Microsoft Technology Licensing, LLC patent applications on June 27th, 2024
Patent Applications by Microsoft Technology Licensing, LLC on June 27th, 2024
Microsoft Technology Licensing, LLC: 44 patent applications
Microsoft Technology Licensing, LLC has applied for patents in the areas of H04L9/40 (3), G06N20/00 (3), G06F9/54 (3), G06F3/01 (2), G06F16/9538 (2) G06F40/166 (2), G06F3/044 (1), G06N20/00 (1), G06V40/50 (1), G09G3/003 (1)
With keywords such as: data, based, device, content, computing, network, image, firmware, application, and memory in patent application abstracts.
Patent Applications by Microsoft Technology Licensing, LLC
Inventor(s): Idan PALMOR of Ramat Gan (IL) for microsoft technology licensing, llc, Lior ZAGIEL of Tel Aviv (IL) for microsoft technology licensing, llc, Yael LIVNE of Tel Aviv (IL) for microsoft technology licensing, llc, Nadav LINENBERG of Even Yehuda (IL) for microsoft technology licensing, llc
IPC Code(s): G06F3/044, G06F3/041
CPC Code(s): G06F3/044
Abstract: a capacitive touch-sensor system comprises an electrode array coupled to an electromagnetic-noise source, a hardware interface, and associated output logic. the electrode array acquires sensory signal. the hardware interface exposes a touch-position output of the capacitive touch sensor. the output logic determines that an anomalous sensory electrode of the electrode array is proximate to a touchpoint, the anomalous sensory electrode providing an anomalous response to noise from the electromagnetic-noise source. pursuant to determining that the anomalous sensory electrode is proximate to the touchpoint, the output logic identifies a non-anomalous sensory electrode of the electrode array which is usable to detect the noise. if an amplitude of the sensory signal from the non-anomalous sensory electrode exceeds a predetermined threshold, then the output logic invalidates the sensory signal for touchpoint resolution. if the sensory signal is not invalidated, the output logic computes the touch-position output based in part on the sensory signal.
20240211096.DYNAMIC EYE-GAZE DWELL TIMES_simplified_abstract_(microsoft technology licensing, llc)
Inventor(s): Dmytro RUDCHENKO of Bellevue WA (US) for microsoft technology licensing, llc, Eric N. BADGER of Redmond WA (US) for microsoft technology licensing, llc, Akhilesh KAZA of Sammamish WA (US) for microsoft technology licensing, llc, Jacob Daniel COHEN of Seattle WA (US) for microsoft technology licensing, llc, Peter John ANSELL of Seattle WA (US) for microsoft technology licensing, llc, Jonathan T. CAMPBELL of Redmond WA (US) for microsoft technology licensing, llc, Harish S. KULKARNI of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F3/04817, G06F3/01, G06F3/0481, G06F3/04886, G06F40/274, G06N20/00
CPC Code(s): G06F3/04817
Abstract: systems and methods disclosed herein relate to assigning dynamic eye-gaze dwell-times. dynamic dwell-times may be tailored to the individual user. for example, a dynamic dwell-time system may be configured to receive data from the user, such as the duration of time the user takes to execute certain actions within applications (e.g., read a word suggestion before actually selecting it). the dynamic dwell-time system may also prevent users from making unintended selections by providing different dwell times for different buttons. specifically, on a user interface, longer dwell times may be established for the critical keys (e.g., “close” program key, “send” key, word suggestions, and the like) and shorter dwell times may be established for the less critical keys (e.g., individual character keys on a virtual keyboard, spacebar, backspace, and the like).
Inventor(s): Yi YUAN of Redmond WA (US) for microsoft technology licensing, llc, Narayanan RAVICHANDRAN of Bellevue WA (US) for microsoft technology licensing, llc, Robert GROZA, JR. of Redmond WA (US) for microsoft technology licensing, llc, Yevgeny YANKILEVICH of Tirat Carmel (IL) for microsoft technology licensing, llc, Hari Daas ANGEPAT of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F3/06
CPC Code(s): G06F3/0611
Abstract: the present disclosure relates to utilizing a buffer management system to efficiently manage and deallocate memory buffers utilized by multiple processing roles on computer hardware devices. for example, the buffer management system utilizes distributed decentralized memory buffer monitoring in connection with augmented buffer pointers to deallocate memory buffers accurately and efficiently. in this manner, the buffer management system provides an efficient approach for multiple processing roles to consume source data stored in a memory buffer and to deallocate the buffer only after all roles have finished using it.
Inventor(s): PalaniRaj KALIYAPERUMAL of Redmond WA (US) for microsoft technology licensing, llc, Lily Xinchen LIU of Redmond WA (US) for microsoft technology licensing, llc, Kuralmani ELANGO of Bothell WA (US) for microsoft technology licensing, llc, Kunal MUKERJEE of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F8/38, G06F40/186, G06F40/279, G06V30/414
CPC Code(s): G06F8/38
Abstract: the disclosure herein describes generating an application from input content. input content of a content type is obtained, such as an image file, digital document file, or the like. a content data extractor is selected from a set of content data extractors based on the content type. a set of content entities is extracted from the obtained input content using the selected content data extractor, such as text labels, text boxes, buttons, or the like. the set of content entities are normalized according to a standard interface schema and an application template is generated using the normalized set of content entities, whereby an application can be developed using the generated application template. the disclosure enables application interfaces to be designed using a variety of methods and for those different types of designs to be efficiently converted to a functional application.
Inventor(s): COLIN BRUCE CLEMENT of SEATTLE WA (US) for microsoft technology licensing, llc., YUFAN HUANG of SHANGHAI (CN) for microsoft technology licensing, llc., NEELAKANTAN SUNDARESAN of BELLEVUE WA (US) for microsoft technology licensing, llc., YIDING TIAN of SHANGHAI (CN) for microsoft technology licensing, llc., MAOQUAN WANG of SHANGHAI (CN) for microsoft technology licensing, llc.
IPC Code(s): G06F8/51, G06F8/41, G06N3/08
CPC Code(s): G06F8/51
Abstract: a neural transcompilation model is tested with a set of syntax unit tests to determine the syntax elements of a source code program written in a source programming language that fail to translate properly into a target programming language. the syntax elements having a translation defect is identified and ranked according a translation failure rate. the neural transcompilation model is then fine-tuned with training samples of the syntax elements having the highest translation failure rates and their paired correct translation in order to teach the model to learn the association between the syntax elements of a source programming language causing translation defects and its correct translation in a target programming language.
