Patents by Inventor Nir Nice
Nir Nice has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9336546Abstract: Example apparatus and methods perform matrix factorization (MF) on a collaborative filter based usage matrix to create a multi-dimensional latent space that embeds users, items, and features. A full distance matrix is extracted from the latent space. The full distance matrix may be extracted from the latent space by defining a distance metric between item pairs based on the multi-dimensional representation in the latent space. The full distance matrix may be populated with values computed for item pairs using the distance metric. A plurality of vectors associated with a multi-dimensional Euclidean space are produced from the full distance matrix. The plurality of vectors produce a navigable data set. The plurality of vectors may be produced in a manner that minimizes strain on the distances vectors. A representation of the navigable data set may be presented as, for example, a virtually traversable landscape that supports an interactive user experience.Type: GrantFiled: March 27, 2014Date of Patent: May 10, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Nir Nice, Noam Koenigstein, Ulrich Paquet, Shahar Keren, Daniel Sitton, Amit Perelstein
-
Publication number: 20160078520Abstract: A recommendation system is implemented using modified matrix factorization on top of a content-based matrix to provide both user-to-item and item-to-item content-based recommendations while exposing the full depth of transitive relationships among recommendations. Content information such as features and characteristics may be represented in a usage matrix in which features are treated as users would be in traditional matrix factorization. Matrix factorization is applied to the “features-as-users” matrix to build a content-based model in which features and items are embedded in a low dimension latent space. User history is employed for system training by locating user vectors within the latent space. Recommendations that are near to the vector can be provided to the users along with explanations (e.g., a recommendation is given because of an item's proximity to a particular feature).Type: ApplicationFiled: September 12, 2014Publication date: March 17, 2016Inventors: Nir Nice, Noam Koenigstein, Shahar Keren, Ayelet Kroskin, Ulrich Paquet
-
Patent number: 9256693Abstract: Example apparatus and methods transform a non-metric latent space produced by a matrix factorization process to a higher dimension metric space by applying an order preserving transformation to the latent space. The transformation preserves the order of the results of an inner product operation defined for the latent space. The higher dimension metric space may be queried for the results to different requests. Example apparatus and methods may assign every user i a vector ui in a latent space, and may assign every item j a vector vj in the latent space. The dot product ui·vj represents the score between the user i and the item j. The score represents the strength of the relationship between the user i and the item j. Example apparatus and methods may then apply ranking methodologies (e.g., LSH, K-D trees) to problems including recommendation, targeting, matchmaking, or item to item.Type: GrantFiled: January 8, 2014Date of Patent: February 9, 2016Assignee: Rovi Technologies CorporationInventors: Nir Nice, Noam Koenigstein, Ulrich Paquet, Ran Gilad-Bachrach, Liran Katzir
-
Publication number: 20160037343Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.Type: ApplicationFiled: October 5, 2015Publication date: February 4, 2016Inventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
-
Patent number: 9231964Abstract: Methods, systems, and computer-readable media are disclosed for detecting vulnerabilities based on aggregated primitives. A particular method includes receiving a plurality of data transmissions. At least one of the data transmissions includes a protocol anomaly that is not indicative of a security threat. The method includes identifying a plurality of primitives associated with the data transmissions. The primitives are aggregated, and an attack condition is identified based on the aggregated primitives. A security alert is generated based on the identified attack condition.Type: GrantFiled: April 14, 2009Date of Patent: January 5, 2016Assignee: Microsoft CorporationInventors: David B. Cross, Nir Nice
-
Patent number: 9208155Abstract: A recommendation system for optimizing content recommendation lists is disclosed. The system dynamically tracks a list interaction history of a user, which details that user's interactions with a plurality of different lists presenting different recommended items to that user. The system automatically correlates one or more list preferences with that user based on the list interaction history, and builds a recommendation list with a plurality of candidate items having different recommendation confidences. The recommendation list is built such that each candidate item with a higher recommendation confidence is prioritized over each candidate item with a lower recommendation confidence according to the one or more list preferences correlated to that user.Type: GrantFiled: September 9, 2011Date of Patent: December 8, 2015Assignee: Rovi Technologies CorporationInventors: Nir Nice, Dror Kremer, Daniel Sitton, Michael Feldman, Shimon Shlevich, Ori Folger
