Patents Assigned to MICROSOFT TECHNOLOGIES LICENSING, LLC.
  • Patent number: 11978434
    Abstract: A computer-implemented technique identifies terms in an original reference transcription and original ASR output results that are considered valid variants of each other, even though these terms have different textual forms. Based on this finding, the technique produces a normalized reference transcription and normalized ASR output results in which valid variants are assigned the same textual form. In some implementations, the technique uses the normalized text to develop a model for an ASR system. For example, the technique may generate a word error rate (WER) measure by comparing the normalized reference transcription with the normalized ASR output results, and use the WER measure as guidance in developing the model. Some aspects of the technique involve identifying occasions in which a term can be properly split into component parts. Other aspects can identify other ways in which two terms may vary in spelling, but nonetheless remain valid variants.
    Type: Grant
    Filed: September 29, 2021
    Date of Patent: May 7, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Satarupa Guha, Ankur Gupta, Rahul Ambavat, Rupeshkumar Rasiklal Mehta
  • Patent number: 11977926
    Abstract: Techniques are described for orchestrating a cohort deployment in a computing network comprising a plurality of computing nodes implementing a virtualized computing network managed by an orchestrator. The cohort deployment is managed by a deployment broker configured to coordinate the cohort deployment. The cohort deployment includes multiple deployments, where the cohort deployment comprises a parent deployment and a spawned deployment that includes a dependency on the parent deployment.
    Type: Grant
    Filed: June 26, 2023
    Date of Patent: May 7, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Ajay Punreddy, Piotr Galecki, Dinesh Kumar Ramasamy, Thuy Phuong Fernandes, Huanglin Xiong
  • Patent number: 11979376
    Abstract: A method of and system for utilizing an access token to authenticate a client device for accessing a resource server include generating a session key for a communication session between the device and a resource server, deriving a nonce from the session key, and transmitting a request to an identity platform for authenticating the device to access the resource server, where the request includes the nonce. Upon confirmation of authentication, the method and system may include receiving an access token from the identity platform, the access token including information that confirms authentication of the device, and transmitting the access token to the resource server to enable access to the resource server, where the access token includes the nonce.
    Type: Grant
    Filed: June 30, 2020
    Date of Patent: May 7, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Alan Thomas Gavin Jowett, Andrew Albert Hodgkinson, Lance Vernon Crandall, Jeffrey Scott Pinkston
  • Patent number: 11977629
    Abstract: Aspects of the present disclosure relate to retrospective memory analysis. In examples, a historical archive of memory images for an execution environment is maintained. A historical memory image of the historical archive may be evaluated according to a current set of known issues, rather than issues that were known at the time of the memory capture. Accordingly, it may be possible to determine when the execution environment was last in a good environment condition. As another example, it may be possible to determine whether a now-known issue has since been resolved (e.g., such that the issue would not be identified in the current execution environment). Thus, as compared to contemporaneous issue identification techniques, aspects of the present disclosure may be applied to any number of execution environments to enable retrospective identification of now-known issues that were, at least at the time of a memory capture, not known.
    Type: Grant
    Filed: June 30, 2021
    Date of Patent: May 7, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Marsh Jordan Ray, Michael T. Walker, Brian M. Caswell
  • Patent number: 11978020
    Abstract: The technology described herein visibly depicts hidden message traits to help users determine whether an email is genuine or deceptive. The hidden message traits are revealed by identifying and changing attributes that keep the hidden traits from being displayed in a rendered message. Spam messages, phishing messages, and messages that include or link to malicious programs (e.g., malware, ransomware) are examples of unwanted messages that can harm a recipient. These messages often rely on deception to get past email filtering systems and to trick a user into acting on content in a message. The deception often involves including hidden traits in a message that fool an automated filtering system. The technology described herein shows the visible traits to a user by including them in the rendered version of the message.
    Type: Grant
    Filed: June 10, 2021
    Date of Patent: May 7, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventor: Weisheng Li
  • Patent number: 11977591
    Abstract: Systems, methods, and computer-executable instructions for synthesizing facts from multiple sources. A user search string associated with a topic is received. Queries associated with the user search string are generated. Website content is queried, using the plurality of queries associated with the user search string, to generate results. The results are ranked based on a first feature. The results are filtered based on the first feature to generate intermediate results. The intermediate results are ranked based on a second feature. The second feature is most costly to calculate than the first feature. The filtered intermedia results are filtered based on the second feature to generate final results. Distinct facts from the final results are determined. The distinct facts include content from different URLs. The distinct facts associated with the topic are returned.
    Type: Grant
    Filed: March 16, 2018
    Date of Patent: May 7, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mridu Baldevraj Narang, Jun Liu, Guihong Cao, Zicheng Huang
  • Patent number: 11979601
    Abstract: Innovations in encoder-side search ranges having horizontal bias or vertical bias are described herein. For example, a video encoder determines a block vector (“BV”) for a current block of a picture, performs intra prediction for the current block using the BV, and encodes the BV. The BV indicates a displacement to a region within the picture. When determining the BV, the encoder checks a constraint that the region is within a BV search range having a horizontal bias or vertical bias. The encoder can select the BV search range from among multiple available BV search ranges, e.g., depending at least in part on BV values of one or more previous blocks, which can be tracked in a histogram data structure.
