Microsoft Technology Licensing, LLC patent applications on April 25th, 2024
Patent Applications by Microsoft Technology Licensing, LLC on April 25th, 2024
Microsoft Technology Licensing, LLC: 41 patent applications
Microsoft Technology Licensing, LLC has applied for patents in the areas of G06N20/00 (10), G06F40/30 (6), G06F3/0482 (4), G06F16/951 (4), H04L9/08 (3)
With keywords such as: data, computing, based, device, systems, content, access, user, network, and input in patent application abstracts.
Patent Applications by Microsoft Technology Licensing, LLC
Inventor(s): Harini CHIMALAPATI of Bellevue WA (US) for microsoft technology licensing, llc, Christopher Jon JOHNSON of Snoqualmie WA (US) for microsoft technology licensing, llc, Jingyang Xue of Sunnyvale WA (US) for microsoft technology licensing, llc
IPC Code(s): G02B27/01, H01S3/034, H01S3/04
Abstract: the present disclosure relates to systems, methods, and computer readable media for modeling thermal effects within a multi-laser device. for example, systems described herein may include a plurality of laser devices that output energy streams having corresponding operating windows. one or more systems described herein may include a set of accumulators for tracking quantities of energy samples within operating windows and populating a queue representative of the tracked quantities. one or more systems described herein may additionally include filters and a summing module for determining temperature values for operating windows and synchronizing the temperature values with one another to determine an accurate system temperature for the multi-laser device. the features described herein facilitate synchronization of data for corresponding operating windows to provide an accurate determination of system temperature based on a combination of self-heating and crosstalk effects between multiple laser devices.
Inventor(s): Gilad KIRSHENBOIM of Petach Tiqva (IL) for microsoft technology licensing, llc, Ran SAHAR of Evan Yehuda (IL) for microsoft technology licensing, llc, Douglas C. BURGER of Bellevue WA (US) for microsoft technology licensing, llc, Yehonathan REFAEL KALIM of Herzeliya (IL) for microsoft technology licensing, llc
IPC Code(s): G06F1/3234, G06F7/544, G06F13/10, G06N3/02
Abstract: methods, systems and computer program products are provided for improving performance (e.g., reducing power consumption) of a hardware accelerator (e.g., neural processor) comprising hybrid or analog multiply and accumulate (mac) processing elements (pes). selective variation of the precision of an array of mac pes may reduce power consumption of a neural processor. power may be conserved by dynamically controlling the precision of analog to digital (adc) output bits for one or more mac pes. dynamic control of adc output bit precision may be based on precision information determined during training and/or post-training (e.g., quantization) of an artificial intelligence (ai) neural network (nn) model implemented by the neural processor. precision information may include a range of dynamic precision for each of a plurality of nodes of a computation graph for the ai nn model.
Inventor(s): Hannah Rebecca LEWBEL of Kirkland WA (US) for microsoft technology licensing, llc, Isabel Sophie SHARP of Seattle WA (US) for microsoft technology licensing, llc, Adam Michael GLEISNER of Seattle WA (US) for microsoft technology licensing, llc, Lindsey CONWAY of Seattle WA (US) for microsoft technology licensing, llc, Clea ALLINGTON of Seattle WA (US) for microsoft technology licensing, llc, Minu GEORGE of Sammamish WA (US) for microsoft technology licensing, llc, Samantha Robbie COURTS of Bellevue WA (US) for microsoft technology licensing, llc, Margaret Arlene GROUNDS of Kirkland WA (US) for microsoft technology licensing, llc, Scott H.W. SNYDER of Seattle WA (US) for microsoft technology licensing, llc, Nassr ALBAHADLY of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F3/0482, G06F3/14
Abstract: technologies are disclosed that enable a computing system to present a structured arrangement for tracking content items on a shared user interface (ui) during a communication session. the structured arrangement is a list that is displayed in a specific region of the shared ui. inclusion of content items in the list makes it easier for users to locate and interact with those content items throughout the communication session. the ability to create and manipulate the list may be limited to only certain users such as a moderator. use of this list can promote inclusivity and fairness. for instance, inclusion in the list may prevent content items from being forgotten or ignored. additionally, the names of users who contributed the content items may be shown in the list thereby providing recognition for those users.
Inventor(s): Jinhang CHOI of Bellevue WA (US) for microsoft technology licensing, llc, Haishan ZHU of Bellevue WA (US) for microsoft technology licensing, llc, Yi LUO of Issaquah WA (US) for microsoft technology licensing, llc, Eric S. CHUNG of Woodinville WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F3/06
Abstract: embodiments of the present disclosure include systems and methods for transposing matrices based on a multi-level crossbar. a system may include a memory configured to store a matrix comprising a plurality of elements arranged in a set of rows and a set of columns. a system may include an input buffer configured to retrieve a subset of a plurality of elements from the memory. each element in the subset of the plurality of elements is retrieved from a different column in the matrix. a system may include a multi-level crossbar configured to perform a transpose operation on the subset of the plurality of elements. a system may include an output buffer configured to receive the transposed subset of the plurality of elements and store, in the memory, each element in the transposed subset of the plurality of elements in a different column in the matrix.
Inventor(s): AMANDEEP SINGH BAKSHI of WEST LAFAYETTE IN (US) for microsoft technology licensing, llc., XIN SHI of KIRKLAND WA (US) for microsoft technology licensing, llc., NEELAKANTAN SUNDARESAN of BELLEVUE WA (US) for microsoft technology licensing, llc., ALEXEY SVYATKOVSKIY of BELLEVUE WA (US) for microsoft technology licensing, llc.
