Patents by Inventor Aladdin A. Nassar
Aladdin A. Nassar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230410817Abstract: One embodiment of the present invention sets forth a technique for processing recordings of events. The technique includes applying a machine learning model to a plurality of samples from one or more recordings of the events to generate a plurality of embeddings representing the plurality of samples. The technique also includes generating a plurality of labels that identify speakers associated with the plurality of samples based on metadata comprising timestamps of voice activity during the events and participants associated with the voice activity. The technique further includes storing mappings of the plurality of embeddings to the plurality of labels.Type: ApplicationFiled: June 19, 2023Publication date: December 21, 2023Applicant: Cisco Technology, Inc.Inventors: Kareem Aladdin Nassar, David Abraham Wiener
-
Patent number: 11682401Abstract: One embodiment of the present invention sets forth a technique for processing recordings of events. The technique includes applying a machine learning model to a plurality of samples from one or more recordings of the events to generate a plurality of embeddings representing the plurality of samples. The technique also includes generating a plurality of labels that identify speakers associated with the plurality of samples based on metadata comprising timestamps of voice activity during the events and participants associated with the voice activity. The technique further includes storing mappings of the plurality of embeddings to the plurality of labels.Type: GrantFiled: March 18, 2021Date of Patent: June 20, 2023Assignee: Cisco Technology, IncInventors: Kareem Aladdin Nassar, David Abraham Wiener
-
Patent number: 11665146Abstract: Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service.Type: GrantFiled: September 4, 2019Date of Patent: May 30, 2023Assignee: Microsoft Technology Licensing, LLCInventors: Baskaran Dharmarajan, Andy Chin, Aladdin A. Nassar
-
Publication number: 20210280198Abstract: One embodiment of the present invention sets forth a technique for processing recordings of events. The technique includes applying a machine learning model to a plurality of samples from one or more recordings of the events to generate a plurality of embeddings representing the plurality of samples. The technique also includes generating a plurality of labels that identify speakers associated with the plurality of samples based on metadata comprising timestamps of voice activity during the events and participants associated with the voice activity. The technique further includes storing mappings of the plurality of embeddings to the plurality of labels.Type: ApplicationFiled: March 18, 2021Publication date: September 9, 2021Applicant: Cisco Technology, Inc.Inventors: Kareem Aladdin Nassar, David Abraham Wiener
-
Patent number: 10964330Abstract: One embodiment of the present invention sets forth a technique for processing recordings of events. The technique includes applying a machine learning model to a plurality of samples from one or more recordings of the events to generate a plurality of embeddings representing the plurality of samples. The technique also includes generating a plurality of labels that identify speakers associated with the plurality of samples based on metadata comprising timestamps of voice activity during the events and participants associated with the voice activity. The technique further includes storing mappings of the plurality of embeddings to the plurality of labels.Type: GrantFiled: May 13, 2019Date of Patent: March 30, 2021Assignee: CISCO TECHNOLOGY, INC.Inventors: Kareem Aladdin Nassar, David Abraham Wiener
-
Patent number: 10911718Abstract: One embodiment of the present invention sets forth a technique for enhancing meeting participation by an interactive virtual assistant. The technique includes loading a resource for conducting the meeting over a teleconferencing system. The technique also includes configuring, based on the resource, virtual input/output (I/O) devices for integrating the interactive virtual assistant into the teleconferencing system during the meeting. In response to a command received over a first device in the virtual I/O devices, the technique further includes generating, by the interactive virtual assistant, output containing a response to the command over a second device in the virtual I/O devices.Type: GrantFiled: November 2, 2018Date of Patent: February 2, 2021Assignee: CISCO TECHNOLOGY, INC.Inventor: Kareem Aladdin Nassar
-
Publication number: 20200365160Abstract: One embodiment of the present invention sets forth a technique for processing recordings of events. The technique includes applying a machine learning model to a plurality of samples from one or more recordings of the events to generate a plurality of embeddings representing the plurality of samples. The technique also includes generating a plurality of labels that identify speakers associated with the plurality of samples based on metadata comprising timestamps of voice activity during the events and participants associated with the voice activity. The technique further includes storing mappings of the plurality of embeddings to the plurality of labels.Type: ApplicationFiled: May 13, 2019Publication date: November 19, 2020Inventors: Kareem Aladdin Nassar, David Abraham Wiener
-
Publication number: 20200145616Abstract: One embodiment of the present invention sets forth a technique for enhancing meeting participation by an interactive virtual assistant. The technique includes loading a resource for conducting the meeting over a teleconferencing system. The technique also includes configuring, based on the resource, virtual input/output (I/O) devices for integrating the interactive virtual assistant into the teleconferencing system during the meeting. In response to a command received over a first device in the virtual I/O devices, the technique further includes generating, by the interactive virtual assistant, output containing a response to the command over a second device in the virtual I/O devices.Type: ApplicationFiled: November 2, 2018Publication date: May 7, 2020Inventor: Kareem Aladdin NASSAR
-
Publication number: 20190394181Abstract: Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service.Type: ApplicationFiled: September 4, 2019Publication date: December 26, 2019Inventors: Baskaran DHARMARAJAN, Andy CHIN, Aladdin A. NASSAR
-
Patent number: 10412065Abstract: Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service.Type: GrantFiled: October 11, 2016Date of Patent: September 10, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Baskaran Dharmarajan, Andy Chin, Aladdin A. Nassar
-
Patent number: 10079907Abstract: A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and associated session identifiers, as well as received cached data detection requests and associated session identifiers. This log can be used to determine how many usage sessions existed over a particular amount of time, and how many of the usage sessions used data from a local cache rather than from the service. The service also returns, in response to a received cached data detection request, a response including an indication that the response is from the service. The program can determine that the response was received from the service if the indication is included in the response, and that the response was received from a local cache of the computing device if the indication is not included in the response.Type: GrantFiled: November 9, 2015Date of Patent: September 18, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Michael P. Mastrangelo, Aladdin A. Nassar, David M. Alongi, Emmanuel Jose Miranda-Steiner, Tze Meng Lee