-
Patent number: 9154505Abstract: Aspects of the subject matter described herein relate to a simplified login for mobile devices. In aspects, on a first logon, a mobile device asks a user to enter credentials and a PIN. The credentials and PIN are sent to a server which validates user credentials. If the user credentials are valid, the server encrypts data that includes at least the user credentials and the PIN and sends the encrypted data to the mobile device. In subsequent logons, the user may logon using only the PIN. During login, the mobile device sends the PIN in conjunction with the encrypted data. The server can then decrypt the data and compare the received PIN with the decrypted PIN. If the PINs are equal, the server may grant access to a resource according to the credentials.Type: GrantFiled: January 13, 2014Date of Patent: October 6, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Meir Mendelovich, John Neystadt, Ken Aoyama, Nir Nice, Shay Yehuda Gurman
-
Publication number: 20150278350Abstract: Example apparatus and methods perform matrix factorization (MF) on a usage matrix to create a latent space that describes similarities between users and items and between items and items in the usage matrix. The usage matrix relates users to items according to a collaborative filtering approach. A cell in the usage matrix may store a value that describes whether a user has acquired an item and the strength with which the user likes an item that has been acquired. The latent item space may reflect true relationships between items represented in the usage matrix and those relationships may be proportional to the strength in the usage matrix. The strength of the relationship may be encoded using continuous data that measures, for example, the amount of time a video game has been played, the amount of time content has been viewed, or other continuous or cumulative engagement measurements.Type: ApplicationFiled: March 27, 2014Publication date: October 1, 2015Applicant: Microsoft CorporationInventors: Nir Nice, Noam Koenigstein, Ulrich Paquet, Shahar Keren
-
Publication number: 20150278908Abstract: Example apparatus and methods perform matrix factorization (MF) on a collaborative filter based usage matrix to create a multi-dimensional latent space that embeds users, items, and features. A full distance matrix is extracted from the latent space. The full distance matrix may be extracted from the latent space by defining a distance metric between item pairs based on the multi-dimensional representation in the latent space. The full distance matrix may be populated with values computed for item pairs using the distance metric. A plurality of vectors associated with a multi-dimensional Euclidean space are produced from the full distance matrix. The plurality of vectors produce a navigable data set. The plurality of vectors may be produced in a manner that minimizes strain on the distances vectors. A representation of the navigable data set may be presented as, for example, a virtually traversable landscape that supports an interactive user experience.Type: ApplicationFiled: March 27, 2014Publication date: October 1, 2015Applicant: Microsoft CorporationInventors: Nir Nice, Noam Koenigstein, Ulrich Paquet, Shahar Keren, Daniel Sitton, Amit Perelstein
-
Publication number: 20150278910Abstract: Example apparatus and methods perform matrix factorization (MF) on a usage matrix to create a latent space that describes similarities between items in the usage matrix. The usage matrix relates source items that a user already has to target items that a user might acquire. A cell in the usage matrix may store a value that describes the likelihood (e.g., probability) that an acquisition of item x will lead to an acquisition of item y. The value stored in cell (x,y) is not transitive with the value stored in cell (y,x). Values that are missing in the usage matrix may be computed using vectors in the latent space. Once the usage matrix is updated, a directed recommendation may be produced from data in the usage matrix. Initial values in the usage matrix may be produced from data associated with actual acquisitions.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Applicant: Microsoft CorporationInventors: Nir Nice, Noam Koenigstein, Ulrich Paquet, Yehuda Finkelstein
-