IPC Code(s): G06F8/36, G06F8/65, G06F11/36
Abstract: a source code patch generation system uses the context of a buggy source code snippet of a source code program and a hint to predict a source code segment that repairs the buggy source code snippet. the hint is a source code segment that is semantically-similar to the buggy source code snippet where the similarity is based on a context of the buggy source code snippet. an autoregressive deep learning model uses the context of the buggy source code snippet and the hint to predict the most likely source code segment to repair the buggy source code snippet.
Inventor(s): Daini XIE of Redmond WA (US) for microsoft technology licensing, llc, Wen-Ho CHEN of Taipei (TW) for microsoft technology licensing, llc, Yuwen CHOU of Taipei (TW) for microsoft technology licensing, llc
IPC Code(s): G06F8/65, G06F9/445
Abstract: the present disclosure relates to utilizing a firmware configuration system to efficiently update a firmware profile configuration of computing devices (e.g., host devices in a datacenter). for example, the firmware configuration system facilitates updating the firmware profile configuration, such as for a unified extensible firmware interface (uefi) profile and/or a basic input/output system (bios), without needing to develop, deploy, and install a new bios. more specifically, the firmware configuration system updates (e.g., via a baseband management controller) firmware profile configurations by modifying a profile configuration table in flash memory (i.e., on an spi flash-based chip) of a bios with a firmware profile configuration update patch and without affecting other parts of the bios.
Inventor(s): Mirza Shadab BEG of Redmond WA (US) for microsoft technology licensing, llc, Faisal NASIR of Redmond WA (US) for microsoft technology licensing, llc, Damon GRAY of Kirkland WA (US) for microsoft technology licensing, llc, Eman Helmy Morsy SHAHEEN of Redmond WA (US) for microsoft technology licensing, llc, Robert BENESON of Woodinville WA (US) for microsoft technology licensing, llc, Nevedita MALLICK of Sammamish WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F8/71, G06F8/60
Abstract: techniques are described herein that are capable of providing a development-time configuration change recommendation using deployment templates. during development of a software program, a proposed configuration of the software program is identified. a reference configuration defined by a reference template is determined based on a similarity between the proposed configuration and the reference configuration. a determination is made that the proposed configuration has an attribute having a first value corresponding to a first cost. a determination is made that the reference configuration has the attribute having a second value corresponding to a second cost. during the development of the software program, an action is performed, including causing a recommendation to be provided via a user interface, based at least on the second cost being less than the first cost. the recommendation recommends changing the attribute of the proposed configuration to have the second value in lieu of the first value.
Inventor(s): Gangadhara Swamy SHIVAGANGA NAGARAJU of Kirkland WA (US) for microsoft technology licensing, llc, Pushkar Vijay CHITNIS of Bothell WA (US) for microsoft technology licensing, llc, Weidong CUI of Redmond WA (US) for microsoft technology licensing, llc, Ziqiao ZHOU of Bellevue WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F9/455
Abstract: a computer implemented method includes loading a first kernel layer having a first privilege level onto a hosting environment. a second kernel layer having a second privilege level different from the first privilege level is also loaded onto the hosting environment. the first kernel layer is isolated from the second kernel layer and access to a hosting environment memory protection table is controlled via the first kernel layer.
Inventor(s): Yi LUO of Issaquah WA (US) for microsoft technology licensing, llc, Jinwen XI of Sunnyvale CA (US) for microsoft technology licensing, llc, Xuan ZUO of Redmond WA (US) for microsoft technology licensing, llc, Haishan ZHU of Bellevue WA (US) for microsoft technology licensing, llc, Eric Sen CHUNG of Woodinville WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F9/48, G06F9/38
Abstract: a hardware retire circuit includes: one or more input queues, each queue corresponding to an input stream of tasks and being configured to store input task identifiers corresponding to tasks of the input stream; and processing logic configured to: receive a completed task event; determine whether a completed task queue identifier and a completed task identifier of the completed task event match an input task identifier of an input task at a head of an input queue having an input queue identifier corresponding to the completed task queue identifier; and in response to determining a match, pop the task at the head of the input queue and output a task retirement event corresponding to the input task.
Inventor(s): Prateek TANDON of Issaquah WA (US) for microsoft technology licensing, llc, Brian Jacob CORELL of Sammamish WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F9/50, G06F9/38, G06F9/48, G06F13/362
Abstract: a function processing service may receive a request to execute source code. the source code may include instructions to perform a function. the function processing service may determine whether at least one hardware acceleration condition has been satisfied for the function. if at least one hardware acceleration condition has been satisfied, the instructions in the source code may be translated into hardware-specific code corresponding to a hardware circuit. the hardware circuit may be configured based on the hardware-specific code, and the hardware circuit may perform the function. the function processing service may then provide the result obtained from the hardware circuit to the requesting entity.
Inventor(s): Liyan Fang of Sunnyvale CA (US) for microsoft technology licensing, llc, Andrew O. Hatch of Berkeley CA (US) for microsoft technology licensing, llc, Keqing Liang of Cupertino CA (US) for microsoft technology licensing, llc, Yafei Wei of Sunnyvale CA (US) for microsoft technology licensing, llc, Ankan Saha of San Francisco CA (US) for microsoft technology licensing, llc
IPC Code(s): G06F16/2457, G06N20/00
Abstract: embodiments of the disclosed technologies include generating a reward score for an entity. a rate distribution is determined using the reward score and a number of times the entity has been selected for ranking. a sampled rate value is generated by sampling the rate distribution. a probability score is generated for a pair of the entity and a user based on the sampled rate value. a probability distribution is determined using the probability score. a sampled probability value is generated by sampling the probability distribution. a machine learning model is trained using the sampled probability value.
