-BASED SEMANTICS (17851309)

Main Inventor

Steven N. BATHICHE


Brief explanation

The patent application describes systems and methods for generating predicted ink strokes based on text-based semantics. Here is a simplified explanation of the abstract:
  • Ink stroke data is received and input into a first model.
  • Text data corresponding to the ink stroke data is received from the first model.
  • The text data and a semantic context are input into a second model.
  • The second model determines a predicted ink stroke.
  • An indication of the predicted ink stroke is generated.

Potential applications of this technology:

  • Digital handwriting recognition and prediction systems.
  • Virtual reality or augmented reality applications that require real-time ink stroke generation.
  • Collaborative writing tools that can predict and generate ink strokes based on text input.

Problems solved by this technology:

  • Improves the accuracy and efficiency of handwriting recognition systems.
  • Enables real-time generation of ink strokes based on text input, reducing the need for manual drawing or writing.
  • Enhances the user experience in digital writing and drawing applications.

Benefits of this technology:

  • Provides more accurate and intuitive digital handwriting recognition.
  • Saves time and effort by automatically generating ink strokes based on text input.
  • Enables seamless integration of text and ink-based input in various applications.

Abstract

In some examples, systems and methods for generating predicted ink strokes, using text-based semantics, are provided. Ink stroke data may be received, the ink stroke data may be input into a first model, and text data may be received from the first model. The text data may correspond to the ink stroke data. The text data and a semantic context may be input into a second model. A predicted ink stroke may be determined, from the second model. Further, an indication of the predicted ink stroke may be generated.

NATURAL LANGUAGE UNDERSTANDING FOR CREATING AUTOMATION RULES FOR PROCESSING COMMUNICATIONS (17849228)

Main Inventor

Kuleen MEHTA


Brief explanation

The patent application describes methods and systems for generating automation rules based on natural language inputs. It involves using a trained machine learning model to convert natural language input into tagged primitives and identified actions. These primitives and actions are then used to generate automation rules for performing actions on a subset of communications received by a communications application. The generated automation rules can be executed to perform the specified actions on the subset of communications.
  • The technology uses natural language inputs to generate automation rules.
  • A trained machine learning model is employed to convert the natural language input into tagged primitives and identified actions.
  • Automation rules are generated based on the tagged primitives and identified actions.
  • The generated automation rules perform actions on a subset of communications received by a communications application.
  • The automation rules can be executed to perform the specified actions on the subset of communications.

Potential Applications

  • Streamlining communication processes in various industries.
  • Automating repetitive tasks in customer support or help desk systems.
  • Enhancing productivity by automating actions based on natural language instructions.

Problems Solved

  • Manual creation of automation rules based on natural language inputs is time-consuming and prone to errors.
  • Converting natural language inputs into actionable automation rules requires understanding and interpretation.
  • Automating actions based on natural language inputs can improve efficiency and reduce human effort.

Benefits

  • Simplifies the process of generating automation rules from natural language inputs.
  • Reduces the need for manual intervention in performing actions on communications.
  • Improves accuracy and consistency in executing automation rules.
  • Enhances productivity by automating tasks based on natural language instructions.

Abstract

Methods and systems for generating automation rules based on natural language inputs. In an example, the technology relates to a computer-implemented method for generating automation rules from natural language input. The method includes receiving a natural language input into a communications application for performing an action on communications received by the communications application; providing the natural language input into a trained machine learning model; receiving, as output from the trained machine learning model, a tagged primitive and an identified action from the natural language input; generating an automation rule for performing the action on a subset of communications received by the communications application, the subset of communications corresponding to the tagged primitives; and executing the generated automation rule to perform action on the subset of communications.

NOTIFICATION MANAGEMENT AND CHANNEL SELECTION (17847886)

Main Inventor

Guangyu Yang


Brief explanation

The patent application describes methods, systems, and computer programs for predicting the likelihood of a member responding to a notification. It involves training neural networks to generate models for member information and distribution function parameters. The models are used to calculate a member's embedding and determine the probability of the member visiting the online service with or without the notification. Based on these probabilities, the method decides whether to send the notification.
  • Neural networks are trained to create models for member information and distribution function parameters.
  • The models are used to calculate a member's embedding when accessing a notification.
  • The embedding is used to determine the probability of the member visiting the online service in response to the notification.
  • The method also calculates the probability of the member visiting without sending the notification.
  • Based on these probabilities, the method decides whether to send the notification.

Potential Applications

  • This technology can be applied in various online services that send notifications to their members.
  • It can be used in social media platforms, e-commerce websites, and other online platforms to improve the effectiveness of notifications.

Problems Solved

  • The technology solves the problem of uncertainty in predicting member response to notifications.
  • It addresses the challenge of determining whether sending a notification will result in a member visiting the online service.

Benefits

  • The technology improves the efficiency of sending notifications by predicting the likelihood of member response.
  • It helps online services optimize their notification strategies and increase user engagement.
  • By reducing unnecessary notifications, it can enhance the user experience and prevent notification fatigue.

Abstract

Methods, systems, and computer programs are presented for predicting a response probability to a sent notification. One method includes an operation for training respective neural networks to obtain a first, second, and third models. The first model generates an embedding based on member information. The second and third model generate parameters for a distribution function. The first model is used to calculate a member embedding when accessing a notification for a member. Further, the method second model calculates a first parameter value, and the third model calculates a second parameter value based on the member embedding. Further, the method determines, a first probability that the member will visit the online service in response to the notification and a second probability that the member will visit without sending the notification. The method further includes determining to send the notification based on the first probability and the second probability.

MODEL COMPRESSION BY SPARSITY-INDUCING REGULARIZATION OPTIMIZATION (18458709)

Main Inventor

Tianyi CHEN


Brief explanation

The abstract describes a method for improving the performance of neural networks by compressing them through a sparsity-inducing regularization optimization process. The compressed machine learning model is trained using a set of training data and then executed to generate outputs.
  • The method involves compressing neural networks to improve their performance.
  • A sparsity-inducing regularization optimization process is used to generate a compressed machine learning model.
  • The compressed model is trained using a set of training data.
  • The compressed model is then executed to generate one or more outputs.

Potential Applications

  • This technology can be applied in various fields where neural networks are used, such as image recognition, natural language processing, and recommendation systems.
  • It can be used to improve the efficiency and speed of neural networks in real-time applications, such as autonomous vehicles and robotics.

Problems Solved

  • The method addresses the problem of limited performance of neural networks due to the number of operations being performed and data management among different memory components.
  • It solves the problem of optimizing neural networks to reduce their size and computational requirements without sacrificing accuracy.

Benefits

  • The compressed machine learning models generated through this method can significantly reduce the computational resources required for training and execution.
  • The improved efficiency and speed of the compressed models make them suitable for real-time applications.
  • The method allows for better utilization of memory components in neural networks, leading to improved performance.

Abstract

The performance of a neural network (NN) and/or deep neural network (DNN) can limited by the number of operations being performed as well as management of data among the various memory components of the NN/DNN. A sparsity-inducing regularization optimization process is performed on a machine learning model to generate a compressed machine learning model. A machine learning model is trained using a first set of training data. A sparsity-inducing regularization optimization process is executed on the machine learning model. Based on the sparsity-inducing regularization optimization process, a compressed machine learning model is received. The compressed machine learning model is executed to generate one or more outputs.

SPARSITY FOR NEURAL NETWORK MODELS BASED ON SPARSITY ATTRIBUTES (17850807)

Main Inventor

Ningxin ZHENG


Brief explanation

The present disclosure relates to systems and methods for introducing sparsity in neural network models based on sparsity attributes. 
  • The system receives a definition of a neural network model, which includes a set of tensors and sparsity attribute values for elements of a tensor.
  • The sparsity attribute values for the tensor are then propagated to a subset of tensors to create a modified definition of the neural network model.
  • Based on this modified definition, the system generates the actual neural network model.

Potential Applications

This technology can have various applications in the field of artificial intelligence and machine learning, including:

  • Efficient deployment of neural network models on resource-constrained devices, such as mobile phones or IoT devices.
  • Accelerating the training and inference processes of neural networks by reducing the number of computations required.
  • Enabling faster and more efficient processing of large-scale datasets in areas like computer vision, natural language processing, and speech recognition.

Problems Solved

The technology addresses several challenges in neural network models:

  • Overcoming the computational and memory limitations of deploying complex neural networks on devices with limited resources.
  • Reducing the time and energy consumption associated with training and running neural networks.
  • Improving the scalability and efficiency of processing large amounts of data in neural network applications.

Benefits

The use of sparsity attributes in neural network models offers several benefits:

  • Improved model efficiency by reducing the number of non-zero elements in tensors, leading to faster computations and reduced memory requirements.
  • Enhanced model interpretability by identifying and focusing on the most important elements within tensors.
  • Increased flexibility in deploying neural network models on various devices and platforms, including edge devices and cloud environments.

Abstract

Embodiments of the present disclosure include systems and methods for providing sparsity for neural network models based on sparsity attributes. A first neural network model definition is received. The first neural network model definition specifies a neural network model comprising a set of tensors and a set of sparsity attribute values for elements of a tensor in the set of tensors. The set of sparsity attribute values for the tensor are propagated to elements of a subset of the set of tensors to form a second neural network model definition. The neural network model is generated based on the second neural network model definition.

GENERATING TRAINING DATA USING SAMPLED VALUES (17849506)

Main Inventor

Gopiram Roshan Lal


Brief explanation

The abstract describes a method, system, and apparatus for generating a trained neural network prediction model. Here are the key points:
  • The method involves determining a set of data that includes numerical ranges associated with an embedding and an attribute.
  • The numerical range is sampled to obtain a sample value, which is also associated with the embedding and the attribute.
  • A set of sample value training data is generated, including the sample value, the associated embedding, and the associated attribute.
  • A trained neural network prediction model is created by applying a prediction model to the set of sample value training data.
  • The trained neural network prediction model is then used to determine an output based on a set of input data.
  • The output is a predicted range of values, calculated using an output mean and an output standard deviation.

Potential Applications:

  • Predictive analytics in various fields such as finance, healthcare, and manufacturing.
  • Forecasting future trends or outcomes based on input data and associated attributes.
  • Optimizing decision-making processes by providing predicted ranges of values.

Problems Solved:

  • Overcoming the limitations of traditional prediction models by utilizing neural networks.
  • Providing a more accurate and reliable prediction model by incorporating sample value training data.
  • Addressing the need for predicting ranges of values rather than single point estimates.

Benefits:

  • Improved accuracy in predicting ranges of values, allowing for more informed decision-making.
  • Increased flexibility in handling complex data sets with multiple numerical ranges and attributes.
  • Enhanced efficiency in generating trained neural network prediction models for various applications.

Abstract

Methods, systems, and apparatuses include determining a set of data. The set of data includes multiple numerical ranges associated with an embedding and an attribute. The numerical range is sampled to obtain a sample value which is also associated with the embedding and the attribute. A set of sample value training data is generated, the set including the sample value, the associated embedding, and the associated attribute. A trained neural network prediction model is generated by applying a prediction model to the set of sample value training data. A set of input data is applied to the trained neural network prediction model. An output is determined by the trained neural network prediction model based on the set of input data. The output is a predicted range of values based on an output mean and an output standard deviation.

PHYSICAL LAYOUT OF THE FLOQUET CODE WITH MAJORANA-BASED QUBITS (17990243)

Main Inventor

Roman Bela BAUER


Brief explanation

The patent application describes an apparatus and method for storing and processing quantum information using Floquet codes.
  • The physical layout includes a quantum processor with an array of qubits.
  • Gateable semiconductor devices form interference loops to perform two-qubit Pauli measurements.
  • Coherent links between qubits enable certain two-qubit Pauli measurements, especially at the boundary of the bulk code.
  • The two-qubit Pauli measurements are selected to minimize the size of the interference loops.
  • Certain embodiments perform Floquet codes in six time steps.
  • Hexagon embodiments tile the array of qubits with unit cells of 6-gon vertical or horizontal bricks.
  • Square-octagon embodiments tile the array of qubits with unit cells of two 4-gon and two 8-gon bricks.

