Patents Assigned to MICROSOFT TECHNOLOGIES LICENSING, LLC.
-
Publication number: 20240151998Abstract: A display assembly includes a display layer with a plurality of display elements to provide display light and form a display image. A first subset of display elements is used while the display assembly is operating in a full visibility mode, and a second subset of display elements is used while the display assembly is operating in a restricted visibility mode. A touch-sensitive layer includes a plurality of conductive traces disposed proximate to the display layer. The plurality of conductive traces are shaped and positioned to block a first portion of the display light while the display assembly is operating in the full visibility mode, and block a second, greater portion of the display light while the display assembly is operating in the restricted visibility mode. A visibility controller is used to switch the display assembly between the full visibility mode and the restricted visibility mode.Type: ApplicationFiled: November 4, 2022Publication date: May 9, 2024Applicant: Microsoft Technology Licensing, LLCInventors: Hyungsoo KIM, Samu Matias KALLIO, Ying ZHENG
-
Publication number: 20240152190Abstract: A computing device is provided, including one or more processing devices, one or more temperature sensors, a fan, and a fan tachometer. The one or more processing devices may be configured to execute an application program. While executing the application program, the one or more processing devices may be further configured to collect performance data including temperature data received from the one or more temperature sensors and fan speed data received from the fan tachometer. The one or more processing devices may be further configured to generate a fan control signal at least in part by applying a machine learning model to the performance data. The one or more processing devices may be further configured to control the fan according to the fan control signal.Type: ApplicationFiled: January 12, 2024Publication date: May 9, 2024Applicant: Microsoft Technology Licensing, LLCInventors: Nikita Ramesh WANJALE, David Michael SUTHERLAND, Jonathan Robert PEASE
-
Publication number: 20240152429Abstract: The description relates to enhancing computer performance, such as by decreasing latency associated with storage operations. One example can include recoverable processes. Each recoverable process can be configured to periodically write log records to individual storage partitions. Each log record includes a vector timestamp that describes the processes' dependencies on log records of other recoverable processes.Type: ApplicationFiled: November 4, 2022Publication date: May 9, 2024Applicant: Microsoft Technology Licensing, LLCInventors: Jonathan D. GOLDSTEIN, Philip A. BERNSTEIN, Soujanya PONNAPALLI, Jose M. FALEIRO, Peter Charles SHROSBREE
-
Publication number: 20240152205Abstract: Systems and methods disclosed herein are related to an intelligent UI element selection system using eye-gaze technology. In some example aspects, a UI element selection zone may be determined. The selection zone may be defined as an area surrounding a boundary of the UI element. Gaze input may be received and the gaze input may be compared with the selection zone to determine an intent of the user. The gaze input may comprise one or more gaze locations. Each gaze location may be assigned a value according to its proximity to the UI element and/or its relation to the UI element's selection zone. Each UI element may be assigned a threshold. If the aggregated value of gaze input is equal to or greater than the threshold for the UI element, then the UI element may be selected.Type: ApplicationFiled: January 17, 2024Publication date: May 9, 2024Applicant: Microsoft Technology Licensing, LLCInventors: Narasimhan RAGHUNATH, Austin B. HODGES, Fei SU, Akhilesh KAZA, Peter John ANSELL, Jonathan T. CAMPBELL, Harish S. KULKARNI
-
Publication number: 20240155136Abstract: Non-transform blocks of video content may be coded by selectively changing a scanning order. In some implementations, an encoder or decoder may perform a scanning process on a block according to a scanning order. When the block has not been transformed, the encoder or decoder may selectively change the scanning order to a different order. For example, if the block is associated with a particular type of prediction, the scanning order may be changed to a different order. In another example, if the non-transform block has a size that is smaller than a predetermined size, the scanning order may be changed to a different order.Type: ApplicationFiled: January 16, 2024Publication date: May 9, 2024Applicant: Microsoft Technology Licensing, LLCInventors: Xiulian Peng, Jizheng Xu
-
Patent number: 11977702Abstract: An apparatus and method for compensating the effect of a contact by a hand or other body part of a user with a touch screen while holding an input device on the strength of a capacitively coupled uplink signal provided to the input device by a host device, by detecting and/or discriminating the body touch and modifying at least one uplink channel parameter.Type: GrantFiled: February 17, 2021Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLC.Inventors: Ahia Peretz, On Haran, Adam Benjamin Meshi
-
Patent number: 11977474Abstract: An automated program repair tool utilizes a neural transformer model with attention to predict the contents of a bug repair in the context of source code having a bug of an identified bug type. The neural transformer model is trained on a large unsupervised corpus of source code using a span-masking denoising optimization objective, and fine-tuned on a large supervised dataset of triplets containing a bug-type annotation, software bug, and repair. The bug-type annotation is derived from an interprocedural static code analyzer. A bug type edit centroid is computed for each bug type and used in the inference decoding phase to generate the bug repair.Type: GrantFiled: November 25, 2022Date of Patent: May 7, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.Inventors: Shao Kun Deng, Neelakantan Sundaresan, Alexey Svyatkovskiy, Michele Tufano
-