Publication number: 20150278907Abstract: Example apparatus and methods perform matrix factorization (MF) on a usage matrix to create a latent space that describes similarities between users and items in the usage matrix. The usage matrix relates users to items according to a collaborative filtering approach. A cell in the usage matrix may store a value that describes whether a user has acquired an item and the strength with which the user likes an item that has been acquired. Example apparatus and methods account for negative indications analytically rather than through negative sampling. Example apparatus and methods analyze strengths in the usage matrix, analyze item popularity, analyze user popularity, compute contribution factors for items with respect to users and users with respect to items, and compute new user vectors and new item vectors that depend on the strengths, popularity, and contributions. A recommendation may consider new user vectors and new item vectors.Type: ApplicationFiled: March 27, 2014Publication date: October 1, 2015Applicant: Microsoft CorporationInventors: Nir Nice, Noam Koenigstein, Ulrich Paquet, Shahar Keren
-
Publication number: 20150193548Abstract: Example apparatus and methods transform a non-metric latent space produced by a matrix factorization process to a higher dimension metric space by applying an order preserving transformation to the latent space. The transformation preserves the order of the results of an inner product operation defined for the latent space. The higher dimension metric space may be queried for the results to different requests. Example apparatus and methods may assign every user i a vector ui in a latent space, and may assign every item j a vector vj in the latent space. The dot product ui·vj represents the score between the user i and the item j. The score represents the strength of the relationship between the user i and the item j. Example apparatus and methods may then apply ranking methodologies (e.g., LSH, K-D trees) to problems including recommendation, targeting, matchmaking, or item to item.Type: ApplicationFiled: January 8, 2014Publication date: July 9, 2015Inventors: Nir Nice, Noam Koenigstein, Ulrich Paquet, Ran Gilad-Bachrach, Liran Katzir
-
Patent number: 9055107Abstract: The method of delegating authentication, within a chain of entities, relies upon a recording of at least a portion of a TLS handshake between a gateway device and user, in which the user needs access to a desired server. The method then relies upon re-verification of cryptographic evidence in the recorded portion of the TLS handshake, which is forwarded either (1) to the server to which access is desired, in which case the server re-verifies the recorded portion to confirm authentication, or, (2) to a third party entity, in which case the third party entity confirms authentication and provides credentials to the gateway server which then uses the credentials to authenticate to the server as the user.Type: GrantFiled: December 1, 2006Date of Patent: June 9, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Gennady Medvinsky, Nir Nice, Tomer Shiran, Alexander Teplitsky, Paul Leach, John Neystadt
-
Publication number: 20150112801Abstract: Matrix factorization techniques may be employed to identify different tastes based on user history information for a user profile and to provide item recommendations for the various tastes. An item model may be generated that includes item vectors, each item vector representing an item from a catalog of items. An item vector from the item model may be identified for each of a number of items identified in information for a user profile. The item vectors may be grouped into different clusters, and a taste vector may be generated for each cluster based on item vectors in each cluster. Each taste vector may be used to select item recommendations that may be combined in a set of recommendations provided for presentation to one or more users associated with the user profile.Type: ApplicationFiled: October 22, 2013Publication date: April 23, 2015Applicant: MICROSOFT CORPORATIONInventors: NIR NICE, NOAM KOENIGSTEIN, ULRICH PAQUET, SHAHAR ZVI KEREN
-
Patent number: 8983888Abstract: A technique for efficiently factoring a matrix in a recommendation system. Usage data for a large set of users relative to a set of items is provided in a usage matrix R. To reduce computational requirements, the usage matrix is sampled to provide a reduced matrix R?. R? is factored into a user matrix U? and an item matrix V. User vectors in U? and V are initialized and then iteratively updated to arrive at an optimal solution. The reduced matrix can be factored using the computational resources of a single computing device, for instance. Subsequently, the full user matrix U is obtained by fixing V and analytically minimizing an error in UV=R+error. The computations of this analytic solution can be divided among a set of computing devices, such as by using a map and reduce technique. Each computing device solves the equation for different respective subset of users.Type: GrantFiled: November 7, 2012Date of Patent: March 17, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Nir Nice, Noam Koenigstein, Ulrich Paquet, Shahar Keren, Daniel Sitton, Dror Kremer, Shai Roitman
-