Inventor(s): Matthaus Alden WESEMANN of Redmond WA (US) for microsoft technology licensing, llc, Hakki Tunc BOSTANCI of Redmond WA (US) for microsoft technology licensing, llc, Aaron FARMER of Seattle WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F8/656, G06F8/65, G06F9/4401, H04L67/00
CPC Code(s): G06F8/656
Abstract: a feature is updated on a computing device. one or more composite image files are accessed that correspond to updates to be implemented in the computing device. the composite image files are signed containers. a runtime in-memory merge of the composite image files is performed. the merged composite image files are exposed as a read-only volume. the features are made available to the computing device. a system boot using the read-only volume can be initiated.
Inventor(s): Mallik BULUSU of Bellevue WA (US) for microsoft technology licensing, llc, Tom Long NGUYEN of Auburn WA (US) for microsoft technology licensing, llc, Daini XIE of Redmond WA (US) for microsoft technology licensing, llc, Karunakara KOTARY of Vancouver WA (US) for microsoft technology licensing, llc, Muhammad Ashfaq AHMED of Redmond WA (US) for microsoft technology licensing, llc, Subhankar PANDA of Redmond WA (US) for microsoft technology licensing, llc, Ravi Mysore Shantamurthy of Bothell WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F9/30, G06F8/65, G06F9/52, G06F11/07
CPC Code(s): G06F9/30047
Abstract: a computer implemented method includes creating a cache within system management memory to cache data from a firmware flash memory to allow access to the cache by system firmware, providing a baseboard management controller ownership of the firmware flash memory in a server, updating the firmware in the firmware flash memory via the baseboard management controller, relinquishing baseboard management controller ownership of firmware flash memory upon completion of updating the firmware, and flushing the cache back to the firmware flash memory in response to baseboard management controller relinquishing ownership of the firmware flash memory.
20240211288.HIERARCHICAL VIRTUALIZATION_simplified_abstract_(microsoft technology licensing, llc)
Inventor(s): Alexander Daniel GREST of Redmond WA (US) for microsoft technology licensing, llc, David Alan HEPKIN of Redmond WA (US) for microsoft technology licensing, llc, Bruce J. SHERWIN, JR. of Woodinville WA (US) for microsoft technology licensing, llc, Matthew Jordan SEBEK of Bellevue WA (US) for microsoft technology licensing, llc, Sai Ganesh RAMACHANDRAN of Sammamish WA (US) for microsoft technology licensing, llc, Xin David ZHANG of Duvall WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F9/455
CPC Code(s): G06F9/45558
Abstract: hierarchical virtualization creates a child guest partition that shares a hypervisor with a parent guest partition. a hypervisor receives a request, from a first guest partition that operates at the hypervisor, to create a second guest partition as a child of the first guest partition. the hypervisor identifies a configuration specification for the second guest partition, which includes (1) an identification of a memory portion, which is allocated to the first guest partition, that is to be mapped into the second guest partition; and (2) a configuration of a virtual processor that is to be utilized by the second guest partition. the hypervisor creates the second guest partition based on the configuration specification.
Inventor(s): Jordi MOLA of Bellevue WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F11/36
CPC Code(s): G06F11/3636
Abstract: removing payload data from an execution trace. embodiments identify a pay load data item within an execution trace, identify particular executable code that interacted with the payload data item, and determine constraint(s) that execution of the particular executable code has placed on the pay load data item. embodiments then replace a value of the payload data item in the execution trace with information maintaining the constraint(s). examples of information maintaining the constraint(s) include one or more bytes of the particular executable code. a memory address corresponding to the pay load data item, and data structured to preserve code flow-such as a replacement value for the pay load data item, a specification of a set of one or more valid values for the pay load data item, or an instruction of a code path to follow in the particular executable code.
Inventor(s): Xiaowen WANG of Redmond WA (US) for microsoft technology licensing, llc, Lei ZHANG of Kirkland WA (US) for microsoft technology licensing, llc, Paul Martin MESSING of Kirkland WA (US) for microsoft technology licensing, llc, Chittibabu PACHARU of Bellevue WA (US) for microsoft technology licensing, llc, Weijun GUO of Bellevue WA (US) for microsoft technology licensing, llc, Kevin Alan ERICKSON of Monroe WA (US) for microsoft technology licensing, llc, Shenghao LI of Redmond WA (US) for microsoft technology licensing, llc, David Gregory Grant of Duvall WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F16/174, H03M7/30
CPC Code(s): G06F16/1744
Abstract: some disclosed embodiments are directed to methods and systems for performing pair-wise delta compression. for example, systems obtain a set of files to be compressed into a single compressed file. the system identifies different attributes related to the set of files. for each file in the set of files, the system predicts an optimized set of candidate compression files and calculates a delta between each file in the optimized set and the target file corresponding to the optimized set. after identifying the smallest delta, the system compresses the selected pair of files associated with the smallest delta in order to generate the single compressed file for the set of files.
Inventor(s): DAVID BURG of SAMMAMISH WA (US) for microsoft technology licensing, llc., SHIVAM JINDAL of JAIPUR (IN) for microsoft technology licensing, llc., RAMA KRISHNA RAYUDU of SAMMAMISH WA (US) for microsoft technology licensing, llc., PRAVEEN SRIVASTAVA of BENGALURU (IN) for microsoft technology licensing, llc.
IPC Code(s): G06F16/176, G06F16/14, G06F16/182
CPC Code(s): G06F16/176
Abstract: the detection of a change to a shared file of a file hosting service communicating only through a file transfer protocol is performed on a client-side device. the client-side device obtains the metadata of each shared file of a directory at each periodic interval. the client-side device generates a hashset for the directory at each periodic interval where the hashset includes a hash value for each file's metadata. if the hash of a file at a current time t is contained in the immediately preceding hashset at t−1 but not in the hashset of t−2 then the file is determined to have changed.