Potential applications of this technology:

  • Quantum computing
  • Quantum information processing
  • Quantum communication

Problems solved by this technology:

  • Efficient storage and processing of quantum information
  • Minimizing the size of interference loops in quantum processors

Benefits of this technology:

  • Improved performance and efficiency in quantum computing
  • Enhanced capabilities for quantum information processing
  • Potential for advancements in quantum communication systems

Abstract

An apparatus and method are provided for storing and processing quantum information. More particularly, a physical layout is provided to perform Floquet codes. The physical layout includes a quantum processor having an array of qubits (e.g., columns of tetrons or hexons in which zero modes are located on topological superconductor segments) with a gateable semiconductor devices forming interference loops to perform two-qubit Pauli measurements. Coherent links between qubits in a column enable certain two-qubit Pauli measurements, especially those additional two-qubit Pauli measurements used at a boundary surrounding a region of the bulk code. The two-qubit Pauli measurements are selected to minimize a size of the interference loops. Certain embodiments perform Floquet codes in six time steps. Hexagon embodiments tile the array of qubits with unit cells of 6-gon vertical (or horizontal) bricks. Square-octagon embodiments tile the array of qubits with unit cells of two 4-gon and two 8-gon bricks.

SYSTEMS AND METHODS FOR DISTRIBUTING LAYERS OF SPECIAL MIXTURE-OF-EXPERTS MACHINE LEARNING MODELS (17848679)

Main Inventor

Devangkumar Rameshbhai PATEL


Brief explanation

The patent application describes a computing system with different types of accelerators, each with different memory and processing capabilities. The system uses these accelerators to distribute a machine learning model that consists of dense and sparse layers. The dense layers are distributed on accelerators with greater memory capability, while the sparse layers are distributed on accelerators with greater processing capability.
  • The computing system has different accelerators with varying memory and processing capabilities.
  • The machine learning model is divided into dense and sparse layers.
  • Dense layers are distributed on accelerators with greater memory capability.
  • Sparse layers are distributed on accelerators with greater processing capability.

Potential Applications

This technology can be applied in various fields where machine learning models are used, such as:

  • Natural language processing
  • Computer vision
  • Speech recognition
  • Recommendation systems

Problems Solved

This technology addresses the following problems:

  • Imbalance between memory and processing capabilities in accelerators.
  • Efficient distribution of machine learning models across different accelerators.
  • Optimizing performance and resource utilization in computing systems.

Benefits

The benefits of this technology include:

  • Improved performance by utilizing accelerators with different capabilities effectively.
  • Enhanced memory capacity for processing dense layers.
  • Increased processing power for handling sparse layers.
  • Efficient utilization of computing resources.

Abstract

Some disclosed embodiments are directed to computing systems having different accelerators such that a first set of accelerators has a greater memory capability than a second set accelerators, while the second set of accelerators has a greater processing capability than the first set of accelerators. A machine learning model having different dense layers and sparse layers is distributed on the different accelerators such that the dense layers are distributed on one or more accelerators selected from the first set of accelerators and the sparse layers are distributed on one or more accelerators in the second set of accelerators.

ESTIMATING A NUMBER OF PEOPLE AT A POINT OF INTEREST USING VEHICLE SENSOR DATA AND GENERATING RELATED VISUAL INDICATIONS (17871543)

Main Inventor

Leon Oliver STENNETH


Brief explanation

Methods and systems have been developed to estimate the number of people at a specific location using vehicle data. This involves receiving data from multiple vehicles within a geographic boundary that includes the location of interest. From this data, information from door sensors is extracted. Using this subset of data, an estimated count of people within the geographic boundary during a specified time period is determined. An indication of the estimated number of people is then generated.
  • Vehicle data is collected from multiple vehicles within a specific geographic area.
  • Data from door sensors in the vehicles is extracted.
  • The extracted data is used to estimate the number of people within the geographic area during a specified time period.
  • An indication of the estimated number of people is generated.

Potential Applications

  • Crowd management: This technology can be used to estimate the number of people at events, public spaces, or tourist attractions, helping authorities manage crowd control and ensure safety.
  • Urban planning: By estimating the number of people in different areas at different times, city planners can make informed decisions about infrastructure development, transportation systems, and resource allocation.
  • Retail analytics: Retailers can use this technology to estimate foot traffic and customer flow in their stores, helping them optimize store layouts, staffing, and inventory management.

Problems Solved

  • Accurate estimation: This technology provides a method to estimate the number of people at a specific location without relying on manual counting or surveys, which can be time-consuming and prone to errors.
  • Real-time monitoring: By using vehicle data, the estimation can be done in real-time, allowing for immediate response and decision-making.
  • Scalability: The use of vehicle data allows for scalability, as it can cover large geographic areas and handle a high volume of data.

Benefits

  • Efficiency: The automated estimation process saves time and resources compared to manual counting methods.
  • Accuracy: By utilizing vehicle data and door sensor information, the estimation can provide a more accurate count of people at a location.
  • Real-time insights: The ability to estimate the number of people in real-time enables timely decision-making and response to changing situations.

Abstract

Methods and systems for estimating a number of people at a point of interest using vehicle data are provided. In some examples, vehicle data is received, from a plurality of vehicles, that corresponds to a geographic boundary encompassing a point of interest. From the vehicle data, a first subset of data corresponding to door sensor information is extracted. Based on the first subset of data, an estimated number of people within the geographic boundary, during a specified period of time, is determined. An indication corresponding to the estimated number of people within the geographic boundary is generated.

DYNAMIC NEXT OPERATION DETERMINATION FOR WORKFLOWS (17808454)

Main Inventor

Alexander OSTRIKOV


Brief explanation

Abstract:

The abstract describes a system that automatically generates the next step in a workflow based on the subject matter. It receives a data record containing historical operations and a template with dynamic workflow nodes. Using this information, the system generates the next operation based on the historical operations and the content in the data record. The generated operation is then outputted into the workflow for execution.

Explanation:

  • The system automatically generates the next step in a workflow based on the subject matter.
  • It receives a data record that includes historical operations executed in the workflow and a template with dynamic workflow nodes.
  • The system uses the historical operations and the content in the data record to programmatically generate the next operation.
  • The generated operation is parameterized based on the content in the data record.
  • The generated operation is then outputted into the workflow for execution.

Potential Applications:

  • Workflow automation systems
  • Project management software
  • Business process management tools
  • Customer relationship management systems

Problems Solved:

  • Manual determination of the next step in a workflow can be time-consuming and error-prone.
  • Subject matter experts may not always be available to determine the appropriate next operation.
  • In complex workflows, it can be challenging to keep track of the historical operations and determine the next step.

Benefits:

  • Automation of the next step in a workflow saves time and reduces errors.
  • Subject matter experts are not required for every decision in the workflow.
  • The system can handle complex workflows with multiple historical operations and dynamic nodes.

Abstract

A next operation in a workflow corresponding to a subject matter is automatically generated. A subject matter data record is received, including one or more historical operations previously executed in the workflow and a workflow template including one or more dynamic workflow nodes. At least one next operation is programmatically generated from the one or more dynamic workflow nodes based on the one or more historical operations previously executed in the workflow, wherein the at least one next operation is parameterized based on content in the subject matter data record. The at least one programmatically generated next operation is output into the workflow for execution.

ONBOARDING MANAGEMENT ENGINE IN A HUMAN RESOURCES MANAGEMENT SYSTEM (17851502)

Main Inventor

Jennifer Lorin JAWORSKI


Brief explanation

The abstract describes a patent application for an integrated onboarding platform associated with a human resources management system. The platform provides onboarding management based on a computing architecture that supports system integration and process integration. The onboarding management engine operates based on organizational onboarding logistics and hierarchical integration of onboarding activities.
  • The patent application describes an integrated onboarding platform for managing the onboarding process of new employees.
  • The platform is associated with a human resources management system and supports system integration and process integration.
  • The onboarding management engine operates based on organizational onboarding logistics and hierarchical integration of onboarding activities.
  • The platform receives a request for onboarding data associated with an onboarding experience.
  • The onboarding management engine generates onboarding plans based on onboarding configuration data from multiple data sources and services.
  • The onboarding configuration data is accessed and the onboarding data is communicated based on this configuration data.

Potential Applications

  • Human resources management systems
  • Onboarding processes for new employees
  • Employee training and orientation programs

Problems Solved

  • Streamlining the onboarding process for new employees
  • Integrating data from multiple sources and services into a unified onboarding platform
  • Improving the efficiency and effectiveness of onboarding management

Benefits

  • Simplifies the onboarding process for both employees and HR departments
  • Reduces manual data entry and administrative tasks
  • Enhances the overall onboarding experience for new employees
  • Improves communication and coordination between different departments involved in the onboarding process

Abstract

Methods, systems, and computer storage media for providing an integrated onboarding platform associated with an onboarding management engine of a human resources management system. The integrated onboarding platform provides integrated onboarding management based on a computing architecture that supports system integration and process integration associated with an onboarding workflow. The onboarding management engine operates based on organizational onboarding logistics and hierarchical integration of onboarding activities of the onboarding workflow having onboarding interfaces. Operationally, a request for onboarding data is received at the onboarding management engine. The onboarding data is associated with an onboarding experience. The onboarding management engine supports generating onboarding plans, the onboarding plans are associated with onboarding configuration data of the integrated onboarding platform comprising onboarding management data from a plurality of data sources and services. The onboarding configuration data associated with the onboarding plan is accessed. Based on the onboarding configuration data, the onboarding data is communicated.

TRACKING SOURCES OF AFTER-HOURS ACTIVITY BASED ON EVENTS MANAGED VIA AN ELECTRONIC COMMUNICATION APPLICATION (18367298)

Main Inventor

Jessalynn UCHACZ


Brief explanation

The patent application describes methods and systems for tracking after-hours activity in an electronic communication application. Here is a simplified explanation of the abstract:
  • The invention tracks after-hours activity in an electronic communication application.
  • It accesses a log that stores time, receiver, and originator information of events managed via the application.
  • It determines the after-hours period of a receiver based on the receiver information.
  • It determines the organizational group of an originator based on the originator information and stored organizational data.
  • It determines whether the event occurred during the receiver's after-hours period based on the time information.
  • If the event occurred during the after-hours period, it adds a value to an after-hours count associated with the originator's organizational group.
  • It modifies the operation of the electronic communication application for users in the organizational group.

Potential applications of this technology:

  • Employee monitoring and tracking after-hours work activities.
  • Enhancing productivity by identifying and addressing after-hours communication patterns.
  • Analyzing after-hours communication for workload management and resource allocation.

Problems solved by this technology:

  • Difficulty in tracking after-hours activity in electronic communication applications.
  • Lack of visibility into after-hours work patterns and their impact on organizational groups.
  • Inefficient allocation of resources due to a lack of information about after-hours communication.

Benefits of this technology:

  • Improved tracking and monitoring of after-hours activity.
  • Enhanced productivity and workload management.
  • Better resource allocation based on after-hours communication patterns.

Abstract

Methods and systems for tracking sources of after-hours activity based on events managed via an electronic communication application. One method includes accessing a log storing time information, receiver information, and originator information of an event managed via the electronic communication application, determining, based on the receiver information, a predetermined after-hours period of a receiver of the event, determining, based on the originator information and stored organizational data, an organizational group of an originator of the event, and determining, based on the time information, whether the event occurred during the predetermined after-hours period of the receiver. The method also includes, in response to determining that the event occurred during the predetermined after-hours period of the receiver, adding a value to an after-hours count associated with the organizational group of the originator, and modifying operation of the electronic communication application as used by at least one user included in the organizational group.

MEETING ATTENDANCE PROMPT (17850233)

Main Inventor

Yuchen LI


Brief explanation

The technology described in this patent application is designed to detect and respond to requests for input from individuals who are not attending a meeting. It identifies the specific non-attendee and contacts them to seek their input.
  • The technology improves the accuracy of identifying the correct non-attendee by first identifying individuals who have an affinity with the meeting.
  • When a request for input is detected, the technology generates an invite-permission, which asks for permission to send a join-invite to the non-attendee.
  • If permission is granted, a join-invite is sent to the non-attendee, who can choose to join the meeting by interacting with the invite.