Inventor(s): Sarvesh SINGH of Issaquah WA (US) for microsoft technology licensing, llc, Alan Dale HALVERSON of Verona WI (US) for microsoft technology licensing, llc, Sandeep LINGAM of Redmond WA (US) for microsoft technology licensing, llc, Srikumar RANGARAJAN of Sammamish WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F16/27, G06F9/46, G06F16/901
Abstract: methods for data visibility in nested transactions in distributed systems are performed by systems and devices. distributed executions of queries are performed in processing systems according to isolation level protocols with unique nested transaction identifiers for data management and versioning across one or more data sets, one or more compute pools, etc., within a logical server via a single transaction manager that oversees the isolation semantics and data versioning. a distributed query processor of the systems and devices performs nested transaction versioning for distributed tasks by generating nested transaction identifiers, encoded in data rows, which are used to enforce correct data visibility. data visibility is restricted to previously committed data from distributed transactions and tasks, and is blocked for distributed transactions and tasks that run concurrently. local commits for completed transactions and tasks are used to minimize transaction manager interactions, and instant rollbacks are enabled for aborted transactions and tasks.
Inventor(s): Varun KHANNA of Hyderabad (IN) for microsoft technology licensing, llc
IPC Code(s): G06F21/32, G06F21/62, G06V40/16
Abstract: techniques for securing displayed data on computing devices are disclosed. one example technique includes upon determining that the computing device is unlocked, capturing and analyzing an image in a field of view of the camera of the computing device to determine whether the image includes a human face. in response to determining that the image includes a human face, the technique includes determining facial attributes of the human face in the image via facial recognition and whether the human face is that of an authorized user of the computing device. in response to determining that the human face is not one of an authorized user of the computing device, the technique includes converting user data on the computing device from an original language to a new language to output on a display of the computing device, thereby securing the displayed user data even when the computing device is unlocked.
Inventor(s): Laurent BOUE of Peteh Tikva (IL) for microsoft technology licensing, llc, Kiran RAMA of Bangalore (IN) for microsoft technology licensing, llc
IPC Code(s): G06F21/55
Abstract: a sample of data, including a risk factor, is selected by a machine learning (ml) model of an extreme value theory (evt) mechanism. a threshold is determined by the ml model based on the risk factor, an outlier score is generated for the sample, and the outlier score is compared to the threshold. the sample is identified as anomalous based on the generated outlier score being greater than the threshold. a schema comprising results of an investigation into the sample and the risk factor is updated based on the received schema.
Inventor(s): Darren DOYLE of Wicklow (IE) for microsoft technology licensing, llc, Terry FARRELL of Dublin (IE) for microsoft technology licensing, llc
IPC Code(s): G06F21/60
Abstract: a data processing system implements receiving an access request from the client device of a content requestor to access a content item for which access to the content item is managed by a content access management platform and obtaining access control information. the access control information comprising information associated with a content owner associated with the content item, information associated with the content requestor, and information associated with the content item. the system further implements analyzing the access control information using a first machine learning model trained to analyze the access control information and to output an access determination score, the access determination score representing a level of certainty that the content requestor should be granted access to the content item, determining an automatic access decision to grant or deny the access request based on the access determination score, and notifying the content requestor whether the access request has granted or denied based on the automatic access decision.
Inventor(s): David Benjamin LEVITAN of Bothell WA (US) for microsoft technology licensing, llc, Robert Alexander SIM of Bellevue WA (US) for microsoft technology licensing, llc, Julia S. MCANALLEN of Seattle WA (US) for microsoft technology licensing, llc, Huseyin Atahan INAN of Redmond WA (US) for microsoft technology licensing, llc, Girish KUMAR of Redmond WA (US) for microsoft technology licensing, llc, Xiang YUE of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F21/62, G06N20/00
Abstract: systems and methods are directed to building annotated models based on eyes-off data. specifically, a synthetic data generation model is trained and used to further train a target model. the synthetic data generation model is trained within an eyes-off environment using an anonymity technique on confidential data. the synthetic data generation model is then used to create synthetic data that closely represents the confidential data but without any specific details that can be linked back to the confidential data. the synthetic data is then annotated and used to train the target model within an eyes-on environment. subsequently, the target model is deployed back within the eyes-off environment to classify the confidential data.
20240135030.PRIVACY AWARE SOURCE CODE_simplified_abstract_(microsoft technology licensing, llc)
Inventor(s): Bjorn Gunnar REMSETH of Redmond WA (US) for microsoft technology licensing, llc, Haiyue CHEN of Seattle WA (US) for microsoft technology licensing, llc, Nico REIßMANN of Redmond WA (US) for microsoft technology licensing, llc, Arve Aleksander Nymo SKOGVOLD of Sammamish WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F21/62
Abstract: systems and methods for protecting privacy-relevant data from unauthorized disclosure in source code of an application. for instance, the present disclosure provides a plurality of technical features including: a privacy-relevant data analyzer that analyzes source code, detects privacy-relevant data in the source code, and generates a report of instances of detected privacy-relevant data. in some examples, the privacy-relevant data analyzer scans through source code to detect annotations that denote if fields, records, or combinations thereof include privacy-relevant data. the privacy-relevant data analyzer further generates and provides a report of detected privacy issues associated with sensitive data included in source code so that the issues can be resolved to ensure that privacy is not breached.