-
Publication number: 20170034140Abstract: Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service.Type: ApplicationFiled: October 11, 2016Publication date: February 2, 2017Inventors: Baskaran Dharmarajan, Andy Chin, Aladdin A. Nassar
-
Patent number: 9509666Abstract: Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service.Type: GrantFiled: September 4, 2014Date of Patent: November 29, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Baskaran Dharmarajan, Andy Chin, Aladdin A. Nassar
-
Publication number: 20160173637Abstract: A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and associated session identifiers, as well as received cached data detection requests and associated session identifiers. This log can be used to determine how many usage sessions existed over a particular amount of time, and how many of the usage sessions used data from a local cache rather than from the service. The service also returns, in response to a received cached data detection request, a response including an indication that the response is from the service. The program can determine that the response was received from the service if the indication is included in the response, and that the response was received from a local cache of the computing device if the indication is not included in the response.Type: ApplicationFiled: November 9, 2015Publication date: June 16, 2016Inventors: Michael P. Mastrangelo, Aladdin A. Nassar, David M. Alongi, Emmanuel Jose Miranda-Steiner, Tze Meng Lee
-
Patent number: 9294455Abstract: Implementations of the present disclosure provide systems and methods for seamlessly transferring a communication session from a first client to a second client via a close-range communication connection. Implementations contemplate serializing a set of unique identifiers pertaining to a communication session and transmitting the set of serialized identifiers from the first client to the second client via a close-range communication connection. The second client de-serializes the set of unique identifiers and transmits a request to a communication session server to assume control of the communication session from the first client. A communication session server may perform an authentication of the second client that requires the second client to provide credentials associated with a user account. In some implementations, the present disclosure provides for the creation of a temporary use token that enables a client to temporarily acquire credentials associated with a user account.Type: GrantFiled: June 4, 2013Date of Patent: March 22, 2016Assignee: Google Inc.Inventors: Kareem Aladdin Nassar, Shrikrishna Vijaykumar Borde, Justin Mattson
-
Patent number: 9210237Abstract: A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and associated session identifiers, as well as received cached data detection requests and associated session identifiers. This log can be used to determine how many usage sessions existed over a particular amount of time, and how many of the usage sessions used data from a local cache rather than from the service. The service also returns, in response to a received cached data detection request, a response including an indication that the response is from the service. The program can determine that the response was received from the service if the indication is included in the response, and that the response was received from a local cache of the computing device if the indication is not included in the response.Type: GrantFiled: February 9, 2015Date of Patent: December 8, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Michael P. Mastrangelo, Aladdin A. Nassar, David M. Alongi, Emmanuel Jose Miranda-Steiner, Tze Meng Lee
-
Publication number: 20150180996Abstract: A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and associated session identifiers, as well as received cached data detection requests and associated session identifiers. This log can be used to determine how many usage sessions existed over a particular amount of time, and how many of the usage sessions used data from a local cache rather than from the service. The service also returns, in response to a received cached data detection request, a response including an indication that the response is from the service. The program can determine that the response was received from the service if the indication is included in the response, and that the response was received from a local cache of the computing device if the indication is not included in the response.Type: ApplicationFiled: February 9, 2015Publication date: June 25, 2015Inventors: Michael P. Mastrangelo, Aladdin A. Nassar, David M. Alongi, Emmanuel Jose Miranda-Steiner, Tze Meng Lee
-
Publication number: 20150088988Abstract: Content such as a television program can be shared by pushing a content identifier to a queue through a social network. A share request from a sender can designate a recipient for the content. An implementation can determine if the sender and the recipient have permission to share the content. If permitted, an identifier associated with the content can be pushed to a viewing queue of the recipient. A user can subscribe to follow a viewing queue, which can provide to the user access to the queue's listing of content, as well as the content itself.Type: ApplicationFiled: December 21, 2012Publication date: March 26, 2015Applicant: Google Inc.Inventors: Yuan Yuan, Kareem Aladdin Nassar, Christopher McKillop
-
Patent number: 8966059Abstract: A service assigns session identifiers to usage sessions of a program on a computing device, and maintains records in a log of received page requests and associated session identifiers, as well as received cached data detection requests and associated session identifiers. This log can be used to determine how many usage sessions existed over a particular amount of time, and how many of the usage sessions used data from a local cache rather than from the service. The service also returns, in response to a received cached data detection request, a response including an indication that the response is from the service. The program can determine that the response was received from the service if the indication is included in the response, and that the response was received from a local cache of the computing device if the indication is not included in the response.Type: GrantFiled: April 6, 2011Date of Patent: February 24, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Michael P. Mastrangelo, Aladdin A. Nassar, David M. Alongi, Emmanuel Jose Miranda-Steiner, Tze Meng Lee
-
Publication number: 20140380050Abstract: Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data. The seed is received in response to a user login attempt to the network service. The user data is requested from the location using at least the received cryptographic key. The method further includes receiving and storing the user data at the network node, where the network node is physically closer to a location of the user than is the location of the network service. If the user is successfully authenticated, user access is provided to the stored user data at the network node rather than from the network service.Type: ApplicationFiled: September 4, 2014Publication date: December 25, 2014Inventors: Baskaran Dharmarajan, Andy Chin, Aladdin A. Nassar