Potential Applications

  • Remote collaboration: This technology can be used in remote meetings to allow non-attendees to provide input and participate in discussions.
  • Expert consultation: Non-attendees who have expertise in a specific area can be invited to join a meeting and provide their insights and recommendations.
  • Decision-making processes: Non-attendees who are key stakeholders or decision-makers can be included in meetings to ensure their input is considered.

Problems Solved

  • Inclusion of non-attendees: This technology solves the problem of how to involve individuals who are not physically present in a meeting but have valuable input to contribute.
  • Identification of the correct non-attendee: By identifying individuals with an affinity to the meeting, the technology improves the accuracy of selecting the right person to contact for input.

Benefits

  • Enhanced collaboration: Non-attendees can actively participate in meetings, leading to more diverse perspectives and better decision-making.
  • Time and cost savings: By allowing non-attendees to provide input remotely, there is no need for them to travel to the meeting location, saving time and expenses.
  • Improved accuracy: The technology's ability to identify the correct non-attendee increases the likelihood of obtaining the desired input and feedback.

Abstract

The technology described herein, detects a request for input from a non-attendee of a meeting. The request for input is made in a first meeting. The technology described herein identifies the specific non-attendee in order to contact the non-attendee. The technology described herein is able to improve the probability that the correct non-attendee is identified by first identifying one or more people having an affinity with the meeting. In response to detecting a request for input from a non-attendee, aspects of the technology described herein may generate an invite-permission. The invite-permission seeks permission to send a join-invite to the non-attendee. Upon giving permission, a join-invite will be sent to the non-attendee. The non-attendee may choose to join the on-going meeting by interacting (e.g., selecting a link or button) with the join-invite.

LOCALLY VARYING NUMERICAL RANGES FOR DATA COMPRESSION (18242416)

Main Inventor

Martin Jon Irwin FULLER


Brief explanation

The patent application describes data compression techniques that aim to save memory space by using fewer bits to store information while maintaining high fidelity. Here are the key points:
  • The data set is divided into multiple regions.
  • Each region has its own locally varying numerical ranges of data values.
  • Instead of encoding the data using a higher number of bits as absolute values, the data in each region is encoded using a lower number of bits as interpolation values relative to the local numerical ranges.
  • If there are multiple channels of data in the regions, the number of available bits for encoding the data can be dynamically allocated per region based on the relative degrees of variance in data among the multiple channels.

Potential applications of this technology:

  • Data compression in various fields such as image and video processing, audio compression, and data storage.
  • Efficient transmission of large data sets over networks with limited bandwidth.
  • Optimization of memory usage in embedded systems and devices with limited storage capacity.

Problems solved by this technology:

  • Reduces the amount of memory space required to store large data sets.
  • Enables efficient transmission of data over limited bandwidth networks.
  • Addresses the challenge of optimizing memory usage in resource-constrained devices.

Benefits of this technology:

  • Saves memory space by using fewer bits to store data.
  • Maintains high fidelity of the compressed data.
  • Allows for dynamic allocation of bits based on the variance in data, improving compression efficiency.

Abstract

Data compression techniques are described for saving memory space by using fewer bits to store information while achieving high fidelity. A data set may be partitioned into a plurality of regions. Locally varying numerical ranges of data values (e.g., the minimum and maximum extents) may be determined for the plurality of regions. The data in the individual regions may be encoded using a lower number of bits as interpolation values in reference to the local extents rather than being encoded using a higher number of bits as absolute values. Where there are multiple channels of data in the regions, the number of available bits for encoding the data may be dynamically allocated per region based on the relative degrees of variance in data among the multiple channels.

GENERATING PHYSIO-REALISTIC AVATARS FOR TRAINING NON-CONTACT MODELS TO RECOVER PHYSIOLOGICAL CHARACTERISTICS (18244622)

Main Inventor

Daniel J. MCDUFF


Brief explanation

The patent application describes a system and method for generating video sequences with physio-realistic avatars. Here are the key points:
  • The system receives an albedo (surface color) for an avatar.
  • It modifies the sub-surface skin color of the avatar based on physiological data related to a physiologic characteristic.
  • The system then renders an avatar using the modified sub-surface skin color and the albedo.
  • The rendered avatar can be synthesized into a video frame.
  • The video, including the synthesized avatar, can be used to train a machine learning model to detect the physiological characteristic.
  • The machine learning model receives multiple video segments, some of which include synthetic physio-realistic avatars with the physiological characteristic.
  • The model is trained using these video segments.
  • The trained model can be provided to a requesting entity.

Potential applications of this technology:

  • Virtual reality and augmented reality applications can benefit from realistic avatars that accurately represent physiological characteristics.
  • Medical training simulations can use physio-realistic avatars to simulate patient conditions and train healthcare professionals.
  • Gaming and entertainment industries can create more immersive experiences with realistic avatars.
  • Facial recognition systems can be improved by training them with video segments containing avatars that mimic physiological characteristics.

Problems solved by this technology:

  • Traditional methods of generating avatars may not accurately represent physiological characteristics, limiting their realism and applicability.
  • Training machine learning models to detect physiological characteristics often requires real-world data, which may be limited or difficult to obtain.
  • This technology solves these problems by generating synthetic physio-realistic avatars and using them to train machine learning models.

Benefits of this technology:

  • The system allows for the creation of video sequences with highly realistic avatars that accurately represent physiological characteristics.
  • By using synthetic avatars, the system can generate a wide range of physiologic characteristics without relying on real-world data.
  • The trained machine learning models can be used for various applications, such as healthcare, entertainment, and security, improving their accuracy and performance.

Abstract

Systems and methods are provided that are directed to generating video sequences including physio-realistic avatars. In examples, an albedo for an avatar is received, a sub-surface skin color associated with the albedo is modified based on physiological data associated with physiologic characteristic, and an avatar based on the albedo and the modified sub-surface skin color is rendered. The rendered avatar may then be synthesized in a frame of video. In some examples, a video including the synthesized avatar may be used to train a machine learning model to detect a physiological characteristic. The machine learning model may receive a plurality of video segments, where one or more of the video segments includes a synthetic physio-realistic avatar generated with the physiological characteristic. The machine learning model may be trained using the plurality of video segments. The trained model may be provided to a requesting entity.

Systems and Methods for Video Genre Classification (17809046)

Main Inventor

Oron NIR


Brief explanation

The present disclosure describes systems and methods for video genre classification. This technology analyzes video content to determine its genre using both audio and video features. Here are the key points:
  • Video content is received and divided into multiple sliding windows.
  • Each sliding window contains both audio and video data.
  • The audio data is analyzed to identify a set of audio features.
  • The video data is analyzed to identify a set of video features.
  • These sets of audio and video features are then provided to a classifier.
  • The classifier uses the features to detect the genre of the video content.
  • The video content is indexed based on its genre.

Potential Applications

This technology has various potential applications, including:

  • Video streaming platforms can use this classification system to automatically categorize and organize their video content based on genre.
  • Content creators can utilize this technology to tag their videos with the appropriate genre, making it easier for users to discover and search for specific types of content.
  • Video recommendation systems can benefit from accurate genre classification to provide personalized recommendations to users based on their preferences.

Problems Solved

This technology solves several problems related to video genre classification:

  • Manual genre tagging of videos can be time-consuming and subjective. This system automates the process, saving time and ensuring consistency.
  • Traditional genre classification methods often rely solely on either audio or video analysis, which may not provide accurate results. This technology combines both audio and video features for improved accuracy.
  • With the increasing amount of video content available, it can be challenging for users to find specific genres of interest. This system helps in organizing and indexing videos based on their genre, making it easier for users to discover relevant content.

Benefits

The use of this technology offers several benefits:

  • Efficient and automated genre classification saves time and resources for video platforms and content creators.
  • Accurate genre classification enhances user experience by providing more relevant and personalized recommendations.
  • Improved organization and indexing of video content based on genre improves discoverability and user engagement.
  • The combination of audio and video features leads to more accurate genre detection compared to traditional methods.

Abstract

Examples of the present disclosure describe systems and methods for video genre classification. In one example implementation, video content is received. A plurality of sliding windows of the video content is sampled. The plurality of sliding windows comprises audio data and video data. The audio data is analyzed to identify a set of audio features. The video data is analyzed to identify a set of video features. The set of audio features and the set of video features is provided to a classifier. The classifier is configured to detect a genre for the video content using the set of audio features and the set of video features. The video content is indexed based on the genre.

ESTIMATING A NUMBER OF PEOPLE AT A POINT OF INTEREST USING VEHICLE SENSOR DATA AND GENERATING RELATED VISUAL INDICATIONS (17851928)

Main Inventor

Leon Oliver STENNETH


Brief explanation

Methods and systems for estimating the number of people at a specific location using vehicle data are described in this patent application. The system receives vehicle data from multiple vehicles within a geographic boundary that includes the location of interest. From this data, a subset of information related to door sensors is extracted. Using this subset, the system determines an estimated number of people present within the geographic boundary during a specified time period. Finally, the system generates an indication of the estimated number of people at the location.
  • Vehicle data is collected from multiple vehicles within a specific geographic boundary.
  • The data includes information from door sensors in the vehicles.
  • A subset of data related to door sensor information is extracted.
  • Using this subset, the system estimates the number of people within the geographic boundary during a specified time period.
  • An indication of the estimated number of people at the location is generated.

Potential Applications

This technology has potential applications in various fields, including:

  • Crowd management: Estimating the number of people at events, public spaces, or tourist attractions can help authorities manage crowds more effectively and ensure safety.
  • Urban planning: Understanding the population density in different areas can aid in urban planning, such as determining the need for additional infrastructure or services.
  • Retail analytics: Estimating the number of people visiting a store or shopping center can provide valuable insights for retailers, helping them optimize staffing and marketing strategies.
  • Transportation planning: Knowing the number of people at specific locations can assist in planning transportation routes and schedules to accommodate the demand.

Problems Solved

This technology addresses the following problems:

  • Lack of accurate and real-time data on the number of people at specific locations.
  • Difficulty in estimating crowd sizes and managing crowds effectively.
  • Limited insights into population density and movement patterns for urban planning purposes.
  • Inefficient staffing and resource allocation in retail and other service industries.

Benefits

The use of vehicle data to estimate the number of people at a location offers several benefits:

  • Real-time and accurate estimation of crowd sizes, allowing for better crowd management and safety measures.
  • Improved urban planning by understanding population density and movement patterns.
  • Enhanced retail analytics for optimizing staffing and marketing strategies.
  • Efficient transportation planning based on actual demand at specific locations.

Abstract

Methods and systems for estimating a number of people at a point of interest using vehicle data are provided. In some examples, vehicle data is received, from a plurality of vehicles, that corresponds to a geographic boundary encompassing a point of interest. From the vehicle data, a first subset of data corresponding to door sensor information is extracted. Based on the first subset of data, an estimated number of people within the geographic boundary, during a specified period of time, is determined. An indication corresponding to the estimated number of people within the geographic boundary is generated.

ADVANCED FORMATTING OF INK DATA USING SPATIAL INFORMATION AND SEMANTIC CONTEXT (17851237)

Main Inventor

Steven N. BATHICHE


Brief explanation

The patent application describes systems and methods for formatting ink, specifically in relation to handwriting recognition and text formatting. Here are the key points:
  • The system receives ink stroke data, which represents handwritten text.
  • The system identifies individual letters from the ink stroke data.
  • The system also identifies the spacing between the letters.
  • It receives user commands and semantic context, which provide additional information about the intended formatting.
  • Based on the user command, semantic context, and letter spacing, the system determines an action to perform.
  • The determined action is then executed.

Potential Applications

This technology has potential applications in various fields, including:

  • Handwriting recognition software: The system can be used to accurately recognize and format handwritten text, improving the performance of handwriting recognition algorithms.
  • Digital note-taking apps: The technology can enhance the user experience by automatically formatting and organizing handwritten notes.
  • Document processing: It can be used in systems that process handwritten documents, such as digitizing historical manuscripts or converting handwritten forms into digital format.