Inventor(s): Charlie CORREDOR of Seattle WA (US) for microsoft technology licensing, llc, Mengdong Yang of Sammamish WA (US) for microsoft technology licensing, llc, Christoffer Benjamin Rosen of Seattle WA (US) for microsoft technology licensing, llc, Varadarajan Subramaniam Thiruvillamalai of Redmond WA (US) for microsoft technology licensing, llc, Shijie Ma of Bellevue WA (US) for microsoft technology licensing, llc, Thottam R. Sriram of Redmond WA (US) for microsoft technology licensing, llc, Sarosh Anwar of Redmond WA (US) for microsoft technology licensing, llc, Shashi Rekha Singaravel of Sammamish WA (US) for microsoft technology licensing, llc, Robin M. Thomas of Sammamish WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F16/23, G06F16/215
CPC Code(s): G06F16/2365
Abstract: systems and methods are directed to monitoring and managing a health of a content processing data ingestion pipeline. in example embodiments, a plurality of content elements are ingested from a source to a destination through the ingestion pipeline, whereby the ingestion pipeline comprises a plurality of nodes between the source and the destination. a data management system detects a gap in the ingestion pipeline. the gap indicates a difference associated with a content element of the plurality of content elements between a first node and a second node of the ingestion pipeline. in response to detecting the gap, the data management system automatically triggers reingesting of the content element from the first node. the data management system also determines, based on monitoring of the ingestion pipeline, the health of the ingestion pipeline and provides a dashboard that graphically represents the health.
Inventor(s): Haviv ZAHAV of Ramat Ha'Sharon (IL) for microsoft technology licensing, llc
IPC Code(s): G06F16/903
CPC Code(s): G06F16/90335
Abstract: a computer-implemented method includes receiving, from a requestor, a first instance of a data query corresponding to a data identifier. a time taken to execute the first instance of the data query is compared to a latency threshold. in response to determining that the time exceeds the latency threshold, data, obtained by executing the first instance of the data query and corresponding to the data identifier, is stored in a cache memory. a pre-cache scheduling request, identifying the data query and comprising an instruction to schedule a second instance of the data query, is generated.
Inventor(s): Michael THOLFSEN of Newcastle WA (US) for microsoft technology licensing, llc, Paul Ronald RAY of Kirkland WA (US) for microsoft technology licensing, llc, Elad GRAIVER of Tel-Aviv (IL) for microsoft technology licensing, llc, Yonatan TURKIN of Givatayim (IL) for microsoft technology licensing, llc, Jonathan Thomas GRUDIN of Issaquah WA (US) for microsoft technology licensing, llc, Sadiq Dhafir ALKHALILI of Burnaby (CA) for microsoft technology licensing, llc
IPC Code(s): G06F16/9535, G06F16/9538
CPC Code(s): G06F16/9535
Abstract: a method of operating a search service includes observing, on a per-user basis with respect to each user in a group of users, usage of features of a search engine over a period of in association with search queries submitted to the search engine. the method continues with identifying, on a per-user basis with respect to each of the group of users, one or more insights into the usage of the features over the period of time. the service may then enable display of the one or more insights in a user interface.
Inventor(s): Katie Elizabeth GOLDSTEIN of Hillsborough CA (US) for microsoft technology licensing, llc, Katherine Chen LEE of Seattle WA (US) for microsoft technology licensing, llc, Ilda Maria LADEIRA of Redmond WA (US) for microsoft technology licensing, llc, Pavi BHATTER of Fremont CA (US) for microsoft technology licensing, llc, Allan Joseph BONIFACIO of Toronto (CA) for microsoft technology licensing, llc, Chelsea LE of Seattle WA (US) for microsoft technology licensing, llc, Alexander Leo CAMPBELL of Seattle WA (US) for microsoft technology licensing, llc, Bradford Glenn SINGLEY of Renton WA (US) for microsoft technology licensing, llc, Zhe LIU of Bellevue WA (US) for microsoft technology licensing, llc, Houman MOTEVASELOLHAGH of Seattle WA (US) for microsoft technology licensing, llc, Arthur Li-Pang CHEN of Bellevue WA (US) for microsoft technology licensing, llc, Dena Natalie SAUNDERS of Sammamish WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F16/9538, G06F3/04817, G06F3/0482, G06F16/9532
CPC Code(s): G06F16/9538
Abstract: a computing device is configured to perform acts that include displaying a graphical user interface (gui) of an operating system installed on the computing device, where a taskbar of the gui includes a search box. the search box includes: 1) a text entry field that is configured to receive textual input; and 2) a graphical icon. the acts also include detecting a selection of the text entry field and presenting a first graphical pane on the display in response to detecting the selection of the text entry field, where the first graphical pane includes first content. the acts also include detecting a selection of the graphical icon. the acts further include presenting a second graphical pane on the display in response to detecting the selection of the graphical icon, where the second graphical pane comprises second content that is different from the first content.
Inventor(s): Peder A. Olsen of Redmond WA (US) for microsoft technology licensing, llc, Ranveer Chandra of Kirkland WA (US) for microsoft technology licensing, llc, Olaoluwa Adigun of Los Angeles CA (US) for microsoft technology licensing, llc
IPC Code(s): G06F18/214, G06T3/4053, G06T3/4076
CPC Code(s): G06F18/214
Abstract: systems and methods for generating predicted high-resolution images from low-resolution images. to generate the predicted high-resolution images, the present technology may utilize machine learning models and super resolution models in a series of processes. for instance, the low-resolution images may undergo a sensor transformation based on processing by a machine learning model. the low-resolution images may also be combined with land structure features and/or prior high-resolution images to form an augmented input that is processed by a super resolution model to generate an initial predicted high-resolution image. the predicted initial high-resolution image may be combined or stacked with other predicted high-resolution images to form a stacked image. that stacked image may then be processed by another super resolution model to generate a final predicted high-resolution image.
Inventor(s): Shaleen DEEP of Madison WI (US) for microsoft technology licensing, llc, Ling ZHANG of Madison WI (US) for microsoft technology licensing, llc, Avrilia FLORATOU of Sunnyvale CA (US) for microsoft technology licensing, llc, Anja GRUENHEID of Zurich (CH) for microsoft technology licensing, llc, Jignesh M. PATEL of Madison WI (US) for microsoft technology licensing, llc, Yiwen ZHU of Bellevue WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F18/22, G06F16/34
CPC Code(s): G06F18/22
Abstract: regular expression (“regex”) decomposition and evaluation is disclosed. in an aspect of the disclosure, a literal component and a pattern component in a regex are determined. a plurality of evaluation processes is determined based on the regex, including a first evaluation process configured to identify text that matches the literal component and the pattern component. the evaluation processes are executed with respect to a sample of data to determine performance characteristics including a performance characteristic respective to each evaluation process. an evaluation process of the evaluation processes is selected based on the determined performance characteristics. the selected evaluation process is executed with respect to further data to retrieve results that satisfy the selected evaluation process. in another aspect, the pattern component is decomposed into subcomponents. in another aspect, the evaluation processes include an evaluation process that specifies a process to provide the regex to a regex engine for execution thereof.