    Type: Grant
    Filed: January 23, 2023
    Date of Patent: May 7, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Lihua Zhu, Yongjun Wu, Gary J. Sullivan
  • Patent number: 11979432
    Abstract: Embodiments of the present disclosure are directed to a network analytic system for tracking and analysis of network infrastructure for network-based digital assets. The network analytic system can detect and track a relationship between assets based on one or more attributes related or shared between any given assets. The network analytic system can analyze network-based digital assets to determine information about a website (e.g., information about electronic documents, such as web pages) that has be used to detect phishing and other abuse of the website. The network analytic system can analyze data about network-based assets to determine whether any are being used or connected to use of unauthorized or malicious activity or known network-based assets. Based on the relationship identified, the network analytic system can associate or link assets together. The network analytic system may provide an interface to view data sets generated by the network analytic system.
    Type: Grant
    Filed: June 21, 2021
    Date of Patent: May 7, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Adam Hunt, Jonas Edgeworth, Chris Kiernan, Elias Manousos, David Pon
  • Patent number: 11979246
    Abstract: A technique facilitates interaction among meeting participants for a purpose of verifying meeting attendance. The technique includes the operations of: using a programmatic interface to query a data structure to discover first information regarding meetings that a user is scheduled to attend; using the programmatic interface to query the data structure to discover second information regarding participants of a particular meeting; generating a likelihood measure, based on the second information, that specifies a likelihood that the particular meeting will take place; displaying the first information, second information, and a representation of the likelihood measure in a user interface presentation; generating and presenting a graphical control that invites the user to take a computer-implemented action pertaining to the particular meeting; and, in response to activation of the graphical control, performing the computer-implemented action.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: May 7, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Mamta Debnath Kumar, Madrina Thapa
  • Patent number: 11979496
    Abstract: The present technology provides a method to regenerate secrets while a version of the system is operational, thus avoiding the loss of availability that would have resulted from a system shutdown. The technology described herein may work in a computing context that assigns a first secret in an active role and a second secret in the backup role. The technology described herein activates a second instance of the service with the key not being regenerated serving as the active key. The second instance is then moved to the production mode and the first version of the service is moved to the staging mode. A new secret is generated and then assigned to the first instance of the service while it runs in the staging mode. Once the secret rotation is complete, the primary service instance is then moved back to the production mode with the new key configuration.
    Type: Grant
    Filed: December 17, 2021
    Date of Patent: May 7, 2024
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Yongyu Chen, Wei Deng, Yizhong Wu, Minming Guo
  • Patent number: 11979418
    Abstract: Techniques are described herein that are capable of detecting potential malicious use of a resource management agent using a resource management log. The resource management log is analyzed. The resource management log logs API requests that request that a resource management system cause the resource management agent to perform respective operations. An anomalous operation is detected among the operations based at least in part on an identified API request satisfying one or more criteria associated with anomalous behavior. The identified API request requests that the resource management system cause the resource management agent, which is loaded on a machine and which enables the resource management system to remotely manage resources associated with the machine, to perform the anomalous operation. An alert is generated to notify a user of the potential malicious use of the resource management agent based at least in part on detection of the anomalous operation.
    Type: Grant
    Filed: June 8, 2021
    Date of Patent: May 7, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Johnathan Samuel Simon, Ram Haim Pliskin
  • Patent number: 11979835
    Abstract: A method of reducing power consumption of a first wireless communication device is described. A charge level of a battery associated with the first wireless communication device is monitored. A wireless communication session between the first wireless communication device and a second wireless communication device is maintained. Based at least in part on the charge level of the battery being within a low battery threshold range, a wireless signal strength associated with the wireless communication session is monitored. Based at least in part on the wireless signal strength reaching a power saving threshold that is above a minimum connection threshold for maintaining the wireless communication session, a power saving action associated with a wireless interface that supports the wireless communication session is performed.
    Type: Grant
    Filed: May 10, 2021
    Date of Patent: May 7, 2024
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Uday S. Hegde, Prateek Agrawal
  • Publication number: 20240145079
    Abstract: Biosensing measurements (e.g., heart rate, pupil size, cognitive load, stress level, etc.) are communicated in the context of events that occurred concurrently with the biosensing measurements. The biosensing measurements and the contextual events can be presented in real-time or as historical summaries. Such presentations allow users to easily gain useful insights into which specific events triggered which specific physiological responses in users. Therefore, the present concepts more effectively communicate insights that can be used to change user behavior, modify workflow, design improved products or services, enhance user satisfaction and wellbeing, increase productivity and revenue, and eliminate negative impacts on user's emotions and mental state.