Problems Solved

The technology addresses several challenges related to formatting ink and handwriting recognition:

  • Accurate letter identification: By accurately identifying individual letters from ink stroke data, the system improves the accuracy of handwriting recognition systems.
  • Proper spacing recognition: Identifying the spacing between letters helps in determining the correct formatting and layout of the text.
  • Context-aware formatting: By considering the user command and semantic context, the system can apply appropriate formatting rules based on the intended meaning of the text.

Benefits

The technology offers several benefits, including:

  • Improved accuracy: By accurately identifying letters and considering spacing, the system enhances the accuracy of handwriting recognition and formatting.
  • Time-saving: The automated formatting and organization of handwritten text saves time for users, especially in note-taking or document processing scenarios.
  • Enhanced user experience: The technology provides a more intuitive and user-friendly experience when working with handwritten text, improving overall usability.

Abstract

In some examples, systems and methods for formatting ink are provided. Ink stroke data may be received, letters may be identified from the ink stroke data, and spacing may be identified between the letters. A user command and semantic context may be received. An action may be determined based on the user command, the semantic context, and the spacing between the letters. Further, the action may be performed.

SIMULATED CAPACITANCE MEASUREMENTS FOR FACIAL EXPRESSION RECOGNITION TRAINING (17809438)

Main Inventor

Jouya JADIDIAN


Brief explanation

The abstract describes a method for training a neural network to recognize facial expressions using digital human face models and simulated capacitance measurements from an array of radio frequency antennas.
  • The method involves recognizing multiple digital human face models.
  • Simulated facial expressions are then generated for each of these face models.
  • Simulated capacitance measurements are obtained for an array of radio frequency antennas for each simulated facial expression.
  • These simulated capacitance measurements are used as input training data for a neural network.
  • The neural network is designed to output facial expression parameters based on the input capacitance measurements.

Potential Applications

This technology has potential applications in various fields, including:

  • Facial expression recognition systems for human-computer interaction.
  • Emotion detection in virtual reality and augmented reality applications.
  • Facial analysis in psychology and neuroscience research.
  • Biometric identification systems for security and access control.

Problems Solved

The method addresses the following problems:

  • Limited availability of labeled facial expression training data.
  • Difficulty in capturing and measuring facial expressions accurately.
  • Challenges in training neural networks to recognize subtle and complex facial expressions.

Benefits

The use of simulated facial expressions and capacitance measurements offers several benefits:

  • Enables the generation of a large dataset for training facial expression recognition models.
  • Provides a controlled and repeatable environment for capturing and analyzing facial expressions.
  • Allows for the training of neural networks to recognize a wide range of facial expressions.
  • Can improve the accuracy and robustness of facial expression recognition systems.

Abstract

A method for training a neural network for facial expression recognition includes recognizing a plurality of digital human face models. For each of the plurality of digital human face models, a plurality of simulated facial expressions are simulated. Simulated capacitance measurements for an array of simulated radio frequency (RF) antennas are found for each of the plurality of simulated facial expressions. The simulated capacitance measurements for each simulated facial expression are provided as input training data to a neural network configured to output facial expression parameters based on input capacitance measurements.

COLORBLIND ASSISTIVE TECHNOLOGY SYSTEM AND METHOD TO IMPROVE IMAGE RENDERING BY GENERATING A COLOR TRANSLATION TABLE FOR COLOR VISION DEFICIENT USERS (18459723)

Main Inventor

Somasundaram Kumaresan BEERANA


Brief explanation

The patent application describes systems and methods for creating colorblind-accessible versions of color images. Here is a simplified explanation of the abstract:
  • The invention aims to provide colorblind users with a corrected version of a color image that appears similar to the original image.
  • A color translation table is generated to correct the pixel values of the image for color vision deficiency (CVD).
  • The corrected image is produced based on the determined pixel values, allowing colorblind users to perceive a similar color scheme as the original image.
  • The systems can work with previously captured images, real-time video, and can be integrated as an add-on to other applications.

Potential Applications

This technology has potential applications in various fields, including:

  • Web and graphic design: Ensuring colorblind users can fully appreciate and understand visual content.
  • Medical imaging: Enhancing the accessibility of medical images for colorblind healthcare professionals and patients.
  • Education: Facilitating colorblind students' understanding of visual materials in textbooks and presentations.
  • Gaming: Enabling colorblind gamers to experience games with accurate color representation.
  • User interfaces: Designing inclusive interfaces that cater to colorblind individuals.

Problems Solved

The technology addresses the following problems:

  • Limited accessibility for colorblind individuals: Colorblind users often struggle to perceive and interpret color-coded information accurately.
  • Lack of color correction options: Existing solutions may not provide accurate or satisfactory color correction for colorblind users.
  • Incomplete understanding of colorblindness: The technology helps bridge the gap in understanding and accommodating color vision deficiencies.

Benefits

The technology offers several benefits:

  • Improved accessibility: Colorblind individuals can access and comprehend visual content that was previously challenging or inaccessible.
  • Accurate color correction: The generated color translation table ensures that the corrected image closely resembles the original image's color scheme.
  • Real-time and offline implementation: The systems can be used with previously captured images or in real-time scenarios, providing flexibility in application.
  • Integration with existing applications: The technology can be easily integrated as an add-on to various applications, expanding its usability and reach.

Abstract

Systems and methods for providing colorblind-accessible versions of a color image by generating a color translation table for color vision deficiency (CVD) corrections are disclosed. For a given image, the pixel values as would be seen by a colorblind user are determined. Using these values, a corrected rendered image that appears to colorblind users as depicting a similar color scheme as the original image is produced and presented to the colorblind user. The proposed systems can be implemented with previously captured image data, real-time video, and as an add-on to other applications.

DYNAMIC SPEECH ENHANCEMENT COMPONENT OPTIMIZATION (17849187)

Main Inventor

Ross G. CUTLER


Brief explanation

The patent application describes a method for optimizing speech enhancement components in speech communication systems using non-intrusive speech quality assessment.
  • The method involves receiving audio data that includes speech and has been processed by speech enhancement components.
  • A trained non-intrusive speech quality assessment (NISQA) model is used to detect the quality of the speech in the audio data automatically.
  • Based on the detected quality of the speech, one or more of the speech enhancement components are changed.

Potential Applications

  • Speech communication systems
  • Telecommunication systems
  • Voice assistants
  • Audio recording and playback devices

Problems Solved

  • Inefficient speech enhancement components in speech communication systems
  • Difficulty in determining the quality of speech automatically
  • Lack of optimization in speech enhancement based on speech quality

Benefits

  • Improved speech quality in communication systems
  • Automatic detection and optimization of speech enhancement components
  • Enhanced user experience in speech communication
  • Efficient utilization of speech enhancement technology

Abstract

Systems, methods, and computer-readable storage devices are disclosed for optimizing speech enhancement components to use in speech communication systems using non-intrusive speech quality assessment. One method including: receiving audio data, the audio data including speech; and the audio data having been processed by at least one speech enhancement component; detecting a first quality of the speech of the audio data using a trained non-intrusive speech quality assessment (NISQA) model, the trained NISQA model trained to detect quality of speech automatically; and changing one or more of the at least one speech enhancement component based on the detected first quality of the speech.

DYNAMIC SPEECH ENHANCEMENT COMPONENT OPTIMIZATION (18072876)

Main Inventor

Ross G. CUTLER


Brief explanation

The patent application describes a method for optimizing speech enhancement components in speech communication systems using non-intrusive speech quality assessment. Here are the key points:
  • The method involves receiving audio data, including speech, from a computing device over a network.
  • A trained non-intrusive speech quality assessment (NISQA) model is used to detect the quality of the speech in the audio data automatically.
  • The method determines whether the computing device is a low-quality endpoint based on the detected speech quality.
  • If the computing device is determined to be a low-quality endpoint, at least one speech enhancement component is transferred from the computing device to at least one server device over the network.

Potential applications of this technology:

  • Speech communication systems: This technology can be applied to optimize speech enhancement components in various speech communication systems, such as VoIP (Voice over Internet Protocol) systems, video conferencing systems, and telephony systems.
  • Call centers: The technology can be used to improve the speech quality in call centers, ensuring better communication between agents and customers.
  • Remote meetings: This innovation can enhance the speech quality in remote meetings, improving the overall audio experience for participants.

Problems solved by this technology:

  • Low-quality endpoints: The method helps identify low-quality endpoints in speech communication systems, allowing for targeted optimization to improve the speech quality.
  • Non-intrusive assessment: The use of a trained NISQA model enables automatic detection of speech quality without requiring intrusive methods, such as subjective user feedback or manual evaluation.

Benefits of this technology:

  • Enhanced speech quality: By optimizing speech enhancement components based on the detected speech quality, this technology can significantly improve the clarity and intelligibility of speech in communication systems.
  • Efficient resource allocation: The method allows for targeted allocation of speech enhancement components to low-quality endpoints, optimizing the use of resources and improving overall system performance.
  • Seamless integration: The ability to transfer speech enhancement components from computing devices to server devices over the network ensures a seamless integration of the optimization process into existing speech communication systems.

Abstract

Systems, methods, and computer-readable storage devices are disclosed for optimizing speech enhancement components to use in speech communication systems using non-intrusive speech quality assessment. One method including: receiving, from a computing device over a network, audio data, the audio data including speech; detecting a first quality of the speech of the audio data using a trained non-intrusive speech quality assessment (NISQA) model, the trained NISQA model trained to detect quality of speech automatically; determining whether the computing device is a low-quality endpoint based on the first quality of speech of the audio data; and transferring, from the computing device over the network, at least one speech enhancement component to at least one server device when the computing device is determined to be a low-quality endpoint.

ENHANCED TRIM ASSISTANCE FOR VIDEO EDITING ENVIRONMENTS (17850553)

Main Inventor

David Earl WASHINGTON


Brief explanation

The patent application describes a software application that can extract audio data from a media file and analyze the speech within it to generate a proposal for trimming the file. The user can then select a portion of the proposed trim and the application will trim the media file accordingly.
  • Software application on a computing device extracts audio data from a media file
  • Analysis of speech in the audio data generates a proposal for trimming the file
  • Visualization of the trim proposal is displayed to the user
  • User can select a portion of the visualization as input
  • The selected portion is used to trim the media file

Potential Applications

  • Video editing software could use this technology to automate the process of trimming videos based on speech analysis.
  • Media streaming platforms could implement this technology to allow users to easily trim audio from video files before sharing or uploading them.

Problems Solved

  • Manual trimming of audio from video files can be time-consuming and tedious. This technology automates the process, saving time and effort.
  • Identifying the most relevant parts of a video based on speech analysis can be challenging. This technology provides a proposal for trimming based on speech analysis, making it easier for users to decide which parts to keep or remove.

Benefits

  • Saves time and effort by automating the process of trimming audio from video files.
  • Provides a visualization of the proposed trim, making it easier for users to make informed decisions.
  • Allows users to easily trim audio from video files without the need for complex video editing software.

Abstract

In an implementation, a software application on a computing device directs the device to extract audio data from a media file comprising the audio data and video data, generate a trim proposal based on analysis of speech in the audio data, and display a visualization of the trim proposal. A user may supply input comprising a selection of at least a portion of the visualization of the trim proposal, in response to which the device trims the media file.

COMPUTER MEMORY ARRAYS EMPLOYING MEMORY BANKS AND INTEGRATED SERIALIZER/DE-SERIALIZER CIRCUITS FOR SUPPORTING SERIALIZATION/DE-SERIALIZATION OF READ/WRITE DATA IN BURST READ/WRITE MODES, AND RELATED METHODS ([[17847875. COMPUTER MEMORY ARRAYS EMPLOYING MEMORY BANKS AND INTEGRATED SERIALIZER/DE-SERIALIZER CIRCUITS FOR SUPPORTING SERIALIZATION/DE-SERIALIZATION OF READ/WRITE DATA IN BURST READ/WRITE MODES, AND RELATED METHODS simplified abstract (Microsoft Technology Licensing, LLC)|17847875]])

Main Inventor

Pramod KOLAR


Brief explanation

The patent application describes computer memory arrays that use memory banks and integrated serializer/de-serializer circuits to support serialization and de-serialization of read/write data in burst read/write modes.
  • The memory array includes a serialization circuit that converts parallel data streams of read data from separate memory banks into a single, serialized read data stream in a burst read mode.
  • The memory array also includes a de-serialization circuit that converts a received, serialized write data stream on an input bus into separate, parallel write data streams to be simultaneously written to the memory banks in a burst write mode.