Inventor(s): Gaurav MITTAL of Redmond WA (US) for microsoft technology licensing, llc, Nikolaos KARIANAKIS of Sammamish WA (US) for microsoft technology licensing, llc, Victor Manuel FRAGOSO ROJAS of Bellevue WA (US) for microsoft technology licensing, llc, Mei CHEN of Redmond WA (US) for microsoft technology licensing, llc, Jedrzej Jakub KOZERAWSKI of Goleta CA (US) for microsoft technology licensing, llc
IPC Code(s): G06F18/2431, G06N3/04, G06N3/08
CPC Code(s): G06F18/2431
Abstract: a method of balancing a dataset for a machine learning model includes identifying confusing classes of few-shot classes for a machine learning model during validation. one of the confusing classes and an image from one of the few-shot classes are selected. an image perturbation is computed such that the selected image is classified as the selected confusing class. the selected image is modified with the computed perturbation. the modified selected image is added to a batch for training the machine learning model.
Inventor(s): Justin David BROWN of Seattle WA (US) for microsoft technology licensing, llc, Luke J. LENHART of Woodinville WA (US) for microsoft technology licensing, llc, Chong HE of Redmond WA (US) for microsoft technology licensing, llc, Kedar HIRVE of Kent WA (US) for microsoft technology licensing, llc, Ankur CHOUDHARY of Vancouver (CA) for microsoft technology licensing, llc
IPC Code(s): G06F21/33
CPC Code(s): G06F21/33
Abstract: a software-based authentication protocol enables a client to be authenticated by a server through a host. the authentication protocol involves using mutable authentication data that changes to deter counterfeiters from making clones of authentic clients. the host requests a token from the client as proof of authenticity. the client establishes a communication channel to the server using the host as a communication proxy. the client presents mutable authentication data to the server. if the server determines that the mutable authentication data is outdated, then the client is deemed a counterfeit. if the server determined that the mutable authentication data is the latest version, then the client is deemed authentic and a token is issued to the client. depending on a set of policies, the server changes the mutable authentication data and sends the new mutable authentication data to the client but not to counterfeit clients.
Inventor(s): Vikas MALIK of Bothell WA (US) for microsoft technology licensing, llc, Nir MARDIKS RAPPAPORT of Bellevue WA (US) for microsoft technology licensing, llc, Vinay Kumar SHIVA of Sunnyvale CA (US) for microsoft technology licensing, llc
IPC Code(s): G06F21/53, G06F9/455, G06F9/54
CPC Code(s): G06F21/53
Abstract: in one or more examples, a network proxy agent runs inside an isolated (e.g. sandboxed or virtualized) execution environment and a non-isolated application (e.g., web browser) instance runs outside of the isolated execution environment. the network proxy agent acts as a proxy in the sense that network traffic to and from the application instance is routed through the network proxy agent, and thus via the isolated execution environment. a content access policy is supplied to the content access policy agent, and the content access policy agent enforces the content access policy inside the isolated execution environment in relation to the network traffic. for example, content from a certain resource may be restricted according to the content access policy, in which case content requested from that resource is contained within the isolated environment, and replacement content is served to the non-isolated application instance instead.
Inventor(s): Anisha MAZUMDER of Redmond WA (US) for microsoft technology licensing, llc, Haijun ZHAI of Bothell WA (US) for microsoft technology licensing, llc, Daniel Lee MACE of Bellevue WA (US) for microsoft technology licensing, llc, Yogesh K. ROY of Redmond WA (US) for microsoft technology licensing, llc, Seetharaman HARIKRISHNAN of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F21/55, G06N3/08
CPC Code(s): G06F21/55
Abstract: techniques are described herein that are capable of performing automatic graph-based detection of potential security threats. a bayesian network is initialized using an association graph to establish connections among network nodes in the bayesian network. the network nodes are grouped among clusters that correspond to respective intents. patterns in the bayesian network are identified. at least one redundant connection, which is redundant with regard to one or more other connections, is removed from the patterns. scores are assigned to the respective patterns in the bayesian network, based on knowledge of historical patterns and historical security threats, such that each score indicates a likelihood of the respective pattern to indicate a security threat. an output graph is automatically generated. the output graph includes each pattern that has a score that is greater than or equal to a score threshold. each pattern in the output graph represents a potential security threat.
Inventor(s): Nazmus SAKIB of Seattle WA (US) for microsoft technology licensing, llc, Bryan David KELLY of Carnation WA (US) for microsoft technology licensing, llc, Ling Tony CHEN of Bellevue WA (US) for microsoft technology licensing, llc, Peter David WAXMAN of Seattle WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F21/57, G06F9/54, G06F21/55
CPC Code(s): G06F21/572
Abstract: embodiments described herein are directed to firmware policy enforcement of a computing device. for example, a security processor of the computing device is utilized to boot the computing device. during a boot session, the security processor loads and executes specialized firmware. the specialized firmware, when executed, causes the security processor to determine whether other types of firmware to be executed on the computing device is in compliance with a policy specified by the specialized firmware. based at least on a determination that the other firmware is in compliance with the policy, the security processor executes the other firmware. based at least on a determination that the other firmware is not in compliance with the policy, the security processor performs a mitigation with respect to the other firmware.
Inventor(s): Aviram Fireberger of Kibbutz Karmia (IL) for microsoft technology licensing, llc, Hadas Bitran of Ramat Hasharon (IL) for microsoft technology licensing, llc, Shahar Admati of Tel Aviv (IL) for microsoft technology licensing, llc, Tal Baumel of Tel Aviv (IL) for microsoft technology licensing, llc, Danny Karmon of Petah Tikva (IL) for microsoft technology licensing, llc
IPC Code(s): G06F21/62
CPC Code(s): G06F21/6254
Abstract: a method, computer program product, and computing system for processing a raw content portion to identify personal information, thus defining identified personal information; confirming the efficacy of the identified personal information; replacing the identified personal information within the raw content portion with one or more surrogates, thus defining a deidentified content portion; and performing a federated learning operation on the deidentified content portion to generate training data for a machine learning model.