    Type: Application
    Filed: October 31, 2022
    Publication date: May 2, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Aashish PATEL, Hayden HELM, Jen-Tse DONG, Siddharth SIDDHARTH, Weiwei YANG, Amber D. HOAK, David A. TITTSWORTH, Kateryna LYTVYNETS
  • Publication number: 20240144443
    Abstract: A method for automatically improving the legibility of text within graphic designs is implemented via a computing system including a processor. The method includes executing a graphics application and causing surfacing of a graphic design GUI on a display. The method includes generating a templatized image including text responsive to the user-initiated insertion of a desired image into a design template surfaced via the graphic design GUI. The method also includes assigning a legibility score to the text within the templatized image and, responsive to a determination that the legibility score is less than a predetermined threshold, generating a bounding box around the text area. The method further includes generating an improved templatized image with improved text legibility by selectively blurring the image portion that falls within the bounding box, as well as causing surfacing of the second templatized image via the graphic design GUI.
    Type: Application
    Filed: October 27, 2022
    Publication date: May 2, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Mrinal Kumar SHARMA, Atul SINGH, Cheshtha SINDHWANI
  • Publication number: 20240146955
    Abstract: Innovations in the area of prediction of block vector (“By”) values improve encoding or decoding of blocks using intra block copy (“BC”) prediction. For example, some of the innovations relate to use of a default BV predictor with a non-zero value. Other innovations relate to use of a selected one of multiple BV predictor candidates for a current block. Still other innovations relate to use of a skip mode in which a current intra-BC-predicted block uses a predicted BV value.
    Type: Application
    Filed: January 4, 2024
    Publication date: May 2, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Lihua Zhu, Gary J. Sullivan, Jizheng Xu, Sridhar Sankuratri, B. Anil Kumar, Feng Wu
  • Publication number: 20240143303
    Abstract: Systems and methods for deploying dependent updates include mechanisms for requiring that dependency information be provided for each update so that dependent updates may be identified. Update dependencies are tracked so that dependent updates are not deployed until parent updates have been completed. Deployment sequencing is implemented on top of existing asynchronous deployment policies so that asynchronous workflow remains intact and unaltered. The asynchronous workflow is upgraded to a synchronous (i.e., sequential) workflow for updates having dependencies to ensure that updates having dependencies are applied in the correct order.
    Type: Application
    Filed: October 26, 2022
    Publication date: May 2, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Dmitry Valentinovich KHOLODKOV, Rahul NIGAM, Nidhi VERMA
  • Publication number: 20240147663
    Abstract: A liquid-submersible thermal management system includes a cylindrical outer shell and an inner shell positioned in an interior volume of the outer shell. The cylindrical outer shell has a longitudinal axis oriented vertically relative to a direction of gravity, and the inner shell defines an immersion chamber. The liquid-submersible thermal management system a spine positioned inside the immersion chamber and oriented at least partially in a direction of the longitudinal axis with a heat-generating component located in the immersion chamber. A working fluid is positioned in the immersion chamber and at least partially surrounding the heat-generating component. The working fluid receives heat from the heat-generating component.
    Type: Application
    Filed: January 11, 2024
    Publication date: May 2, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Husam Atallah ALISSA, Ioannis MANOUSAKIS, Nicholas Andrew KEEHN, Eric C. PETERSON, Bharath RAMAKRISHNAN, Christian L. BELADY, Ricardo Gouvea BIANCHINI
  • Publication number: 20240144051
    Abstract: This document relates to automated generation of machine learning models, such as neural networks. One example method involves obtaining a first machine learning model having one or more first inference operations. The example method also involves identifying a plurality of second inference operations that are supported by an inference hardware architecture. The example method also involves generating second machine learning models by modifying the first machine learning model to include individual second inference operations that are supported by the inference hardware architecture. The example method also involves selecting a final machine learning model from the second machine learning models based on one or more metrics.
    Type: Application
    Filed: November 1, 2022
    Publication date: May 2, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Gilad KIRSHENBOIM, Ofer DEKEL, Shital SHAH, Debadeepta DEY, Segev RAVGAD
  • Publication number: 20240143387
    Abstract: Systems and methods are provided for handing off execution of an application from a local computing device to a cloud-based computing device. The disclosed technology is directed to determining whether and when to initiate handing off the execution of the application based on monitoring resource consumption of the local computing device. When the application is not previously installed on the cloud-based computing device, the local computing device transmits an application installer executable to the cloud-based computing device for enabling use of the same application on the cloud-based computing device.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Christiaan BRINKHOFF, Prasanna Chromepet PADMANABHAN, Sandeep PATNAIK
  • Publication number: 20240144049
    Abstract: A method for computer question answering includes, at a retriever subsystem of a question answering computer system, identifying a plurality of relevant text evidence strings for an input text question. At a linker subsystem of the question answering computer system, one or more of the plurality of relevant text evidence strings are associated with a respective secondary text evidence string to form a plurality of evidence chains via a previously-trained entity-linking machine-learning model. At a chainer subsystem of the question answering computer system, a ranked set of the evidence chains is identified based at least in part on an output of a generative machine-learning model applied to each of the plurality of evidence chains. At a reader subsystem of the question answering computer system, an answer to the input text question is output based at least in part on the ranked set of evidence chains.
    Type: Application
    Filed: October 5, 2022
    Publication date: May 2, 2024
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Hao CHENG, Xiaodong LIU, Jianfeng GAO, Kaixin MA