Potential Applications

  • This technology can be used in various computer memory systems, such as RAM (Random Access Memory) or cache memory, to improve data transfer efficiency.
  • It can be applied in high-performance computing systems, servers, or data centers that require fast and efficient memory access.

Problems Solved

  • The technology solves the problem of efficiently transferring large amounts of data between memory banks and external devices in burst read/write modes.
  • It addresses the challenge of converting parallel data streams into serialized data streams for efficient transmission and vice versa.

Benefits

  • The use of memory banks and integrated serializer/de-serializer circuits allows for faster and more efficient data transfer in burst read/write modes.
  • The technology enables simultaneous writing of data to multiple memory banks, improving overall memory access speed.
  • It reduces the complexity and cost of memory systems by integrating serialization and de-serialization functionality within the memory array.

Abstract

Computer memory arrays employing memory banks and integrated serializer/de-serializer circuits for supporting serialization/de-serialization of read/write data in burst read/write modes, and related methods are disclosed. The memory array can include a serialization circuit configured to convert parallel data streams of read data received from separately switched memory banks into a single, serialized, read data stream in a burst read mode. The memory array can also include a de-serialization circuit configured to convert a received, serialized write data stream on an input bus for a write operation into separate, parallel write data streams to be written simultaneously to the memory banks in a burst write mode.

Protein Structure Prediction (18038333)

Main Inventor

Tong Wang


Brief explanation

The patent application proposes a solution for predicting protein structures using a fragment library. Here are the key points:
  • The solution determines multiple fragments for each residue position of a target protein from a fragment library.
  • Each fragment consists of multiple amino acid residues.
  • A feature representation of the structures of these fragments is generated for each residue position.
  • Based on these feature representations, the solution predicts the structure or structural property of the target protein.
  • This approach utilizes the structural information from fragment libraries to enhance protein structure prediction accuracy.

Potential Applications:

  • Protein structure prediction in drug discovery and development.
  • Understanding protein folding and misfolding in diseases.
  • Designing and engineering proteins with specific functions.

Problems Solved:

  • Protein structure prediction is a complex task due to the vast number of possible conformations.
  • Existing methods may lack accuracy and rely on limited information.
  • This solution addresses these issues by leveraging fragment libraries to provide additional structural information.

Benefits:

  • Improved accuracy in protein structure prediction.
  • Complementary information from fragment libraries enhances the prediction process.
  • Enables better understanding of protein structures and their functions.
  • Facilitates drug discovery and protein engineering efforts.

Abstract

According to implementations of the present disclosure, a solution is proposed for protein structure prediction. In this solution, from a fragment library for a target protein, a plurality of fragments is determined for each of a plurality of residue positions of the target protein. Each fragment comprises a plurality of amino acid residues. Then, a feature representation of structures of the plurality of fragments is generated for the each residue position. Next, a prediction of at least one of a structure and a structural property of the target protein is determined based on the respective feature representations generated for the plurality of residue positions. In this way, the solution can leverage structural information of fragment libraries to complement and complete information used in protein structure prediction, and the accuracy of protein structure prediction is thus improved.

MACHINE LEARNING SYSTEM WITH TWO ENCODER TOWERS FOR SEMANTIC MATCHING (17850763)

Main Inventor

Sudipto MUKHERJEE


Brief explanation

This patent application describes a machine learning system that uses a two-tower model for retrieving relevant chemical reaction procedures based on a given query chemical reaction. The model utilizes attention-based transformers and neural networks to convert tokenized representations of chemical reactions and procedures into embeddings in a shared embedding space.
  • The two-tower model consists of two separate towers, each containing a transformer network, a pooling layer, a normalization layer, and a neural network.
  • Labeled data pairs are used to train the model, consisting of a chemical reaction and the corresponding text of a chemical reaction procedure.
  • The model can be used to find chemical reaction procedures for a specific chemical reaction and also for similar reactions.
  • The architecture and training of the model enable semantic matching based on chemical structures.
  • The model achieves high accuracy, with an average recall at K=5 of 95.9%.

Potential Applications

  • Chemical research and development
  • Pharmaceutical industry
  • Chemical manufacturing processes
  • Education and training in chemistry

Problems Solved

  • Difficulty in finding relevant chemical reaction procedures
  • Lack of efficient semantic matching based on chemical structures
  • Time-consuming manual search for appropriate procedures

Benefits

  • Improved efficiency in finding chemical reaction procedures
  • Enhanced accuracy in retrieving relevant procedures
  • Time and cost savings in chemical research and development
  • Facilitates knowledge sharing and collaboration in the field of chemistry

Abstract

This disclosure describes a machine learning system that includes a contrastive learning based two-tower model for retrieval of relevant chemical reaction procedures given a query chemical reaction. The two-tower model uses attention-based transformers and neural networks to convert tokenized representations of chemical reactions and chemical reaction procedures to embeddings in a shared embedding space. Each tower can include a transformer network, a pooling layer, a normalization layer, and a neural network. The model is trained with labeled data pairs that include a chemical reaction and the text of a chemical reaction procedure for that chemical reaction. New queries can locate chemical reaction procedures for performing a given chemical reaction as well as procedures for similar chemical reactions. The architecture and training of the model make it possible to perform semantic matching based on chemical structures. The model is highly accurate providing an average recall at K=5 of 95.9%.

ACTIVITY MANAGEMENT APPLICATIONS AND SERVICES (17850311)

Main Inventor

Rui ZHU


Brief explanation

The patent application describes a computer-based user experience that allows users to consume information about physical and digital activities undertaken by themselves or others. Here are the key points:
  • The system includes a software application on a computing device that communicates with an online service to obtain activity information and activity topics.
  • The activities are grouped into activity groups based on the topics produced for the activities.
  • The activity groups are displayed in a user interface within the application.

Potential applications of this technology:

  • Personal activity tracking: Users can track and view their own physical and digital activities in a convenient and organized manner.
  • Social activity sharing: Users can share their activities with others and view the activities of their friends or contacts.
  • Data analysis: The system can analyze the activity information and topics to provide insights and trends related to user behavior.

Problems solved by this technology:

  • Information overload: The system helps users consume and organize large amounts of activity information in a meaningful way.
  • Lack of context: By grouping activities based on topics, the system provides a better understanding of the overall context and relevance of the activities.

Benefits of this technology:

  • Enhanced user experience: Users can easily access and navigate through their activities, improving their overall engagement and satisfaction.
  • Improved organization and efficiency: The system automatically groups activities based on topics, saving users time and effort in organizing their information.
  • Insights and trends: The analysis of activity information and topics can provide valuable insights and trends for personal or business purposes.

Abstract

Systems, methods, and software are disclosed herein that provide a computer-based user experience that allows a user to consume information about physical and digital activities undertaken by one or more users. In an implementation, a software application on a computing device communicates with an online service to obtain activity information indicative of such activities, as well as activity topics produced by the service. The application groups the activities into activity groups based at least on the topics produced for the activities, and displays the activity groups in a user interface to the application.

METHOD FOR SELECTIVELY ETCHING A METAL COMPONENT (18252032)

Main Inventor

Di XU


Brief explanation

The abstract describes a method for selectively etching a metal component of a workpiece using a hard mask and a basic etchant solution. The workpiece includes a semiconductor component with a specific material.
  • The method involves forming a hard mask over the metal component of the workpiece.
  • The metal component is then etched using a basic etchant solution, with the hard mask controlling the etching process.
  • The workpiece includes a semiconductor component made of a material described by Formula 1.

Potential applications of this technology:

  • Semiconductor manufacturing: This method can be used in the fabrication of semiconductor devices, where selective etching of metal components is often required.
  • Microelectronics: The method can be applied in the production of microelectronic devices, such as integrated circuits, to selectively remove metal layers.
  • MEMS fabrication: Microelectromechanical systems (MEMS) often involve metal components that need to be selectively etched, making this method useful in MEMS fabrication processes.

Problems solved by this technology:

  • Selective etching: The method provides a controlled way to etch metal components while protecting other parts of the workpiece, allowing for precise fabrication processes.
  • Compatibility with semiconductor materials: The use of a basic etchant solution and a hard mask ensures compatibility with semiconductor materials, preventing damage or unwanted reactions during the etching process.

Benefits of this technology:

  • Precision: The method allows for precise control over the etching process, ensuring accurate removal of metal components without affecting other parts of the workpiece.
  • Compatibility: The use of a basic etchant solution and a hard mask ensures compatibility with semiconductor materials, reducing the risk of damage or unwanted reactions.
  • Efficiency: The method provides an efficient way to selectively etch metal components, saving time and resources in the fabrication process.

Abstract

A method for selectively etching a metal component of a workpiece comprises: forming a hard mask over the metal component; and etching the metal component using an etchant solution, whereby the hard mask controls the etching; wherein the etchant solution is a basic etchant solution; and wherein the workpiece includes a semiconductor component comprising a material of Formula 1:

PROOF OF POSSESSION OF PRIVATE KEYS FOR REMOTE DEVICES (17847024)

Main Inventor

Andres Felipe BORJA JARAMILLO


Brief explanation

Abstract:

This patent application describes a method for validating proof of possession (POP) of a private key by a device. The process involves generating a provisioning package for a device catalog, which includes a POP challenge. When a device activation request is received, the computer system validates the POP by cryptographically verifying the signature using the public key, device identifier, and POP challenge. If the POP is valid, a trust relationship is established with the device by registering its public key and device identifier into the device catalog.

Explanation:

  • The patent application describes a method for validating proof of possession (POP) of a private key by a device.
  • A computer system generates a provisioning package for a device catalog, which includes a POP challenge.
  • When a device activation request is received, the computer system validates the POP by verifying the signature using the public key, device identifier, and POP challenge.
  • If the POP is valid, a trust relationship is established with the device by registering its public key and device identifier into the device catalog.

Potential Applications:

  • Secure device activation and registration processes.
  • Internet of Things (IoT) device management and authentication.
  • Secure communication between devices and computer systems.
  • Protection against unauthorized access and tampering.

Problems Solved:

  • Ensures that only devices with valid private keys can be activated and registered.
  • Prevents unauthorized devices from gaining access to a computer system or network.
  • Provides a secure method for verifying the authenticity of devices during the activation process.

Benefits:

  • Enhanced security and protection against unauthorized access.
  • Simplified device activation and registration processes.
  • Efficient management of device catalogs.
  • Scalable solution for large-scale device deployments.

Abstract

Validating proof of possession (POP) of a private key by a device. A computer system generates a provisioning package for a device catalog. The provisioning package including a POP challenge. After generating the provisioning package, the computer system receives a device activation request for a device. The device activation request includes a public key, a device identifier, and a signature. The computer system validates POP of a private key corresponding to the public key, including using the public key, the device identifier, and the POP challenge to cryptographically verify the signature. The computer system establishes a trust relationship with the device, including registering the public key and the device identifier into the device catalog.

TECHNIQUES FOR MONITORING NODE STATUS USING A THROUGHPUT METRIC (17809514)

Main Inventor

Vamshi Krishna KANCHARLA


Brief explanation

The patent application describes a method for detecting possible failures in network nodes by monitoring the data throughput of a network node over a specific time period. 
  • The monitoring application tracks the data sent or received by the network node.
  • It compares the data throughput to the average data throughput measured over historical time periods of similar duration.
  • If the data throughput is significantly lower than the average, it detects a possible failure in the network node.
  • The possible failure of the network node is then reported.

Potential Applications

  • Network monitoring and management systems
  • Internet service providers
  • Data centers
  • Telecommunication companies

Problems Solved

  • Early detection of possible failures in network nodes
  • Minimizing downtime and service disruptions
  • Efficient network maintenance and troubleshooting

Benefits

  • Proactive identification of network node failures
  • Improved network reliability and performance
  • Cost savings by reducing downtime and minimizing repair time

Abstract

Described are examples for detecting possible failure in network nodes by monitoring, by a monitoring application, a data throughput for at least one of data sent or received at a network node over a time period, detecting a possible failure of the network node based on comparing the data throughput to an average data throughput for the network node measured over one or more historical time periods of a similar duration as the time period, and/or reporting the possible failure of the network node.