Inventor(s): Timothy Andrew LARGE of Southwater (GB) for microsoft technology licensing, llc, Se Hoon LIM of Bellevue WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F40/126, G06F3/01, G06F21/84
CPC Code(s): G06F40/126
Abstract: a computing system for generating and displaying an encoded document for peripheral privacy is provided. the computing system includes a processor executing a program using portions of memory to determine an initial document, generate an encoded document based on the initial document by modifying letters in a text portion of the initial document, and output the encoded document. in another example, a computing system for displaying an encoded document for peripheral privacy is provided. the computing system includes a processor executing a program using portions of memory to receive an initial document and an encoded document, determine a gaze location of a user using a camera, generate a mask based on the determined gaze location, and display an alpha-blended document by alpha-blending the initial document and the encoded document using the mask.
Inventor(s): Huitian JIAO of Snoqualmie WA (US) for microsoft technology licensing, llc, Max WANG of Seattle WA (US) for microsoft technology licensing, llc, Tomasz Lukasz RELIGA of Seattle WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F40/166, G06F40/279, G06V20/40, G10L15/26, G10L25/57
CPC Code(s): G06F40/166
Abstract: a computing apparatus comprising one or more computer readable storage media, one or more processors operatively coupled with the one or more computer readable storage media, and an application comprising program instructions stored on the one or more computer readable storage media that direct the computing apparatus to at least generate a transcript for a video and identify keyframes in the video based on the transcript. the keyframes are segmented into presentation frames and regular frames. for at least a presentation frame of the presentation frames, a topic represented in the presentation frame is identified, and for at least a regular frame of the regular frames, a topic represented in a portion of the transcript corresponding in time to the regular frame is identified. the keyframes are organized into topic groups based on the topic identified for each of the keyframes, and an electronic document is generated based on the topic groups.
Inventor(s): Titas De of Kolkata (IN) for microsoft technology licensing, llc, Amartya CHAUDHURI of Bangalore (IN) for microsoft technology licensing, llc, Kushal GHOSH of Bangalore (IN) for microsoft technology licensing, llc, Kumar ABHISHEK of Bangalore (IN) for microsoft technology licensing, llc
IPC Code(s): G06F40/166, G06N5/04
CPC Code(s): G06F40/166
Abstract: a method and system for generating and utilizing a personalized compression system includes receiving a first writing, extracting features from the first writing into hash values, generating a plurality of summaries for the first writing, each summary of the plurality of summaries having a different length, causing display of at least one summary of the plurality of summaries on a client, receiving, from a user of the client, an indication of a selection based on the displayed at least one of summary of the plurality of summaries, and refining the baseline machine learning model based on the hash values and the selected summary to generate a personalized machine learning model.
Inventor(s): Keyur Rahul PATEL of Seattle WA (US) for microsoft technology licensing, llc, James Squires MASSON of Seattle WA (US) for microsoft technology licensing, llc, Joseph John MCDAID of Seattle WA (US) for microsoft technology licensing, llc, Arturo GOICOCHEA HOEFKEN of Seattle WA (US) for microsoft technology licensing, llc
IPC Code(s): G06F40/18, G06F8/30, G06F9/54
CPC Code(s): G06F40/18
Abstract: an enhanced integration of spreadsheet environments and external environments is disclosed herein that allows users to enter non-native statements directly into the cells of a worksheet so that external resources can be applied with respect to their values. in addition, a security model is disclosed whereby external functions referenced in the cells of a worksheet are executed in the context of a runtime environment that is secured apart from the spreadsheet application that hosts the worksheet. various enhancements to the user experience are also disclosed that allow users to enter non-native statements in line with respect to the functional syntax that forms the basis of spreadsheet formulas.
Inventor(s): Maurice DIESENDRUCK of Bellevue WA (US) for microsoft technology licensing, llc, Leo Moreno BETTHAUSER of Kirkland WA (US) for microsoft technology licensing, llc, Urszula Stefania CHAJEWSKA of Camano Island WA (US) for microsoft technology licensing, llc, Rohith Venkata PESALA of Redmond WA (US) for microsoft technology licensing, llc, Robin ABRAHAM of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): G06N20/00, G06F18/2113, G06F18/2137
CPC Code(s): G06N20/00
Abstract: the present disclosure relates to utilizing an embedding space relationship query exploration system to explore embedding spaces generated by machine-learning models. for example, the embedding space relationship query exploration system facilitates efficiently and flexibly revealing relationships that are encoded in a machine-learning model during training and inferencing. in particular, the embedding space relationship query exploration system utilizes various embeddings relationship query models to explore and discover the relationship types being learned and preserved within the embedding space of a machine-learning model.
20240212394.OBJECT DATA STORAGE_simplified_abstract_(microsoft technology licensing, llc)
Inventor(s): William Louis THOMAS of Redmond WA (US) for microsoft technology licensing, llc, Jinyu LI of Sammamish WA (US) for microsoft technology licensing, llc, Yang CHEN of Bellevue WA (US) for microsoft technology licensing, llc, Youyou HAN OPPENLANDER of Bothell WA (US) for microsoft technology licensing, llc, Steven John BOWLES of Kenmore WA (US) for microsoft technology licensing, llc, Qingfen LIN of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): G06V40/50, G06F16/28, G06V10/75, G06V40/16
CPC Code(s): G06V40/50
Abstract: the disclosure herein describes systems and methods for object data storage. in some examples, the method includes generating a profile for an object in a directory, the profile including a first feature vector corresponding to the object and a global unique identifier (guid) corresponding to the first feature vector in the profile; generating a search scope, the search scope including at least the guid corresponding to the profile; generating a second feature vector from a live image scan; matching the generated second feature vector from the live image scan to the first feature vector using the generated search scope; identifying the guid corresponding to the first feature vector that matches the second feature vector; and outputting information corresponding to the object of the profile identified by the guid corresponding to the first feature vector.