Inventor(s): Xiaojian WU of Fremont CA (US) for microsoft technology licensing, llc, Doran CHAKRABORTY of San Jose CA (US) for microsoft technology licensing, llc, Hyun-Ju SEO of Los Gatos CA (US) for microsoft technology licensing, llc, Sina LIN of Stanford CA (US) for microsoft technology licensing, llc, Gangadharan VENKATASUBRAMANIAN of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F40/205, G06F16/33, G06F16/9532, G06F40/30, G06N3/049
Abstract: various technologies relating to constructing an answer to a query are described herein, wherein the answer is in list form. the answer includes a header and a list element. a deep model receives content of a webpage that is deemed relevant to the query by a search engine and constructs the answer to the webpage upon receipt of the query.
Inventor(s): Patrice Y. SIMARD of Bellevue WA (US) for microsoft technology licensing, llc, David G. GRANGIER of Kirkland WA (US) for microsoft technology licensing, llc, Leon BOTTOU of Kirkland WA (US) for microsoft technology licensing, llc, Saleema A. AMERSHI of Seattle WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F40/242, G06F3/0482, G06F16/951, G06F40/30, G06N7/01, G06N20/00, H04L1/00
Abstract: a collection of data that is extremely large can be difficult to search and/or analyze. relevance may be dramatically improved by automatically classifying queries and web pages in useful categories, and using these classification scores as relevance features. a thorough approach may require building a large number of classifiers, corresponding to the various types of information, activities, and products. creation of classifiers and schematizers is provided on large data sets. exercising the classifiers and schematizers on hundreds of millions of items may expose value that is inherent to the data by adding usable meta-data. some aspects include active labeling exploration, automatic regularization and cold start, scaling with the number of items and the number of classifiers, active featuring, and segmentation and schematization.
Inventor(s): Amund TVEIT of Trondheim (NO) for microsoft technology licensing, llc, Kateryna SOLONKO of Oslo (NO) for microsoft technology licensing, llc, Zoran HRANJ of Oslo (NO) for microsoft technology licensing, llc, Aleksander Werpachowski of Oslo (NO) for microsoft technology licensing, llc, Roman WERPACHOWSKI of Ameberg (NO) for microsoft technology licensing, llc, Mohammadreza BONYADI of Trondheim (NO) for microsoft technology licensing, llc, Arun Shankar IYER of Bangalore (IN) for microsoft technology licensing, llc
IPC Code(s): G06F40/30, G06N3/04, G06N3/08
Abstract: the disclosure herein describes a system for measuring probability of influence in digital communications to determine if communication content originated in a person's own prior knowledge or new information more recently obtained from interaction with communications of others. an estimated probability a new communication by a first user comes from the same distribution as prior communications of the first user are generated using multidimensional statistics on embeddings representing the communications. a second estimated probability that the new communication comes from the same distribution as communication(s) of a second user that were accessible to the first user are generated. if the second probability is greater than the first probability, the new communication is more likely influenced by exposure of the first user to the second user's communications rather than the first user's own historical knowledge. an influence attribution recommendation is generated, including an influence attribution or other recommended action.
20240135113.MODEL CAPABILITY EXTRACTION_simplified_abstract_(microsoft technology licensing, llc)
Inventor(s): Benjamin Goth ZORN of Woodinville WA (US) for microsoft technology licensing, llc, Carina Suzana NEGREANU of Cambridge (GB) for microsoft technology licensing, llc, Neil Blunt TORONTO of Cambridge (GB) for microsoft technology licensing, llc, Brian Paul SLININGER of Seattle WA (US) for microsoft technology licensing, llc, Andrew Donald GORDON of Cambridge (GB) for microsoft technology licensing, llc, Advait SARKAR of Cambridge (GB) for microsoft technology licensing, llc, Elnaz NOURI of Seattle WA (US) for microsoft technology licensing, llc, Vu Minh LE of Redmond WA (US) for microsoft technology licensing, llc, Christian Leopold Bejamin POELITZ of London (GB) for microsoft technology licensing, llc, Shraddha Govind BARKE of La Jolla CA (US) for microsoft technology licensing, llc, Sruti Srinivasa RAGAVAN of Oxford (GB) for microsoft technology licensing, llc
IPC Code(s): G06F40/51, G06F40/35
Abstract: the indirect querying of models to determine capabilities possessed by the model. such indirect queries take the form of model input that potentially includes a natural language input user data. such model input is structured such that the output of the model is either not natural language at all, or else is natural language that is not semantically responsive to the natural language input. nevertheless, the output is evaluated to estimate or determine the capability possessed by the model. thus, models may be more fully utilized to their better potential.
Inventor(s): Yafei Wei of Sunnyvale CA (US) for microsoft technology licensing, llc, Andrew O. Hatch of Berkeley CA (US) for microsoft technology licensing, llc, Keqing Liang of Cupertino CA (US) for microsoft technology licensing, llc, Liyan Fang of Sunnyvale CA (US) for microsoft technology licensing, llc, Ankan Saha of San Francisco CA (US) for microsoft technology licensing, llc
IPC Code(s): G06N20/00, G06K9/62
Abstract: embodiments of the disclosed technologies include generating a reward score for an entity. a rate distribution is determined using the reward score. a sampled rate value is generated by sampling the rate distribution. a probability score is generated for a pair of the entity and a user using the sampled rate value. a probability distribution is determined using the probability score. a sampled probability value is generated by sampling the probability distribution. a machine learning model is trained using the sampled probability value.