INFERENCE WITH INLINE REAL-TIME ML MODELS IN APPLICATIONS (18462178)

Main Inventor

Xenofon FOUKAS


Brief explanation

The patent application describes a method for using codelets within applications to apply machine-learning models to application data. 
  • Codelets are small pieces of code that can be dynamically loaded into applications during execution.
  • A controller verifies the safety of the codelet based on its bytecode.
  • The verified codelet is loaded into the application's library and executed to apply application data to a machine-learning model.
  • The machine-learning model can be implemented within the codelet or called from a supported machine-learning model in the application's controller.
  • The computing device can reconstruct the machine-learning model based on a serial representation.

Potential Applications

  • This technology can be applied in various industries such as healthcare, finance, and manufacturing where machine-learning models are used to analyze application data.
  • It can be used in real-time data analysis applications to quickly infer results based on the latest data.

Problems Solved

  • The method ensures that codelets used for machine-learning inference within applications meet safety requirements, preventing potential security risks.
  • It allows for dynamic loading of codelets, enabling flexibility and adaptability in applying machine-learning models to different application scenarios.

Benefits

  • The use of codelets allows for efficient execution of machine-learning models within applications.
  • The verification process ensures the safety and reliability of the codelets used.
  • The ability to reconstruct machine-learning models based on a serial representation provides flexibility in model deployment and management.

Abstract

Described are examples for using codelets executing within applications to use machine-learning (ML) models to infer a result based on application data. The codelets may be dynamically loaded into the applications during execution. A controller verifies, based on extended Berkeley packet filter (eBPF) bytecode of the codelet, that the codelet satisfies safety requirements for execution within the application. A computing device executing the application loads the verified codelet into a library of the application. The application executes the verified codelet to apply application data to the machine-learning model to infer a result. The ML model may be implemented by the eBPF code of the codelet or the codelet may include a call to a machine-learning model of a type supported by a controller of the application and a map for a serial representation of the machine-learning model. The computing device may reconstruct the ML model based on the serial representation.

CONTROLLING NETWORK THROUGHPUT USING APPLICATION-LEVEL THROTTLING (17847416)

Main Inventor

Bradley David RUTKOWSKI


Brief explanation

==Abstract==

A congested network link is identified and the applications causing the congestion are determined. The contribution of each application to the congestion is evaluated to decide if their network usage should be limited. A control signal is generated to instruct the application to reduce its network bandwidth usage through throttling. If the initial throttling is insufficient, a more aggressive throttling operation is performed.

Patent/Innovation Explanation

  • Identifies a congested network link.
  • Determines which applications are causing the congestion.
  • Evaluates the contribution of each application to the congestion.
  • Decides if an application's network usage should be limited.
  • Generates a control signal to instruct the application to reduce its network bandwidth usage.
  • Performs an application-specific throttling operation.
  • If initial throttling is not enough, a more aggressive throttling operation is performed.

Potential Applications

  • Network management systems.
  • Internet service providers.
  • Cloud computing platforms.
  • Data centers.
  • Mobile network operators.

Problems Solved

  • Congestion on network links.
  • Identifying applications causing congestion.
  • Determining the contribution of each application to congestion.
  • Controlling and reducing network bandwidth usage.
  • Ensuring efficient network performance.

Benefits

  • Improved network performance and efficiency.
  • Reduced congestion on network links.
  • Fair allocation of network resources.
  • Ability to prioritize critical applications.
  • Enhanced user experience and reduced latency.

Abstract

A congested network link is identified. Applications that are contributing to the congestion are also identified. The contribution of each of the identified applications to the congestion is then determined in order to determine whether the application's usage of the network should be throttled. A control signal is generated in order to indicate to the application that it is to perform an application-specific throttling operation to reduce the network bandwidth consumed by the application. If the application-specific throttling does not sufficiently reduce network congestion, a more aggressive throttling operation is performed.

FINAL MESSAGE COMPOSITION FOR SIDEBAR COMMUNICATION THREADS (18243882)

Main Inventor

Amer Aref Hassan


Brief explanation

The patent application describes methods and systems for sidebar communication threads that are related to a main thread. Here are the key points:
  • Sidebar communication threads are created from a principal thread.
  • Messages in the sidebar thread include a history of the principal thread and a proposed message for the principal thread.
  • The sidebar thread includes messages from participants discussing the proposed message.
  • Once a termination condition is met, the sidebar thread ends.
  • The proposed message may become an accepted principal thread message, potentially modified by sidebar participants.
  • The accepted message is posted to the principal thread as if it was sent by the sidebar initiator.
  • The posted message does not include any sidebar thread content.

Potential applications of this technology:

  • Online discussion platforms could use sidebar threads to facilitate focused discussions on specific topics within a larger conversation.
  • Collaborative workspaces could benefit from sidebar threads to allow team members to discuss and refine ideas without cluttering the main thread.
  • Customer support systems could use sidebar threads to handle complex issues by involving multiple support agents in a separate discussion.

Problems solved by this technology:

  • It allows for more organized and focused discussions within a larger conversation.
  • It enables participants to have in-depth conversations without interrupting the flow of the main thread.
  • It provides a structured way to propose and refine ideas or solutions within a group.

Benefits of this technology:

  • Improved communication efficiency by separating focused discussions from the main thread.
  • Enhanced collaboration and brainstorming by allowing participants to discuss and refine ideas in a separate space.
  • Clearer decision-making process as proposed messages can be reviewed and modified by sidebar participants before being posted to the main thread.

Abstract

Disclosed in some examples are methods, systems, devices, and machine-readable mediums which provide for sidebar communication threads forked from, or related to, a principal thread. Messages in the sidebar communication thread may include a history of the principal thread, including one or more messages from the principal thread, and may include a proposed principal thread message that is the subject of the sidebar thread discussion. The sidebar thread may also include sidebar thread messages that carries the conversation of the sidebar thread participants. Once a termination condition is reached for the sidebar thread, the sidebar thread terminates and either the proposed principal thread message (as potentially modified by participants of the sidebar thread) becomes an accepted principal thread message and it is posted to the principal thread as if it was sent by the sidebar initiator or no message is posted (e.g., the proposed principal thread message is rejected). The message that is posted may not include any sidebar thread content.

CONFIGURATION OF MULTIPLE SECRETS (17849583)

Main Inventor

Nicolas Harry NEATE


Brief explanation

Techniques are described for managing secrets for accessing resources of a computing service provider by a client computing device. Two secrets are created that are valid for accessing the resource by the client computing device. When one of the two secrets are invalid for accessing the resource, the client computing device can use the second of the two secrets to gain access to the resource.
  • Two secrets are generated for accessing a computing service provider's resources.
  • If one secret is invalid, the client computing device can use the second secret for access.
  • This technique ensures uninterrupted access to resources even if one secret becomes invalid.

Potential Applications

  • Cloud computing services
  • Online storage providers
  • Web hosting services

Problems Solved

  • Ensures continuous access to resources even if one secret becomes invalid.
  • Reduces downtime and interruptions in accessing computing service provider's resources.

Benefits

  • Improved reliability and availability of resources.
  • Enhanced security by having multiple secrets for access.
  • Simplified management of secrets for accessing resources.

Abstract

Techniques are described for managing secrets for accessing resources of a computing service provider by a client computing device. Two secrets are created that are valid for accessing the resource by the client computing device. When one of the two secrets are invalid for accessing the resource, the client computing device can use the second of the two secrets to gain access to the resource.

UTILIZING PROBABILITY DATA STRUCTURES TO IMPROVE ACCESS CONTROL OF DOCUMENTS ACROSS GEOGRAPHIC REGIONS (17848896)

Main Inventor

Charitha Herath DASKON HERATH MUDIYANSELAGE


Brief explanation

The present disclosure describes a system for efficiently determining user access control for digital documents stored in different geographic regions. The system utilizes a content access authorization system to convert sensitive user information into a probabilistic data structure that does not include user information. This probabilistic data structure is then shared with a different geographic region.
  • The content access authorization system converts sensitive user information into a probabilistic data structure.
  • The probabilistic data structure does not include user information.
  • The probabilistic data structure is shared with a different geographic region.
  • The system pre-filters user document access control for digital documents requested by a user in the second geographic region.
  • This reduces the number of document control access queries needed to be made to the first geographic region.
  • The system significantly saves on latency and computing resource usage.

Potential Applications

  • Efficient user access control for digital documents stored in different geographic regions.
  • Improved performance and reduced latency in accessing digital documents across different regions.

Problems Solved

  • Reduces the number of document control access queries needed to be made to a different geographic region.
  • Saves on latency and computing resource usage.

Benefits

  • Efficient and flexible user access control for digital documents.
  • Improved performance and reduced latency in accessing digital documents across different regions.
  • Reduced computing resource usage.

Abstract

The present disclosure relates to systems, methods, and computer-readable media for utilizing a content access authorization system to determine user access control efficiently and flexibly for digital documents that are stored in different geographic regions. For instance, the content access authorization system can convert sensitive user information for digital documents stored in a first geographic region into a probabilistic data structure that does not include user information and share the probabilistic data structure with a second geographic region. The content access authorization system can then utilize the probabilistic data structure to efficiently pre-filter user document access control for digital documents requested by a user in the second geographic region that are stored in the first geographic region, which significantly saves on latency and computing resource usage by reducing the number of document control access queries needed to be made to the first geographic region.

DETECTING AND MITIGATING ABUSIVE NETWORK ACTIVITY BASED ON VERSIONED BROWSER USAGE (17852267)

Main Inventor

Cormac E. HERLEY


Brief explanation

Methods for detecting and mitigating abusive network activity based on versioned browser usage are described in this patent application. The system determines usage values for network activity of legacy web browser versions, representing benign network activity associated with active instances of the legacy versions over prior time periods. By assuming a generally decreasing number of active instances of legacy browser versions over time, the system estimates a bound of benign network activity for each version based on an approximate percentage of benign traffic associated with a minimum past usage value. Current network activity is monitored to determine current usage values for the legacy versions, and network actions are performed based on deviations from past usage values according to the bound.
  • The patent application describes a method for detecting and mitigating abusive network activity based on the usage of legacy web browser versions.
  • Usage values for network activity of legacy browser versions are determined, representing benign network activity associated with active instances of the legacy versions over prior time periods.
  • The system estimates a bound of benign network activity for each legacy version by associating an approximate percentage of benign traffic with a minimum past usage value, assuming a generally decreasing number of active instances over time.
  • Current network activity is monitored to determine current usage values for the legacy versions.
  • Network actions are performed based on deviations of current usage values from past usage values according to the estimated bound.

Potential Applications

This technology can be applied in various domains where network security and abuse detection are crucial, such as:

  • Internet service providers (ISPs) can utilize this method to detect and mitigate abusive network activity originating from legacy web browser versions.
  • Web hosting companies can implement this technology to protect their servers and networks from malicious activities associated with outdated browser versions.
  • Online platforms and websites can use this method to identify and block abusive users who exploit vulnerabilities in legacy browsers.

Problems Solved

The patent application addresses the following problems:

  • Abusive network activity originating from legacy web browser versions can pose security risks and cause harm to networks, servers, and users.
  • Detecting and mitigating such abusive activity can be challenging, especially when dealing with outdated browser versions that may have known vulnerabilities.
  • Existing methods may not effectively differentiate between legitimate and abusive network activity, leading to false positives or false negatives in abuse detection.

Benefits

The technology described in this patent application offers several benefits:

  • Improved network security by detecting and mitigating abusive network activity associated with legacy web browser versions.
  • More accurate identification of abusive users and protection against potential vulnerabilities in outdated browsers.
  • Efficient allocation of network resources by focusing on monitoring and mitigating the most relevant and potentially harmful network activity.