Inventor(s): Michaela PORUBANOVA of Seattle WA (US) for microsoft technology licensing, llc, Björn Nicolaas Servatius VLASKAMP of Seattle WA (US) for microsoft technology licensing, llc
IPC Code(s): G09G3/00, H04N13/327, H04N13/366
CPC Code(s): G09G3/003
Abstract: a system for facilitating binocular vertical display misalignment correction based on vergence angle is configurable to determine a vertical fusional amplitude indicator associated with user operation of a stereoscopic display system, and, based on the vertical fusional amplitude indicator, determine one or more correction application attributes. the one or more correction application attributes indicate a manner of applying one or more display misalignment correction operations to align presentation of content in the stereoscopic display system. the system is also configurable to apply the one or more display misalignment correction operations to align the presentation of the content in the stereoscopic display system in accordance with the one or more correction application attributes, thereby effectuating display misalignment correction in a manner that mitigates user discomfort and/or user experience disruption.
Inventor(s): Yunxin LIU of Beijing (CN) for microsoft technology licensing, llc, Jiansong ZHANG of Beijing (CN) for microsoft technology licensing, llc, Lintao ZHANG of Beijing (CN) for microsoft technology licensing, llc, Thomas MOSCIBRODA of Beijing (CN) for microsoft technology licensing, llc
IPC Code(s): G09G5/36
CPC Code(s): G09G5/363
Abstract: embodiments of the subject matter described herein relate to a wireless programmable media processing system. in the media processing system, a processing unit in a computing device generates a frame to be displayed based on a graphics content for an application running on the computing device. the frame to be displayed is then divided into a plurality of block groups which are compressed. the plurality of compressed block groups are sent to a graphics display device over a wireless link. in this manner, both the generation and the compression of the frame to be displayed may be completed at the same processing unit in the computing device, which avoids data copying and simplifies processing operations. thereby, the data processing speed and efficiency is improved significantly.
Inventor(s): Xuzhou LI of Mountain View CA (US) for microsoft technology licensing, llc, Ruipeng SUN of Pleasanton CA (US) for microsoft technology licensing, llc
IPC Code(s): H01L27/15
CPC Code(s): H01L27/156
Abstract: technologies are described for micro-led devices that employ a resonant micro-cavity structure to promote direction emission. the described techniques facilitate a narrowed emission spectra, with improved optical efficiency and reduced energy consumption. the light emission profiles are collimated by the cavity effect in the led, yielding improving brightness and significantly reducing the required optical power to achieve the desired brightness. the described resonant micro-cavity structures emit light for certain desired optical modes, while suppressing certain other modes that are not desired. concave surfaces in the resonance micro-cavity structures may be used to further confine light propagation in the horizontal direction, achieve better collimation, and reduce pixel level crosstalk. micro-lenses can be used to further enhance the desirable light collimation effects of the described devices.
20240213719.Hands-Free Connectors_simplified_abstract_(microsoft technology licensing, llc)
Inventor(s): Wade J. DOLL of Enumclaw WA (US) for microsoft technology licensing, llc
IPC Code(s): H01R13/642, H01R12/71, H01R13/502, H01R13/629, H05K7/20
CPC Code(s): H01R13/642
Abstract: the description relates to connectors for connecting components of a system. one example can include a rectangular housing that has connectors positioned along at least one side. a single axis deployment mechanism can be configured to constrain movement of the connectors to a single axis. upon receiving input from an angle that is perpendicular or oblique to the axis, the single axis deployment mechanism can be configured to cause the connectors to move sequentially from either of a stored position or a deployed position to the other of the stored position or the deployed position.
Inventor(s): Donghwi KIM of Kirkland WA (US) for microsoft technology licensing, llc, Gregory Allen NIELSEN of Kirkland WA (US) for microsoft technology licensing, llc
IPC Code(s): H02J7/00, G06F1/28
CPC Code(s): H02J7/00714
Abstract: a computing device is provided, including a battery, a processor configured to receive electrical power from the battery via a voltage regulator, and one or more additional electronic components configured to receive electrical power from the battery. the computing device may further include a first current detector configured to detect a total battery discharge current. the voltage regulator may be configured to receive a first analog current signal from the first current detector, convert the first analog current signal into first digital current data, and transmit the first digital current data to the processor. the processor may be further configured to determine a difference between the total battery discharge current and an available electric current limit for the battery. in response to at least determining the difference, the processor may be further configured to adjust one or more performance parameters of the processor such that the difference is reduced.
Inventor(s): Chuan QIN of Bellevue WA (US) for microsoft technology licensing, llc, Binbin GUAN of Redmond WA (US) for microsoft technology licensing, llc, Yawei YIN of Redmond WA (US) for microsoft technology licensing, llc, Liban BUNI of Aurora CO (US) for microsoft technology licensing, llc
IPC Code(s): H04B10/079
CPC Code(s): H04B10/07955
Abstract: a power transient event detection system includes a first bank of photodetectors (pds) located within a first node of an optical communication system. each pd within the first bank of pds has a different response time. the system further includes an output signal monitor that monitors signal output from each of the pds in the first bank and that logs power transient event detection information. a transient event characterizer identifies, based on the logged event detection information, a subset of the pds in the first bank that observed a power transient event, and determines a duration of the power transient event based on an amount of time that the signal output satisfies low signal criteria for at least one pd in the subset.
Inventor(s): Haibo QIAN of Frisco TX (US) for microsoft technology licensing, llc, Mark Gordon LIBBY of Groton MA (US) for microsoft technology licensing, llc, Michael Anthony BROWN of McKinney TX (US) for microsoft technology licensing, llc, Ronald Mark PARKER of Manchester MA (US) for microsoft technology licensing, llc, Rahul BOSE of Westford MA (US) for microsoft technology licensing, llc
IPC Code(s): H04L1/18, H04W28/04
CPC Code(s): H04L1/18
Abstract: the present disclosure relates to systems, methods, and computer-readable media for configuring a network function in a core network of a telecommunications environment. for example, systems described herein involve collecting transmission data including timing and success/failure data for use in generating a retry policy that includes rules and instructions that govern transmission of retries between computing nodes. once generated, the retry policy may be applied to message packages by selectively transmitting message retries based on specific timing delays that are determined from the collected transmission data. this generation and implementation of the retry policy may improve the latency and success rate of messages transmitted by computing nodes within a core network architecture, thereby improving network conditions in a variety of ways.