Patent number: 8983859Abstract: A client-based ad agent dynamically determines whether an advertisement campaign should bid on an impression for an end user and/or sets the bid price of the advertisement campaign for the impression. When an opportunity for an impression on a web page is identified, the ad agent accesses user data associated with an end user. The ad agent analyzes the user data to identify the relevance and/or value of serving an impression to the end user to the advertisement campaign. Based on the analysis, the ad agent controls whether the advertisement campaign bids on the impression for the end user and/or sets the bid price of the advertisement campaign for the impression.Type: GrantFiled: June 18, 2010Date of Patent: March 17, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Nir Nice, Uri Barash, Ying Li, Michael J. Goldbach, William H. Gates, III
-
Publication number: 20150073931Abstract: Disclosed herein is a system and method for identifying features of items that are more relevant for making recommendations to consumers for content that they may be interested in. The system determines the similarity between items that are recommend and items in the user's history and compares that similarity measure to the similarity measure calculated for a random item on the same features. From this similarity measure the relative impactfullness of a particular feature on a recommendation can be determined.Type: ApplicationFiled: September 6, 2013Publication date: March 12, 2015Applicant: Microsoft CorporationInventors: Royi Ronen, Noam Koenigstein, Nir Nice, Elad Ziklik
-
Publication number: 20150073932Abstract: Example apparatus and methods provide a recommendation to a user about a product they may wish to consider purchasing. One method produces a single indication concerning a relationship between a user and an item with which the user has interacted. The single indication identifies whether the user likes the item and the degree to which the user likes the item. The single indication is independent of user signals processed to compute the single indication. The single indication is produced by a signal deriver that is loosely coupled to a model of users and items. The model may be a matrix upon which matrix factorization can be performed. Although matrix factorization is performed, it is performed on vectors whose elements are independent of the signals processed by the signal deriver. Since users may have different preferences at different times, the degree to which the user likes the item may be manipulated.Type: ApplicationFiled: September 11, 2013Publication date: March 12, 2015Applicant: Microsoft CorporationInventors: Nir Nice, Noam Koenigstein, Ulrich Paquet, Shahar Keren, Daniel Sitton
-
Patent number: 8959596Abstract: A single passcode can be used for validation by a user of several entities in a system without compromising security. The source of the entity providing validation credentials, along with the passcode, is considered when determining validity. A one-time password system validates credentials if a validation credentials, such as a user's valid passcode and the source of the credentials, have not been used previously. In a one-time passcode system, a validation processor receives validation credentials from a client processor. If the client processor has not previously sent the validation credentials to the validation processor, and the credentials are valid, the validation processor will validate the credentials. Otherwise, the credentials are invalid. Other client processors can utilize the same passcode and their respective source identifiers, and as long as the other client processors have not previously utilized the credentials, the credentials are declared valid.Type: GrantFiled: June 15, 2006Date of Patent: February 17, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Nir Nice, Ron Mondri, Tomer Shiran, Boaz Ein-Gil
-
Patent number: 8954897Abstract: In a virtualization environment, a host machine on which a guest machine is operable is monitored to determine that it is healthy by being compliant with applicable policies (such as being up to date with the current security patches, running an anti-virus program, certified to run a guest machine, etc.) and free from malicious software or “malware” that could potentially disrupt or compromise the security of the guest machine. If the host machine is found to be non-compliant, then the guest machine is prevented from either booting up on the host machine or connecting to a network to ensure that the entire virtualization environment is compliant and that the guest machine, including its data and applications, etc., is protected against attacks that may be launched against it via malicious code that runs on the unhealthy host machine, or is isolated from the network until the non-compliancy is remediated.Type: GrantFiled: August 28, 2008Date of Patent: February 10, 2015Assignee: Microsoft CorporationInventors: John Neystadt, Noam Ben-Yochanan, Nir Nice