Abstract

Methods for detecting and mitigating abusive network activity based on versioned browser usage are performed by systems and devices. Usage values for network activity of legacy web browser versions are determined, where the usage values represent benign network activity associated with active instances of the legacy versions over prior time periods. The number of active instances of legacy browser versions is assumed to generally be monotonically decreasing over time, and thus a bound of benign network activity for each of the legacy versions can be estimated by associating an approximate percentage of benign traffic with a minimum past usage value. Current network activity is monitored to determine current usage values for the legacy versions, and network actions are performed based on current usage values deviating from past usage values according to the bound.

USING A REQUESTOR IDENTITY TO ENFORCE A SECURITY POLICY ON A NETWORK CONNECTION THAT CONFORMS TO A SHARED-ACCESS COMMUNICATION PROTOCOL (17847117)

Main Inventor

Or MORAN


Brief explanation

The patent application describes techniques for enforcing a security policy on a network connection using a requestor identity in a shared-access communication protocol.
  • The techniques involve receiving a request to create a network connection to a network resource.
  • The request is associated with a requestor identity, which identifies the entity making the request.
  • The network connection is also associated with the requestor identity.
  • A determination is made whether the requesting entity is authorized to access the network resource based on a permission indicated by the security policy.
  • If the permission indicates authorization, the network connection to the network resource is created.

Potential Applications

  • Network security systems
  • Access control systems
  • Shared-access communication protocols

Problems Solved

  • Enforcing security policies on network connections
  • Authorizing access to network resources
  • Managing shared-access communication protocols

Benefits

  • Improved network security
  • Efficient access control mechanisms
  • Enhanced management of shared-access communication protocols

Abstract

Techniques are described herein that are capable of using a requestor identity to enforce a security policy on a network connection that conforms to a shared-access communication protocol. A request to create the network connection to a network resource is received. The network connection is associated with the requestor identity, which identifies a requesting entity associated with the request, by associating the request with the requestor identity and further by associating the network connection with the request. A determination is made whether the requesting entity is authorized to access the network resource based at least in part on a permission that is indicated by the security policy. Based at least in part on the permission indicating that the requesting entity is authorized to access the network resource, the network connection to the network resource is created.

QUERYLESS DEVICE CONFIGURATION DETERMINATION-BASED TECHNIQUES FOR MOBILE DEVICE MANAGEMENT (18313104)

Main Inventor

Shayak Lahiri


Brief explanation

The patent application describes a system for managing device compliance in an enterprise network. Here are the key points:
  • The system is designed to ensure that devices connected to an enterprise network comply with the organization's data and security policies.
  • A mobile device manager provides configuration settings to a computing device, which implements these settings to achieve compliance.
  • The mobile device manager maintains a local reference of each device's configuration settings, eliminating the need to query the device for its settings every time compliance is checked.
  • This approach can be extended to determine compliance for security baselines, IoT devices, and devices used by business partners on the enterprise network.

Potential applications of this technology:

  • Enterprise network management: The system can be used to efficiently manage and enforce compliance across a large number of devices connected to an enterprise network.
  • Security and data protection: By ensuring compliance with data and security policies, the system helps protect sensitive information and prevent unauthorized access.
  • IoT device management: The system can be used to monitor and enforce compliance for IoT devices connected to an enterprise network, ensuring they meet security and data requirements.

Problems solved by this technology:

  • Manual configuration management: The system automates the process of configuring devices to comply with enterprise policies, reducing the need for manual intervention.
  • Compliance monitoring: By maintaining a local reference of device settings, the system simplifies the process of checking compliance, saving time and effort.
  • Scalability: The system can handle a large number of devices connected to the enterprise network, making it suitable for organizations of all sizes.

Benefits of this technology:

  • Improved efficiency: The system streamlines the process of managing device compliance, reducing administrative overhead and freeing up resources.
  • Enhanced security: By ensuring compliance with data and security policies, the system helps protect the enterprise network from potential threats and vulnerabilities.
  • Simplified compliance monitoring: The system eliminates the need to query devices for their settings, making compliance checks faster and more reliable.

Abstract

Embodiments described herein are directed to managing device compliance for devices that are connected to an enterprise network. For example, a mobile device manager may provide configuration settings to a computing device, which implements the settings in order to be compliant with an enterprise's data and/or security policy. The mobile device manager also maintains a local reference of each device's configuration settings implemented thereby. When the mobile device manager subsequently performs a determination as to whether the computing device is still in compliance, the mobile device manager simply needs to refer to the local reference to determine the computing device's settings instead of explicitly querying the computing device for its settings. The foregoing techniques may be extended for security baseline compliance determinations, IoT device compliance determinations and compliance determinations for other types of devices, such as devices utilized by business partners of the enterprise that utilize the enterprise's network.

MEDIA FLOW CONTROL FOR DIRECT ROUTING IN NETWORK-BASED TELEPHONY (18244772)

Main Inventor

Nikolay Muravlyannikov


Brief explanation

The patent application describes methods, systems, and machine-readable mediums for a network-based communication service to control signaling and media flow within non-public networks for direct-routed communication sessions.
  • The patent application focuses on network-based communication sessions, such as telephony.
  • The signaling and media flow within non-public networks are controlled using SIP protocol extensions.
  • The SIP protocol extensions specify both the signaling route and the media route for efficient communication.
  • The methods, systems, and machine-readable mediums enable the network-based communication service to have control over the entire communication process.
  • The innovation allows for improved management and optimization of signaling and media flow within non-public networks.

Potential Applications

  • Telephony services
  • Voice over IP (VoIP) systems
  • Unified communication platforms

Problems Solved

  • Lack of control over signaling and media flow in network-based communication sessions
  • Inefficient communication routing within non-public networks
  • Difficulty in managing and optimizing signaling and media flow

Benefits

  • Enhanced control over the entire communication process
  • Improved efficiency and optimization of signaling and media flow
  • Better management of network-based communication sessions

Abstract

Disclosed in some examples are methods, systems, and machine-readable mediums that allow a network-based communication service to control a signaling path and media flow within non-public networks for direct-routed network-based communication sessions (e.g., telephony). The signaling and media flow may be controlled by using SIP protocol extensions to specify both the signaling route and the media route.

Device with Translation Mechanism (17847749)

Main Inventor

Nicholas WENDT


Brief explanation

The patent application describes a hinged computing device with a unique mechanism involving magnets and a translation mechanism. Here is a simplified explanation of the abstract:
  • The device consists of two portions connected by a hinge, each portion having a magnet at its distal end.
  • A translation mechanism is present, which includes a button that can send control signals and exert a force on the first magnet.
  • This force affects the magnetic attraction between the first and second magnets.

Potential Applications:

  • Hinged computing devices, such as laptops or tablets, could benefit from this technology.
  • Other electronic devices with hinged components could also incorporate this mechanism.

Problems Solved:

  • This technology solves the problem of controlling electronic components in hinged devices while also providing a physical force for magnetic attraction.
  • It addresses the challenge of maintaining a secure and stable connection between the two portions of the device.

Benefits:

  • The translation mechanism allows for easy control of electronic components, enhancing user experience.
  • The magnetic attraction between the two portions of the device can be adjusted based on the force exerted on the first magnet.
  • This technology provides a reliable and efficient way to secure and stabilize hinged devices.

Abstract

The description relates to hinged devices, such as hinged computing devices. One example can include a first portion extending from a hinge end to a distal end that includes a first magnet and a second portion extending from a hinge end to a distal end and includes a second magnet. A translation mechanism can cause a button to both send control signals for electronic components of the device and create a force that acts on the first magnet to affect magnetic attraction between the first and second magnets.

PROCESSING INCOMING CALLS WHILE IN A DRIVING MODE (17851471)

Main Inventor

Tapas Kumar SARKAR


Brief explanation

The present disclosure is about a system that allows users to engage a driving mode on their mobile devices and process incoming calls in a safe manner while driving. The system uses observed signals to determine if the user is driving and wants to auto-reply to calls. It also provides a low-distraction mechanism for the user to send a text message with their expected availability.
  • The system enables users to engage a driving mode on their mobile devices.
  • It processes incoming calls in a safe manner while the user is driving.
  • The driving mode can be selectively engaged based on observed signals indicating the user is driving and wants to auto-reply to calls.
  • The system provides a low-distraction mechanism for the user to send a text message with their expected availability.

Potential Applications

  • Mobile devices with driving mode can be used by drivers to safely handle incoming calls while on the road.
  • The system can be integrated into navigation systems or car infotainment systems to provide a seamless driving mode experience.

Problems Solved

  • This system addresses the problem of distracted driving by providing a safe and low-distraction way to handle incoming calls while driving.
  • It solves the problem of users needing to manually respond to calls while driving, which can be dangerous and illegal in some jurisdictions.

Benefits

  • Users can safely handle incoming calls while driving without significantly decreasing safety.
  • The system provides a convenient way for users to auto-reply to calls and send text messages with their expected availability.
  • It reduces the risk of accidents caused by distracted driving.

Abstract

The present disclosure relates to engaging a driving mode on a client device (e.g., a mobile device) and implementing instructions of a driving mode configuration to process incoming calls received while engaged in the driving mode. The systems described herein enable a user to respond to an incoming call while driving or otherwise traveling without significantly decreasing the safety of the user or other users in a vehicle while driving. For example, driving mode management system can selectively engage the driving mode based on a combination of observed signals indicative of the user driving and having a desire to auto-reply to any received calls. The driving mode management system may additional provide a low-distraction mechanism that enables the user to generate and transmit a text message that may include text as well as a time that the user is expected to be available.

DISTRIBUTED TELECONFERENCING USING PERSONALIZED ENHANCEMENT MODELS (17848678)

Main Inventor

Ross CUTLER


Brief explanation

The patent application relates to distributed teleconferencing and proposes techniques to enhance call quality for co-located users using their own devices. The innovations include:
  • Personalized enhancement models to improve microphone signals for participants in a call.
  • Proximity-based mixing to omit microphone signals from devices in the same room from playback signals transmitted to other devices in that room.

Potential applications of this technology:

  • Teleconferencing platforms and software.
  • Collaboration tools for remote teams.
  • Virtual meetings and webinars.

Problems solved by this technology:

  • Poor call quality in teleconferencing sessions.
  • Difficulty in hearing participants in a crowded or noisy room.
  • Echoes and background noise affecting the clarity of audio.

Benefits of this technology:

  • Enhanced call quality for teleconferencing sessions.
  • Improved audio clarity for co-located users.
  • Better user experience and communication during remote meetings.

Abstract

This document relates to distributed teleconferencing. Some implementations can employ personalized enhancement models to enhance microphone signals for participants in a call. Further implementations can perform proximity-based mixing, where microphone signals received from devices in a particular room can be omitted from playback signals transmitted to other devices in the same room. These techniques can allow enhanced call quality for teleconferencing sessions where co-located users can employ their own devices to participate in a call with other users.

HEADSET VIRTUAL PRESENCE (18243140)

Main Inventor

Kenneth P. HINCKLEY


Brief explanation

The patent application is about techniques for creating a virtual presence for participants in a communication session who do not have a video feed. This can be due to user preference or lack of appropriate hardware. The virtual presence allows non-video participants to be represented in the communication session similar to video participants. The virtual presence can be controlled using a headset device, allowing movements detected by the headset to be reflected in the virtual presence. Users can also input emotions to be conveyed by the virtual presence, specifying the type and intensity of the emotion.
  • Participants without a video feed can have a virtual presence generated for them in a communication session.
  • The virtual presence can be controlled using a headset device.
  • Movements detected by the headset device can be reflected in the virtual presence.
  • Users can input emotions to be conveyed by the virtual presence.
  • Emotions can be specified in terms of type and intensity.

Potential Applications

  • Enhancing communication sessions by providing a virtual presence for non-video participants.
  • Enabling users to express emotions through their virtual presence.
  • Improving inclusivity by allowing participants without video feeds to be represented in a communication session.

Problems Solved

  • Lack of video feed or appropriate hardware can prevent participants from fully engaging in a communication session.
  • Non-video participants may feel excluded or disconnected from the session.
  • Inability to convey emotions through non-verbal cues in a communication session.