Inventor(s): Udayan KUMAR of Kirkland WA (US) for microsoft technology licensing, llc, Rakesh Jayadev NAMINENI of Sammamish WA (US) for microsoft technology licensing, llc
IPC Code(s): G06Q10/10, G06Q10/20
Abstract: systems and methods for providing ticket support using a machine learning model trained using clusters of support tickets that are clustered based on similarity of resolution commands are provided. the system extracts commands used to resolve prior tickets and creates clusters of resolved tickets based on similarity of the commands. for each cluster, problem statements are extracted from the resolved tickets. the system trains a machine learning model with the extracted problem statements to identify a cluster number for each cluster. with a new support ticket, the system extracts a problem statement from the new ticket and identifies a predicted cluster number by applying the trained machine learning mode! to the problem statement from the new ticket. based on the predicted cluster number, one or more commands used to resolve the prior tickets in the cluster corresponding to the predicted cluster number are accessed and provided to a requesting user.
Inventor(s): Jian JIAO of Redmond WA (US) for microsoft technology licensing, llc, Eren MANAVOGLU of Menlo Park CA (US) for microsoft technology licensing, llc
IPC Code(s): G06Q30/02, G06F16/951
Abstract: a query-processing technique includes an operation of matching the input query against a plurality of candidate target items, to produce a set of candidate query-item pairings. the matching is applicable to different classes of matching, but is performed by a computer processing architecture that uses a class-agnostic instance of query-processing logic and a class-agnostic target item index. after the matching operation, the technique assigns a matching class to each candidate query-item pairing in the set of candidate query-item pairings, to produce a set of classified pairings. the technique ultimately serves a particular output item to an end user, where the particular output item is chosen based on the results of the matching and assigning. some implementations of the technique include a filtering operation whereby the candidate-item pairings are filtered to conform to a specified selection strategy or strategies. this filtering operation supplements or replaces the assigning operation.
Inventor(s): Zheng Zhang of San Carlos CA (US) for microsoft technology licensing, llc, Han Hu of Beijing (CN) for microsoft technology licensing, llc, Yue Cao of Redmond WA (US) for microsoft technology licensing, llc, Xin TONG of Beijing (CN) for microsoft technology licensing, llc, Ze Liu of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): G06T7/73, G06T7/62, G06T7/90, G06T17/00, G06V10/44, G06V20/64
Abstract: according to implementations of the subject matter described herein, a solution is proposed for three-dimensional (3d) object detection. in this solution, feature representations of a plurality of points are extracted from point cloud data related to a 3d object. initial feature representations of a set of candidate 3d objects are determined based on the feature representations of the plurality of points. based on the feature representations of the plurality of points and the initial feature representations of the set of candidate 3d objects, a detection result for the 3d object is generated by determining self-correlations between the set of candidate 3d objects and cross-correlations between the plurality of points and the set of candidate 3d objects. in this way, without grouping points into candidate 3d objects, the 3d object in a 3d scene can be localized and recognized based on the self-correlations and cross-correlations.
Inventor(s): Martin Jon Irwin FULLER of Gaydon (GB) for microsoft technology licensing, llc
IPC Code(s): G06T15/06
Abstract: a ray trace operation includes tracing a ray from an origin point in accordance with a ray path into a virtual environment (where the virtual environment comprises one or more virtual objects defined by one or more object components) and determining an intersected object component of the one or more object components that the ray intersects with. determining the intersected object component comprises accessing (i) ray trace temporal coherence data based upon a preceding ray trace operation that temporally precedes the ray trace operation or (ii) ray trace spatial coherence data based upon a spatially proximate ray trace operation.
Inventor(s): Rui ZHAO of Bellevue WA (US) for microsoft technology licensing, llc, Jian XUE of Bellevue WA (US) for microsoft technology licensing, llc, Sarangarajan PARTHASARATHY of Mountain View CA (US) for microsoft technology licensing, llc, Jinyu LI of Bellevue WA (US) for microsoft technology licensing, llc
IPC Code(s): G10L15/16, G10L15/06, G10L15/197, G10L15/22
Abstract: systems and methods are provided for accessing a factorized neural transducer comprising a first set of layers for predicting blank tokens and a second set of layers for predicting vocabulary tokens, the second set of layers comprising a language model that includes a vocabulary predictor which is a separate predictor from the blank predictor, wherein a vocabulary predictor output from the vocabulary predictor and the encoder output are used for predicting a vocabulary token. the second set of layers is selectively modified to facilitate an improvement in an accuracy of the factorized neural transducer in performing automatic speech recognition, the selectively modifying comprising applying a particular modification to the second set of layers while refraining from applying the particular modification to the first set of layers.