Inventor(s): Mahima CHOUDHARY of Huntington Beach CA (US) for microsoft technology licensing, llc, Ankur CHOUDHARY of Redmond WA (US) for microsoft technology licensing, llc, Chong HE of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): H04L9/32
CPC Code(s): H04L9/3213
Abstract: an online service may use a computing system to authenticate a remote accessory device by establishing an encrypted communication channel with the remote accessory device, the remote accessory device being connected to a host device. then, using the encrypted communication channel, obtain a device certificate possessed by the remote accessory device. the online service may then receive a first device token from the remote accessory device and determine whether the first device token exists within a token history associated with the device certificate. based on the first device token existing within the token history, the online service may then determine that the remote accessory device is an authentic device; generate a second device token for the remote accessory device; store the second device token in the token history associated with the device certificate; and send the second device token to the remote accessory device.
Inventor(s): Ronald Mark PARKER of Manchester MA (US) for microsoft technology licensing, llc, Mark Gordon LIBBY of Groton MA (US) for microsoft technology licensing, llc, Michael Anthony BROWN of McKinney TX (US) for microsoft technology licensing, llc, Haibo QIAN of Frisco TX (US) for microsoft technology licensing, llc, Rahul BOSE of Westford MA (US) for microsoft technology licensing, llc
IPC Code(s): H04L41/044
CPC Code(s): H04L41/044
Abstract: the present disclosure relates to systems, methods, and computer readable media for receiving and processing a request to deploy network functions across one or more deployment areas of a telecommunications network. systems described herein process a request by applying a hierarchical configuration model including a hierarchy of configuration management instructions that can be applied to a request that complies with a format of the hierarchical configuration model. features described herein facilitate deployment of unique configuration instructions across multiple network functions and across multiple deployment areas based on a single request and without further user interaction with respect to each of multiple network functions.
Inventor(s): Ken CHEN of Shanghai (CN) for microsoft technology licensing, llc, Chenyang LIU of Shanghai (CN) for microsoft technology licensing, llc, Dayang SHEN of Shanghai (CN) for microsoft technology licensing, llc, Liangying WEI of Shanghai (CN) for microsoft technology licensing, llc, Zhenghui YAN of Shanghai (CN) for microsoft technology licensing, llc, David M. FOWLER of Kirkland WA (US) for microsoft technology licensing, llc
IPC Code(s): H04L47/762, H04L47/78, H04L47/80
CPC Code(s): H04L47/762
Abstract: techniques are described herein that are capable of dynamically re-allocating computing resources while maintaining network connection(s). applications of users are run in a computing unit. computing resources are allocated among the applications based at least in part on dynamic demands of the applications for the computing resources and resource limits associated with the respective customers. in a first example, the computing resources are dynamically re-allocated among the applications, as a result of changing the resource limit of at least one customer, while maintaining at least one network connection between a client device of each customer and at least one respective application. in a second example, the computing resources are dynamically re-allocated among the applications, as a result of changing the resource limit of at least one customer, while maintaining at least one network connection between an interface and a client device of each customer.
Inventor(s): Gunjan BANSAL of San Jose CA (US) for microsoft technology licensing, llc, Abhishek GUPTA of Redmond WA (US) for microsoft technology licensing, llc
IPC Code(s): H04L9/40, H04L41/16, H04L43/0864
CPC Code(s): H04L63/0272
Abstract: automatically selecting an encrypted network connection (such as a vpn tunnel) to use when communicating through another encrypted connection node with which there are multiple encrypted network connections with the computing system. the selection is based predicted latency of that encrypted network connection. the prediction is based on round-trip times of communications over the respective encrypted network connection. this is quite difficult since the encrypted network connection itself is not the entire path of the outgoing message and corresponding incoming message.
Inventor(s): Moran NEUHOF of Tel-Aviv (IL) for microsoft technology licensing, llc, Shay KELS of Givatayim (IL) for microsoft technology licensing, llc, Peleg HADAR of Tel-Aviv (IL) for microsoft technology licensing, llc, Jonathan BAR OR of North Bend WA (US) for microsoft technology licensing, llc
IPC Code(s): H04L9/40
CPC Code(s): H04L63/1483
Abstract: techniques are described herein that are capable of detecting a spoofed entity based on complexity of a distribution of events initiated by the spoofed entity. frequencies with which events of event types are initiated are determined by an entity during a designated period of time. complexity of a distribution of the events among the event types is determined based at least on the frequencies with which the events of the event types are initiated by the entity during the designated period of time. based at least on the complexity of the distribution of the events among the event types being less than or equal to a complexity threshold, the entity is identified as a spoofed entity associated with a spoofing attack. a security action is performed with regard to the entity based at least on the entity being identified as the spoofed entity associated with the spoofing attack.
Inventor(s): Bhaskar SEN of Redmond WA (US) for microsoft technology licensing, llc, Jean-Simon MARROCCO of Laval (CA) for microsoft technology licensing, llc, Nikhil GOPAL of Redmond WA (US) for microsoft technology licensing, llc, Neil THISTLETHWAITE of Redmond WA (US) for microsoft technology licensing, llc, Erik Robert SWANSON of Woodinville WA (US) for microsoft technology licensing, llc
IPC Code(s): H04L9/40
CPC Code(s): H04L63/20
Abstract: the described technology provides a service risk discovery system for recommending, for a cloud based service sharing the service group hierarchy, a predetermined number of top risk observations based on the ranking of the one or more of the risk observations. the system generates the ranking by joining a plurality of risk objects of one or more of the group of cloud based services based on a service identification field of the plurality of risk objects to generate a service group risk vector, the service group risk vector including a plurality of risk observations for the group of cloud based services.
20240214509.Location-Based Frame Skipping_simplified_abstract_(microsoft technology licensing, llc)
Inventor(s): Vanshika Shyamala REDDY of Fairfax VA (US) for microsoft technology licensing, llc, Nicholas Patrick SKACEL of Ashburn VA (US) for microsoft technology licensing, llc, Son Bach NGUYEN of Broadlands VA (US) for microsoft technology licensing, llc
IPC Code(s): H04N5/262, B64C39/02, B64U20/87, G06T7/70, H04N5/915
CPC Code(s): H04N5/2624
Abstract: the techniques described herein implement an automated frame skipping approach used to generate a reduced set of frames for processing. in one example, the automated frame skipping approach is used to more efficiently generate a stitched map of a geographical area being surveilled by an aerial vehicle, such as an unmanned aerial vehicle (uav). a stitched map is an image mosaic that is created using the reduced set of frames such that the geographical area being surveilled by the aerial vehicle is accurately depicted.