Benefits

  • Allows non-video participants to be represented in a communication session.
  • Enhances the overall experience of communication sessions.
  • Provides a more inclusive and engaging environment for all participants.
  • Enables users to express emotions and non-verbal cues in a virtual setting.

Abstract

Aspects of the present disclosure relate to headset virtual presence techniques. For example, a participant of a communication session may not have an associated video feed, for example as a result of a user preference to disable video communication or a lack of appropriate hardware. Accordingly, a virtual presence may be generated for such a non-video participant, such that the non-video participant may be represented within the communication session similar to video participants. The virtual presence may be controllable using a headset device, for example such that movements identified by the headset device cause the virtual presence to move. In some instances, user input may be received to control emotions conveyed by the virtual presence, for example specifying an emotion type and/or intensity.

REPEATED NONDESTRUCTIVE PHOTODETECTOR READOUT ASSESSMENTS (17809474)

Main Inventor

Cyrus Soli BAMJI


Brief explanation

The abstract describes an image sensor that includes a photo detector and a readout structure. The photo detector accumulates photo charges in response to incident photons during an integration period, while the readout structure assesses the amount of minority carrier photo charges accumulated at the photo detector.
  • The image sensor includes a photo detector and a readout structure.
  • The photo detector accumulates photo charges in response to incident photons during an integration period.
  • The readout structure repeatedly and nondestructively assesses the amount of minority carrier photo charges accumulated at the photo detector during the integration period.

Potential Applications

  • Digital cameras
  • Surveillance systems
  • Medical imaging devices
  • Machine vision systems

Problems Solved

  • Accurate measurement of photo charges accumulated at the photo detector
  • Nondestructive assessment of minority carrier photo charges
  • Efficient integration of incident photons

Benefits

  • Improved image quality
  • Higher sensitivity to light
  • Enhanced dynamic range
  • Reduced noise levels

Abstract

An image sensor is disclosed. The image sensor includes a photo detector and a readout structure electronically coupled to the photodetector. The photodetector is configured to accumulate one or more photo charges responsive to one or more incident photons during an integration period. The readout structure is configured to repeatedly and nondestructively assess an amount of minority carrier photo charges accumulated at the photodetector during the integration period.

CHANNEL CONTROL FOR COMMUNICATION USING DYNAMIC SPECTRUM ACCESS (18464198)

Main Inventor

Tusher CHAKRABORTY


Brief explanation

The patent application describes a system for communication between a base station and client devices using dynamic spectrum access. Here are the key points:
  • The system selects a set of channels from a list of available channels for communication.
  • The selected channels include both uplink channels (from client devices to the base station) and downlink channels (from the base station to client devices).
  • The assignment of uplink and downlink channels to client devices is based on their locations.
  • Some client devices may have common active channels, meaning they share the same uplink and downlink channels.
  • Acknowledgements from client devices with common active channels are grouped together.
  • These acknowledgements contain medium access control (MAC) commands specific to the subset of client devices.
  • Each message sent on the uplink channels is followed by a downlink acknowledgement.

Potential applications of this technology:

  • Wireless communication systems: This system can be used in wireless networks to efficiently allocate channels to client devices based on their locations.
  • Internet of Things (IoT): The system can be applied to IoT devices to enable reliable and efficient communication between the devices and a central base station.
  • Mobile networks: This technology can be implemented in mobile networks to improve the allocation of channels and optimize communication between base stations and mobile devices.

Problems solved by this technology:

  • Efficient channel allocation: The system solves the problem of efficiently assigning channels to client devices based on their locations, ensuring optimal communication.
  • Grouping acknowledgements: By grouping acknowledgements from client devices with common active channels, the system reduces overhead and improves the efficiency of communication.

Benefits of this technology:

  • Improved communication efficiency: The system optimizes channel allocation and reduces overhead, resulting in improved communication efficiency.
  • Reliable communication: By assigning channels based on client device locations, the system ensures reliable communication between the base station and client devices.
  • Scalability: The system can be scaled to accommodate a large number of client devices, making it suitable for various applications and environments.

Abstract

The disclosure described herein configures a base station and client devices for communication using dynamic spectrum access within a frequency spectrum that includes selecting, from a list of available channels, a set of channels as active channels. The active channels include uplink channels and downlink channels. An uplink channel and a downlink channel are assigned to a plurality of client devices based on locations the client devices, wherein at least some client devices have active channels in common. Acknowledgements from the subset of client devices having the common active channel are grouped, the acknowledgements containing medium access control (MAC) commands specific to the subset of client devices, where each message of a plurality of messages on the uplink channels is followed by a downlink acknowledgement.

WIRELESS UPLINK COMMUNICATION SYSTEM (17808504)

Main Inventor

Nir DAVID


Brief explanation

The disclosed technology enables wireless uplink transmission from a computing device to a peripheral device using a multiuse communication protocol and a dedicated uplink communication protocol. 
  • The digitizer of the computing device communicates with the peripheral device over a wireless connection.
  • The digitizer receives input from the peripheral input device to affect the operation of the computing device.
  • Initially, the communication between the digitizer and the peripheral device is done using a multiuse communication protocol.
  • The multiuse communication protocol allows for bidirectional communication between the devices.
  • When the digitizer needs to transmit data to the peripheral device, it transitions to a dedicated uplink communication protocol.
  • In the dedicated uplink communication protocol, the digitizer sends multiple consecutive uplink blocks of data before accepting downlink communications from the peripheral device.
  • This allows for efficient transmission of data from the computing device to the peripheral device.
  • The technology also supports consecutive data uplink blocks representing an upload to the peripheral device.

Potential applications of this technology:

  • Wireless communication between a computer and a wireless peripheral device.
  • Wireless transmission of data from a computing device to a peripheral input device.
  • Enabling efficient and reliable wireless uplink transmission in various devices.

Problems solved by this technology:

  • Overcoming limitations of traditional wireless communication protocols for efficient uplink transmission.
  • Ensuring reliable and uninterrupted communication between a computing device and a peripheral device.
  • Improving the efficiency of data transmission from a computing device to a peripheral input device.

Benefits of this technology:

  • Improved wireless uplink transmission efficiency.
  • Enhanced reliability and uninterrupted communication between devices.
  • Simplified and streamlined wireless communication between a computing device and a peripheral device.

Abstract

The disclosed technology provides wireless uplink transmission from a computing device to a peripheral device by communicating over a wireless connection between a digitizer of the computing device and the peripheral device by a multiuse communication protocol in which the digitizer receives input from the peripheral input device to affect operation of the computing device, transitioning communication from the multiuse communication protocol to a dedicated uplink communication protocol in which communication between with the peripheral input device includes transmission of multiple consecutive uplink blocks before the digitizer accepts downlink communications from the peripheral input device, and transmitting, while using the dedicated uplink communication protocol, consecutive data uplink blocks representing an upload to the peripheral input device before the digitizer accepts downlink communications from the peripheral input device.

ULTRA DENSE PROCESSORS WITH EMBEDDED MICROFLUIDIC COOLING (17848755)

Main Inventor

Bharath RAMAKRISHNAN


Brief explanation

The abstract describes a processing unit that consists of two dies separated by a microfluidic volume. The dies are connected by at least one heat transfer structure located within the microfluidic volume. An electrochemical fluid is present in the microfluidic volume to provide electrochemical energy to the dies and absorb heat from them.
  • The processing unit includes two dies and a microfluidic volume.
  • The dies are connected by a heat transfer structure within the microfluidic volume.
  • An electrochemical fluid is used to provide energy to the dies and absorb heat from them.

Potential Applications:

  • This technology can be used in electronic devices such as computers, smartphones, and servers to improve their processing capabilities and thermal management.
  • It can also be applied in high-performance computing systems, data centers, and other computing-intensive environments.

Problems Solved:

  • The technology addresses the challenge of thermal management in electronic devices by providing an efficient heat transfer mechanism.
  • It solves the problem of limited processing capabilities by utilizing electrochemical energy to enhance the performance of the dies.

Benefits:

  • The use of a microfluidic volume and heat transfer structure improves the cooling efficiency of the processing unit, preventing overheating and potential damage to the dies.
  • The integration of electrochemical energy enhances the processing capabilities of the dies, leading to improved performance and efficiency.
  • This technology offers a compact and scalable solution for thermal management and energy supply in electronic devices.

Abstract

A processing unit includes a first die and a second die with a microfluidic volume between the first die and the second die. At least one heat transfer structure couples the first die to the second die and is located in the microfluid volume. An electrochemical fluid is positioned in the microfluidic volume to provide electrochemical energy to at least one of the first die and the second die and receive heat from the first die and the second die.

SYSTEMS AND METHODS FOR CRYOGENIC COOLING (17851333)

Main Inventor

Luke Thomas GREGORY


Brief explanation

Abstract:

A computing system is described that includes a heat-generating component and an evaporation plate thermally connected to the heat-generating component. The system also includes a cryogenic cooling system positioned near the evaporation plate, which releases a cryogenic fluid onto the plate to cool the heat-generating component. The cryogenic fluid has a boiling point below 273 K.

Patent/Innovation Explanation:

  • Computing system with a heat-generating component and an evaporation plate connected to it.
  • Cryogenic cooling system positioned near the evaporation plate.
  • Cryogenic cooling system releases a cryogenic fluid onto the plate to cool the heat-generating component.
  • Cryogenic fluid used has a boiling point below 273 K.

Potential Applications:

  • High-performance computing systems.
  • Data centers and server farms.
  • Overclocked gaming computers.
  • Supercomputers and scientific simulations.
  • Any application requiring efficient cooling of heat-generating components.

Problems Solved:

  • Overheating of heat-generating components in computing systems.
  • Inadequate cooling solutions for high-performance computing.
  • Thermal management challenges in data centers and server farms.
  • Limitations of traditional cooling methods for overclocked gaming computers.
  • Ensuring optimal performance and longevity of heat-generating components.

Benefits:

  • Efficient cooling of heat-generating components.
  • Improved performance and reliability of computing systems.
  • Reduced risk of component damage due to overheating.
  • Enhanced thermal management capabilities for high-performance computing.
  • Potential for increased lifespan and reduced maintenance costs.

Abstract

A computing system and related methods are described. The computing system includes a heat-generating component. The computing system includes an evaporation plate thermally connected to the heat-generating component. The computing system includes a cryogenic cooling system positioned proximate to the evaporation plate. The cryogenic cooling system is configured to release a cryogenic fluid onto the evaporation plate to cool the heat-generating component. The cryogenic fluid has a boiling point of less than 273 K.

METHOD OF FORMING A THIN FILM (18039202)

Main Inventor

Keita Otani


Brief explanation

==Abstract Explanation==

This patent application describes a method for creating a thin film of material on a semiconductor substrate. The method involves depositing a thin film of metal onto the substrate's surface in an ultra-high vacuum environment. The substrate is cooled to a temperature of 260 K or lower during the deposition process. This cooling allows for the creation of an atomically flat and highly uniform thin film. The patent also mentions that a device can be obtained using this method.

Bullet Points

  • Method for forming a thin film of material on a semiconductor substrate
  • Thin film deposition is performed in an ultra-high vacuum
  • Substrate is cooled to a temperature of 260 K or lower during deposition
  • Cooling enables the creation of an atomically flat and uniform thin film
  • Device can be obtained using this method

Potential Applications

  • Semiconductor manufacturing
  • Thin film electronics
  • Optoelectronics
  • Solar cells
  • Microelectronics

Problems Solved

  • Achieving an atomically flat and uniform thin film on a semiconductor substrate
  • Ensuring a high-quality deposition process
  • Improving the performance and reliability of semiconductor devices

Benefits

  • Atomically flat and highly uniform thin film
  • Improved device performance and reliability
  • Enhanced manufacturing capabilities
  • Potential for advancements in various electronic and optoelectronic technologies

Abstract

A method of forming a thin film of material on a surface of a substrate, the substrate comprising a semiconductor, comprises: depositing a thin film of metal on the surface of the substrate, wherein the deposition is performed in an ultra-high vacuum, and wherein the substrate is at a temperature of less than or equal to 260 K during the deposition. Cooling the substrate during deposition of the thin film of metal may allow for an atomically flat and very uniform thin film to be obtained. Also provided is a device obtainable by the method.