Patent number: 11977513Abstract: Techniques of data flow control are disclosed herein. One example technique includes upon receiving a notification indicating a change to a content item in a source shard, parsing the content item to extract data representing attributes of the content item and identifying a partition of the system-wide index based on the extracted data representing the attributes of the content item. The example technique can also include transmitting, to a token issuer, a request for a token that represents a permission to write to the identified partition of the system-wide index and upon receiving a token issued by the token issuer in response to the transmitted request, transmitting the extracted data representing the attributes of the content item along with the received token to write the extracted data in the partition of the system-wide index.Type: GrantFiled: January 26, 2022Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLC.Inventors: Suyang Jiang, Serguei Vasilyevich Martchenko, Yuva Priya Arunkumar, Aigerim Shintemirova, Ariane Belle Tsai, Varadarajan Thiruvillamalai, Kidus Yohanes Sendeke
-
Patent number: 11979360Abstract: The present disclosure provides method and apparatus for responding in a voice conversation by an electronic conversational agent. A voice input may be received in an audio upstream. In response to the voice input, a primary response and at least one supplementary response may be generated. A primary voice output may be generated based on the primary response. At least one supplementary voice output may be generated based on the at least one supplementary response. The primary voice output and the at least one supplementary voice output may be provided in an audio downstream, wherein the at least one supplementary voice output is provided during a time period adjacent to the primary voice output in the audio downstream.Type: GrantFiled: October 25, 2018Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLCInventor: Li Zhou
-
Patent number: 11979318Abstract: The present application relates to egressing traffic from a public cloud network. An egress traffic manager configures routing at hosts and edge routers within the public cloud network. The egress traffic manager determines, for an edge router, a plurality of current border gateway protocol (BGP) sessions with external networks. The egress traffic manager configures a virtual router hosted on the edge router to route a portion of egress traffic to a selected one of the external networks via one of the BGP sessions. A host is configured to route the portion of egress traffic within the public cloud network to the edge router. An edge router configured to route, by the virtual router, the portion of egress traffic from the edge router to the selected one of the external networks.Type: GrantFiled: August 9, 2021Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Abhishek Udupa, Sharad Agarwal, Ryan Andrew Beckett, Rachee Singh, Paramvir Bahl
-
Patent number: 11977606Abstract: A computer implemented method includes obtaining multiple configuration files that include configuration commit histories, detecting patterns in parameter values in the configuration files to generate file-based rules for configuration parameters, detecting patterns in parameter values in the configuration files to generate history-based rules using commit histories for the configuration parameters, and exposing the rules to calling programs.Type: GrantFiled: August 31, 2021Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Ranjita Bhagwan, Sonu Mehta, Arjun Radhakrishna, Sahil Garg
-
Patent number: 11977785Abstract: The disclosed technologies provide functionality for non-volatile memory device-assisted live migration of virtual machine (“VM”) data. A host computing device (the “host”) requests that a source non-volatile memory device track changes to a namespace by a VM. In response thereto, the source device tracks changes made by the VM to the namespace and stores one or more data structures that identify the changed portions of the namespace. The host requests the data structures from the source device and requests the contents of the changed portions from the source device. The host then causes the data changed by the VM in the namespace to be written to a namespace on a target non-volatile memory device. The host can also retrieve the device internal state of a child physical function on the source device. The host migrates the retrieved device internal state to a child physical function on the target device.Type: GrantFiled: February 8, 2022Date of Patent: May 7, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Scott Chao-Chueh Lee, Lei Kou, Monish Shantilal Shah, Liang Yang, Yimin Deng, Martijn De Kort
-
Patent number: 11979376Abstract: A method of and system for utilizing an access token to authenticate a client device for accessing a resource server include generating a session key for a communication session between the device and a resource server, deriving a nonce from the session key, and transmitting a request to an identity platform for authenticating the device to access the resource server, where the request includes the nonce. Upon confirmation of authentication, the method and system may include receiving an access token from the identity platform, the access token including information that confirms authentication of the device, and transmitting the access token to the resource server to enable access to the resource server, where the access token includes the nonce.Type: GrantFiled: June 30, 2020Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Alan Thomas Gavin Jowett, Andrew Albert Hodgkinson, Lance Vernon Crandall, Jeffrey Scott Pinkston
-
Patent number: 11979600Abstract: Innovations in encoder-side search ranges having horizontal bias or vertical bias are described herein. For example, a video encoder determines a block vector (“BV”) for a current block of a picture, performs intra prediction for the current block using the BV, and encodes the BV. The BV indicates a displacement to a region within the picture. When determining the BV, the encoder checks a constraint that the region is within a BV search range having a horizontal bias or vertical bias. The encoder can select the BV search range from among multiple available BV search ranges, e.g., depending at least in part on BV values of one or more previous blocks, which can be tracked in a histogram data structure.Type: GrantFiled: January 23, 2023Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Lihua Zhu, Yongjun Wu, Gary J. Sullivan