Inventor(s): Sefik Emre ESKIMEZ of Bellevue WA (US) for microsoft technology licensing, llc, Takuya YOSHIOKA of Bellevue WA (US) for microsoft technology licensing, llc, Huaming WANG of Clyde Hill WA (US) for microsoft technology licensing, llc, Alex Chenzhi JU of Seattle WA (US) for microsoft technology licensing, llc, Min TANG of Redmond WA (US) for microsoft technology licensing, llc, Tanel PÄRNAMAA of Tallinn (EE) for microsoft technology licensing, llc
IPC Code(s): G10L21/0232, G06N3/0442, G10L17/02, G10L17/04, G10L17/06, G10L17/18
Abstract: a data processing system implements receiving a far-end signal associated with a first computing device participating in an online communication session and receiving a near-end signal associated with a second computing device participating in the online communication session. the near-end signal includes speech of a target speaker, a first interfering speaker, and an echo signal. the system further implements providing the far-end signal, the near-end signal, and an indication of the target speaker as an input to a machine learning model. the machine learning model trained to analyze the far-end signal and the near-end signal to perform personalized noise suppression (pns) to remove speech from one or more interfering speakers and acoustic echo cancellation (aec) to remove echoes. the model is trained to output an audio signal comprising speech of the target speaker. the system obtains the audio signal comprising the speech of the target speaker from the model.
Inventor(s): Jaejin LEE of Redmond WA (US) for microsoft technology licensing, llc, Donghwi KIM of Kirkland WA (US) for microsoft technology licensing, llc
IPC Code(s): H02J50/00, G06F1/16, H01F7/02, H01F7/06, H02J7/00, H02J50/10, H02J50/20, H02J50/90
Abstract: a computing device configured to removably attach a component comprises a housing comprising first and second device electromagnets. a wireless charging transmitting antenna is between the electromagnets. instructions are executable by a processor to synchronize a first device current through the first device electromagnet with a first component current through a first component electromagnet of the component to attract the electromagnets, and to synchronize a second device current through the second device electromagnet with a second component current through a second component electromagnet of the component to attract the electromagnets.
Inventor(s): Bharat S. PILLILLI of Sacramento CA (US) for microsoft technology licensing, llc, Bryan David KELLY of Carnation WA (US) for microsoft technology licensing, llc, Vishal SONI of Bellevue WA (US) for microsoft technology licensing, llc
IPC Code(s): H04L9/00, G01R31/3181, H04L9/08
Abstract: the techniques disclosed herein are directed to devices, circuits, systems, and techniques to mitigate the impact of side-channel attacks on a cryptography function in a target system. the razor flip-flops are inserted into critical paths of the cryptography function of the target system, including at rest blocks such as key vaults and data vaults, and also including registers and/or pipelines used for calculations within the cryptography functions. errors detected by the razor flip-flops are processed by error detection logic in the cryptographic function, which continues the calculations until completion. the generated key and data value pairs resulting from detected errors are discarded, silently ignored without disrupting the calculation process. the schemes disclosed herein mitigate the impact of side-channel attacks with a digital logic based implementation, with reduced complexity and reduced cost.
Inventor(s): Kapil VASWANI of Cambridge (GB) for microsoft technology licensing, llc, Siddharth JAYASHANKAR of Pittsburgh PA (US) for microsoft technology licensing, llc, Antoine DELIGNAT-LAVAUD of Cambridge (GB) for microsoft technology licensing, llc, Cedric Alain Marie Christophe FOURNET of Cambridge (GB) for microsoft technology licensing, llc
IPC Code(s): H04L9/08, H04L9/32
Abstract: a computer device instantiates a first transport layer security (tls) endpoint having access to a trusted execution environment (tee) of the processor; generates in the tee in an endpoint-specific public-private key pair bound to the first tls endpoint; generates of attestation data verifying that the endpoint-specific public-private key pair was generated in the tee and is bound to the first tls endpoint; and signs the attestation data in the tee using a tee private key securely embedded in the processor. the device generates a tee signature using an endpoint-specific private key of an endpoint-specific public-private key pair; and indicates of the attestation data, an endpoint-specific public key of the endpoint-specific public public-private key pair and the tee signature to a second tls endpoint within a tls handshake message exchange between the first tls endpoint and the second tls endpoint.
Inventor(s): Emre KARABULUT of Raleigh NC (US) for microsoft technology licensing, llc, Bharat S. PILLILLI of El Dorado Hills CA (US) for microsoft technology licensing, llc, Mojtaba BISHEH NIASAR of Ithaca NY (US) for microsoft technology licensing, llc
IPC Code(s): H04L9/08, H04L9/30
Abstract: generally discussed herein are devices, systems, and methods for secure cryptographic masking. a method can include generating a first random number, determining a result of the first random number modulo a prime number resulting in a second random number, subtracting the second random number from the prime number resulting in a first subtraction result, adding a private key value to the first subtraction result resulting in a first split, and responsive to determining the private key value is less than the random number, providing the first split and the second random number as splits of the private key.
Inventor(s): David KRUSE of Kirkland WA (US) for microsoft technology licensing, llc, Qibo ZHU of Sammamish WA (US) for microsoft technology licensing, llc, David DION of Bothell WA (US) for microsoft technology licensing, llc, Vladimir PETTER of Bellevue WA (US) for microsoft technology licensing, llc, Lokesh Srinivas KOPPOLU of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): H04L43/00, G06F3/06, G06F9/50, G06F9/52, G06F11/20, G06F16/176, G06F16/182, H04L67/1001, H04L67/61, H04L69/40
Abstract: a generation identifier is employed with various systems and methods in order to identify situations where a workload has been reassigned to a new node and where a workload is still being processed by an old node during a failure between nodes. a master node may assign a workload to a worker node. the worker node sends a request to access target data. the request may be associated with a generation identifier and workload identifier that identifies the node and workload. at some point, a failure occurs between the master node and worker node. the master node reassigns the workload to another worker node. the new worker node accesses the target data with a different generation identifier, indicating to the storage system that the workload has been reassigned. the old worker node receives an indication from the storage system that the workload has been reassigned and stops processing the workload.