Inventor(s): Bin Li of Beijing (CN) for microsoft technology licensing, llc, Jizheng Xu of Beijing (CN) for microsoft technology licensing, llc, Gary J. Sullivan of Bellevue WA (US) for microsoft technology licensing, llc
IPC Code(s): H04N19/124, H04N9/64, H04N19/136, H04N19/174, H04N19/176, H04N19/186
CPC Code(s): H04N19/124
Abstract: innovations in adaptive encoding and decoding for units of a video sequence can improve coding efficiency when switching between color spaces during encoding and decoding. for example, some of the innovations relate to adjustment of quantization or scaling when an encoder switches color spaces between units within a video sequence during encoding. other innovations relate to adjustment of inverse quantization or scaling when a decoder switches color spaces between units within a video sequence during decoding.
Inventor(s): Bozidar RADUNOVIC of Cambridge (GB) for microsoft technology licensing, llc, Sanjeev Mehrotra of Kirkland WA (US) for microsoft technology licensing, llc, Yongguang Zhang of Redmond WA (US) for microsoft technology licensing, llc, Paramvir Bahl of Bellevue WA (US) for microsoft technology licensing, llc, Xenofon Foukas of Cambridge (GB) for microsoft technology licensing, llc
IPC Code(s): H04W28/16, G06F11/32, G06F11/34, G06N20/00, H04W24/10, H04W28/02, H04W72/21, H04W72/23
CPC Code(s): H04W28/16
Abstract: described are examples for monitoring performance metrics of one or more workloads in a cloud-computing environment and reallocating compute resources based on the monitoring. reallocating compute resources can include migrating workloads among nodes or other resources in the cloud-computing environment, reallocating hardware accelerator resources, adjusting transmit power for virtual radio access network (vran) workloads, and/or the like.
Inventor(s): Sreya SARKAR of Chicago IL (US) for microsoft technology licensing, llc, Kathryn M. OSEEN-SENDA of Seattle WA (US) for microsoft technology licensing, llc, Dennis TRIEU of Calgary (CA) for microsoft technology licensing, llc
IPC Code(s): H05K7/20
CPC Code(s): H05K7/20509
Abstract: a thermal management device is described. the device includes a substrate having a spreader surface and a plurality of thermal features connected to the spreader surface of the substrate. at least one thermal feature includes a body having a longitudinal axis and a hollow bore having an inner diameter perpendicular to the longitudinal axis and an opening at a distal end distal from the substrate.
Microsoft Technology Licensing, LLC patent applications on June 27th, 2024
- Microsoft Technology Licensing, LLC
- G06F3/044
- G06F3/041
- CPC G06F3/044
- Microsoft technology licensing, llc
- G06F3/04817
- G06F3/01
- G06F3/0481
- G06F3/04886
- G06F40/274
- G06N20/00
- CPC G06F3/04817
- G06F3/06
- CPC G06F3/0611
- G06F8/38
- G06F40/186
- G06F40/279
- G06V30/414
- CPC G06F8/38
- G06F8/51
- G06F8/41
- G06N3/08
- CPC G06F8/51
- Microsoft technology licensing, llc.
- G06F8/656
- G06F8/65
- G06F9/4401
- H04L67/00
- CPC G06F8/656
- G06F9/30
- G06F9/52
- G06F11/07
- CPC G06F9/30047
- G06F9/455
- CPC G06F9/45558
- G06F11/36
- CPC G06F11/3636
- G06F16/174
- H03M7/30
- CPC G06F16/1744
- G06F16/176
- G06F16/14
- G06F16/182
- CPC G06F16/176
- G06F16/23
- G06F16/215
- CPC G06F16/2365
- G06F16/903
- CPC G06F16/90335
- G06F16/9535
- G06F16/9538
- CPC G06F16/9535
- G06F3/0482
- G06F16/9532
- CPC G06F16/9538
- G06F18/214
- G06T3/4053
- G06T3/4076
- CPC G06F18/214
- G06F18/22
- G06F16/34
- CPC G06F18/22
- G06F18/2431
- G06N3/04
- CPC G06F18/2431
- G06F21/33
- CPC G06F21/33
- G06F21/53
- G06F9/54
- CPC G06F21/53
- G06F21/55
- CPC G06F21/55
- G06F21/57
- CPC G06F21/572
- G06F21/62
- CPC G06F21/6254
- G06F40/126
- G06F21/84
- CPC G06F40/126
- G06F40/166
- G06V20/40
- G10L15/26
- G10L25/57
- CPC G06F40/166
- G06N5/04
- G06F40/18
- G06F8/30
- CPC G06F40/18
- G06F18/2113
- G06F18/2137
- CPC G06N20/00
- G06V40/50
- G06F16/28
- G06V10/75
- G06V40/16
- CPC G06V40/50
- G09G3/00
- H04N13/327
- H04N13/366
- CPC G09G3/003
- G09G5/36
- CPC G09G5/363
- H01L27/15
- CPC H01L27/156
- H01R13/642
- H01R12/71
- H01R13/502
- H01R13/629
- H05K7/20
- CPC H01R13/642
- H02J7/00
- G06F1/28
- CPC H02J7/00714
- H04B10/079
- CPC H04B10/07955
- H04L1/18
- H04W28/04
- CPC H04L1/18
- H04L9/32
- CPC H04L9/3213
- H04L41/044
- CPC H04L41/044
- H04L47/762
- H04L47/78
- H04L47/80
- CPC H04L47/762
- H04L9/40
- H04L41/16
- H04L43/0864
- CPC H04L63/0272
- CPC H04L63/1483
- CPC H04L63/20
- H04N5/262
- B64C39/02
- B64U20/87
- G06T7/70
- H04N5/915
- CPC H04N5/2624
- H04N19/124
- H04N9/64
- H04N19/136
- H04N19/174
- H04N19/176
- H04N19/186
- CPC H04N19/124
- H04W28/16
- G06F11/32
- G06F11/34
- H04W24/10
- H04W28/02
- H04W72/21
- H04W72/23
- CPC H04W28/16
- CPC H05K7/20509