-
Patent number: 11979601Abstract: Innovations in encoder-side search ranges having horizontal bias or vertical bias are described herein. For example, a video encoder determines a block vector (“BV”) for a current block of a picture, performs intra prediction for the current block using the BV, and encodes the BV. The BV indicates a displacement to a region within the picture. When determining the BV, the encoder checks a constraint that the region is within a BV search range having a horizontal bias or vertical bias. The encoder can select the BV search range from among multiple available BV search ranges, e.g., depending at least in part on BV values of one or more previous blocks, which can be tracked in a histogram data structure.Type: GrantFiled: January 23, 2023Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Lihua Zhu, Yongjun Wu, Gary J. Sullivan
-
Patent number: 11979418Abstract: Techniques are described herein that are capable of detecting potential malicious use of a resource management agent using a resource management log. The resource management log is analyzed. The resource management log logs API requests that request that a resource management system cause the resource management agent to perform respective operations. An anomalous operation is detected among the operations based at least in part on an identified API request satisfying one or more criteria associated with anomalous behavior. The identified API request requests that the resource management system cause the resource management agent, which is loaded on a machine and which enables the resource management system to remotely manage resources associated with the machine, to perform the anomalous operation. An alert is generated to notify a user of the potential malicious use of the resource management agent based at least in part on detection of the anomalous operation.Type: GrantFiled: June 8, 2021Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Johnathan Samuel Simon, Ram Haim Pliskin
-
Patent number: 11979246Abstract: A technique facilitates interaction among meeting participants for a purpose of verifying meeting attendance. The technique includes the operations of: using a programmatic interface to query a data structure to discover first information regarding meetings that a user is scheduled to attend; using the programmatic interface to query the data structure to discover second information regarding participants of a particular meeting; generating a likelihood measure, based on the second information, that specifies a likelihood that the particular meeting will take place; displaying the first information, second information, and a representation of the likelihood measure in a user interface presentation; generating and presenting a graphical control that invites the user to take a computer-implemented action pertaining to the particular meeting; and, in response to activation of the graphical control, performing the computer-implemented action.Type: GrantFiled: September 30, 2022Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Mamta Debnath Kumar, Madrina Thapa
-
Patent number: 11979496Abstract: The present technology provides a method to regenerate secrets while a version of the system is operational, thus avoiding the loss of availability that would have resulted from a system shutdown. The technology described herein may work in a computing context that assigns a first secret in an active role and a second secret in the backup role. The technology described herein activates a second instance of the service with the key not being regenerated serving as the active key. The second instance is then moved to the production mode and the first version of the service is moved to the staging mode. A new secret is generated and then assigned to the first instance of the service while it runs in the staging mode. Once the secret rotation is complete, the primary service instance is then moved back to the production mode with the new key configuration.Type: GrantFiled: December 17, 2021Date of Patent: May 7, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Yongyu Chen, Wei Deng, Yizhong Wu, Minming Guo
-
Patent number: 11978020Abstract: The technology described herein visibly depicts hidden message traits to help users determine whether an email is genuine or deceptive. The hidden message traits are revealed by identifying and changing attributes that keep the hidden traits from being displayed in a rendered message. Spam messages, phishing messages, and messages that include or link to malicious programs (e.g., malware, ransomware) are examples of unwanted messages that can harm a recipient. These messages often rely on deception to get past email filtering systems and to trick a user into acting on content in a message. The deception often involves including hidden traits in a message that fool an automated filtering system. The technology described herein shows the visible traits to a user by including them in the rendered version of the message.Type: GrantFiled: June 10, 2021Date of Patent: May 7, 2024Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventor: Weisheng Li
-
Patent number: 11979835Abstract: A method of reducing power consumption of a first wireless communication device is described. A charge level of a battery associated with the first wireless communication device is monitored. A wireless communication session between the first wireless communication device and a second wireless communication device is maintained. Based at least in part on the charge level of the battery being within a low battery threshold range, a wireless signal strength associated with the wireless communication session is monitored. Based at least in part on the wireless signal strength reaching a power saving threshold that is above a minimum connection threshold for maintaining the wireless communication session, a power saving action associated with a wireless interface that supports the wireless communication session is performed.Type: GrantFiled: May 10, 2021Date of Patent: May 7, 2024Assignee: Microsoft Technology Licensing, LLCInventors: Uday S. Hegde, Prateek Agrawal