Inventor(s): Darshil Jashvant KHETANI of Stanmore (GB) for microsoft technology licensing, llc, Hassan Ali Hussein BARAKAT of Enfield (GB) for microsoft technology licensing, llc, Salem Amin AL-DAMLUJI of Chorleywood (GB) for microsoft technology licensing, llc
IPC Code(s): H04L45/74, H04L12/46, H04L69/22
Abstract: techniques are disclosed for capturing network traffic in a computing environment comprising a plurality of computing devices. data packets to be captured are encapsulated within a virtual extensible local area network (vxlan) session. a reserved bit in a header of the encapsulated packet is set to indicate the encapsulated packet includes metadata pertaining to the data traffic to be captured.
Inventor(s): Paul David MATTES of Saint Paul MN (US) for microsoft technology licensing, llc, Umesh KRISHNASWAMY of San Jose CA (US) for microsoft technology licensing, llc, John Michael ABELN of Bellingham WA (US) for microsoft technology licensing, llc, Sonal KOTHARI of San Jose CA (US) for microsoft technology licensing, llc, Paul-Andre C. BISSONNETTE of Seattle WA (US) for microsoft technology licensing, llc, Pappula Prabhakar REDDY of Johns Creek GA (US) for microsoft technology licensing, llc, Himanshu RAJ of Cupertino CA (US) for microsoft technology licensing, llc
IPC Code(s): H04L47/125, H04L45/00, H04L45/50
Abstract: a method and a network for routing data packet in a unified wide area network (wan) is provided. the method includes encapsulating a data packet by an ingress aggregation router and forwarding the encapsulated data packet to an ingress backbone router. the encapsulated data packet includes a first label. the ingress backbone router selects an optimized traffic engineered tunnel and replaces the first label with the optimized traffic engineered tunnel and forwards the encapsulated data packet along the optimized traffic engineered tunnel.
Inventor(s): Rahul BOSE of Acton MA (US) for microsoft technology licensing, llc, Mark Gordon LIBBY of Groton MA (US) for microsoft technology licensing, llc, Anand MUTHURAJAN of Groton MA (US) for microsoft technology licensing, llc, Ronald Mark PARKER of Manchester MA (US) for microsoft technology licensing, llc, Michael Anthony BROWN of McKinney TX (US) for microsoft technology licensing, llc, Leland Douglas BENSON of Broomfield CO (US) for microsoft technology licensing, llc
IPC Code(s): H04L47/70, H04L47/78
Abstract: computing resources are managed in a computing network comprising a computing service provider and an edge computing network. the edge computing network receives an indication of a disconnection of communications between the computing service provider and the edge computing network. in response to the indication, the edge computing network initiates an autonomous mode at the edge computing network. the edge computing network is configured to continue providing computing and network services at the edge computing network while the edge computing network is operating in the autonomous mode.
Inventor(s): James Matthew Hamilton OAKLEY of Holliston MA (US) for microsoft technology licensing, llc, Neil Adam JACOBSON of Acton MA (US) for microsoft technology licensing, llc
IPC Code(s): H04L9/40, H04L41/22
Abstract: techniques for auto-starting a vpn in a mam environment are disclosed. a mam-controlled application is launched on a computer system. policy is queried and a determination is made as to whether to auto-start a vpn application based on the policy. based on the policy, the vpn application is auto-started, and the vpn application initiates a vpn tunnel that is usable by at least the mam-controlled application. network communications transmitted to or from the mam-controlled application then pass through the vpn tunnel.
Inventor(s): Evgeny BOGOKOVSKY of Herzliya (IL) for microsoft technology licensing, llc, Ram Haim PLISKIN of Rishon lezion (IL) for microsoft technology licensing, llc, Andrey KARPOVSKY of Haifa` (IL) for microsoft technology licensing, llc
IPC Code(s): H04L9/40
Abstract: the techniques disclosed herein prevent a rogue resource from being created within a cloud computing environment. for example, a rogue serverless function may be prevented from integrating with a cloud-based database, thereby preventing the serverless function from performing malicious operations such as low-rate data exfiltration. the rogue serverless function is detected before it is installed, heading off the attack completely. in some configurations, a key retrieval request is received. parameters of the key retrieval request are analyzed for anomalies, and anomalous key retrieval requests are stored in a pool. then, when a request to create a resource is received, the pool of anomalous key retrieval requests is searched for a match. when a match is found, the resource creation request may be suspended pending a further security review.
Inventor(s): Tao Cai of Sunnyvale CA (US) for microsoft technology licensing, llc, Albert Hwang of McKinney TX (US) for microsoft technology licensing, llc, Jianlong Zhang of Sunnyvale CA (US) for microsoft technology licensing, llc, Muhammad Hassan Khan of Dublin CA (US) for microsoft technology licensing, llc
IPC Code(s): H04L67/63, H04L67/306, H04L67/50
Abstract: embodiments of the disclosed technologies receive a request including a user identifier and metadata associated with a slot available at a user system, remove the user identifier from the request to produce anonymized request data, receive, from a machine learning model, superposition data that correlates with the anonymized request data, send the superposition data for the anonymized request data to a real-time content-to-request matching process, receive, from the real-time content-to-request matching process, an identifier that identifies a content distribution selected based on the superposition data, and initiate the selected content distribution through the network to the slot in response to the request.
Inventor(s): Devesh VERMA of Delhi (IN) for microsoft technology licensing, llc, Krishnakumar VIJAYAN of Bangalore (IN) for microsoft technology licensing, llc, Kumar ARAKERE BASAVARAJ of Bangalore (IN) for microsoft technology licensing, llc, Girish R. NAIR of Nashua NH (US) for microsoft technology licensing, llc, Arthur J. BARABELL of Sudbury MA (US) for microsoft technology licensing, llc, Venki Reddy PULICHERLA of Bangalore (IN) for microsoft technology licensing, llc, Abhishek Kumar SINHA of Bangalore (IN) for microsoft technology licensing, llc, Basant KUMAR of Bangalore (IN) for microsoft technology licensing, llc, Pikan GHOSH of West Bengal (IN) for microsoft technology licensing, llc
IPC Code(s): H04M15/00, H04W4/24
Abstract: the present disclosure generally relates to systems, methods, and computer-readable media for managing the generation and processing of charging data records (cdrs) in a telecommunication environment (e.g., a fourth generation (4g) a fifth generation (5g), or future generation mobile network). the systems described herein involve predicting lengths of cdrs prior to encoding and providing the cdrs to a charging gateway function to ensure that the cdrs do not exceed a maximum allowable length that the charging gateway function is capable of processing while also reducing the total number of cdr packages that are encoded and transmitted. indeed, the systems described herein can predict the length of the cdrs incrementally as charging containers are added, thus limiting the number of cdrs that are generated and processed.
Inventor(s): Bozidar RADUNOVIC of Cambridge (GB) for microsoft technology licensing, llc, Sanjeev Mehrotra of Kirkland WA (US) for microsoft technology licensing, llc, Yongguang Zhang of Redmond WA (US) for microsoft technology licensing, llc, Paramvir Bahl of Bellevue WA (US) for microsoft technology licensing, llc, Xenofon Foukas of Cambridge (GB) for microsoft technology licensing, llc
IPC Code(s): H04W28/16, G06F11/32, G06F11/34, G06N20/00, H04W24/10, H04W28/02, H04W72/21, H04W72/23
Abstract: described are examples for monitoring performance metrics of one or more workloads in a cloud-computing environment and reallocating compute resources based on the monitoring. reallocating compute resources can include migrating workloads among nodes or other resources in the cloud-computing environment, reallocating hardware accelerator resources, adjusting transmit power for virtual radio access network (vran) workloads, and/or the like.
Inventor(s): Eric C. PETERSON of Woodinville WA (US) for microsoft technology licensing, llc, Husam Atallah ALISSA of Redmond WA (US) for microsoft technology licensing, llc, Bharath RAMAKRISHNAN of Bellevue WA (US) for microsoft technology licensing, llc
IPC Code(s): H05K7/20
Abstract: a thermal management system for cooling electronics includes an immersion tank, a working fluid in the immersion tank, a heat exchanger, a first fluid conduit, and a second fluid conduit. the heat exchanger is configured to transfer thermal energy from the working fluid to ambient air to cool the working fluid. the first fluid conduit provides fluid communication from the immersion tank to the heat exchanger, and the second fluid conduit provides fluid communication from the heat exchanger to a spray nozzle to spray working fluid into the immersion tank.
Microsoft Technology Licensing, LLC patent applications on April 25th, 2024
- Microsoft Technology Licensing, LLC
- G02B27/01
- H01S3/034
- H01S3/04
- Microsoft technology licensing, llc
- G06F1/3234
- G06F7/544
- G06F13/10
- G06N3/02
- G06F3/0482
- G06F3/14
- G06F3/06
- G06F8/36
- G06F8/65
- G06F11/36
- Microsoft technology licensing, llc.
- G06F9/445
- G06F8/71
- G06F8/60
- G06F9/455
- G06F9/48
- G06F9/38
- G06F9/50
- G06F13/362
- G06F16/2457
- G06N20/00
- G06F16/27
- G06F9/46
- G06F16/901
- G06F21/32
- G06F21/62
- G06V40/16
- G06F21/55
- G06F21/60
- G06F40/205
- G06F16/33
- G06F16/9532
- G06F40/30
- G06N3/049
- G06F40/242
- G06F16/951
- G06N7/01
- H04L1/00
- G06N3/04
- G06N3/08
- G06F40/51
- G06F40/35
- G06K9/62
- G06Q10/10
- G06Q10/20
- G06Q30/02
- G06T7/73
- G06T7/62
- G06T7/90
- G06T17/00
- G06V10/44
- G06V20/64
- G06T15/06
- G10L15/16
- G10L15/06
- G10L15/197
- G10L15/22
- G10L21/0232
- G06N3/0442
- G10L17/02
- G10L17/04
- G10L17/06
- G10L17/18
- H02J50/00
- G06F1/16
- H01F7/02
- H01F7/06
- H02J7/00
- H02J50/10
- H02J50/20
- H02J50/90
- H04L9/00
- G01R31/3181
- H04L9/08
- H04L9/32
- H04L9/30
- H04L43/00
- G06F9/52
- G06F11/20
- G06F16/176
- G06F16/182
- H04L67/1001
- H04L67/61
- H04L69/40
- H04L45/74
- H04L12/46
- H04L69/22
- H04L47/125
- H04L45/00
- H04L45/50
- H04L47/70
- H04L47/78
- H04L9/40
- H04L41/22
- H04L67/63
- H04L67/306
- H04L67/50
- H04M15/00
- H04W4/24
- H04W28/16
- G06F11/32
- G06F11/34
- H04W24/10
- H04W28/02
- H04W72/21
- H04W72/23
- H05K7/20