Patents Assigned to Microsoft Technology Licensing
  • Patent number: 9736655
    Abstract: In embodiments of mobile device safe driving, a mobile device can display a device lock screen on an integrated display device, and transition from the device lock screen to display a driving mode lock screen. The transition to display the driving mode lock screen occurs without receiving a PIN code entered on the device lock screen. The mobile device implements a safe driving service that is implemented to activate a safe driving mode of the mobile device, and disable features of the mobile device while the safe driving mode is activated.
    Type: Grant
    Filed: May 2, 2016
    Date of Patent: August 15, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Joseph A. Schrader, Raman K. Sarin, Ted Tai-Yu Chen, Sharad Agarwal, Joseph H. Matthews, III, Shai Guday, Joseph Spencer King
  • Patent number: 9734637
    Abstract: Techniques are described herein that are capable of generating a virtual rig for animation of a virtual 3D representation (e.g., an avatar) of an object. Semantic identifiers are associated with vertices of the virtual 3D representation. Each of the semantic identifiers specifies a respective feature of the object. The virtual rig is generated based on association of the semantic identifiers with the respective vertices. The virtual rig is capable of maneuvering the mesh to multiple configurations to animate the virtual 3D representation. In an example, the semantic identifiers may be used to generate and/or place virtual items in combination with the mesh. In another example, the semantic identifiers may be used to define reference elements. The reference elements serve as references for maneuvering respective portions of the mesh and/or virtual items that are associated with those portions.
    Type: Grant
    Filed: December 6, 2010
    Date of Patent: August 15, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Royal D. Winchester
  • Patent number: 9736050
    Abstract: Keep alive management techniques are described. In one or more implementations, a keep alive interval is calculated by an operating system of the computing device. The keep alive interval is used to maintain one or more notification channels between one or more applications of the computing device and a network.
    Type: Grant
    Filed: July 22, 2016
    Date of Patent: August 15, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Srinivas Raghu Gatta, Kamalavasan Srinivasan, Osman N. Ertugay, David G. Thaler, Dmitry A. Anipko, Jeroen Vanturennout, Mohammad Saifur Rahman, Poornananda R. Gaddehosur
  • Patent number: 9734264
    Abstract: The claimed subject matter includes techniques for designing three-dimensional (3D) objects for fabrication. An example method includes obtaining a three-dimensional (3D) mesh comprising polygons and obtaining a two-dimensional (2D) image. The method also includes receiving position information describing a location of the 2D image relative to the 3D mesh and modifying the 3D mesh based on the 2D image and the position information to generate an embossed 3D mesh that is embossed with the 2D image.
    Type: Grant
    Filed: August 20, 2014
    Date of Patent: August 15, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Kristofer N. Iverson, Vladimír {hacek over (S)}i{hacek over (s)}olák, Ján Jakubovi{hacek over (c)}, Martin Ku{hacek over (s)}nier, Anton Mateasik, Milos Bazelides, Jesse McGatha, Yulin Jin
  • Publication number: 20170230450
    Abstract: Obligatorily-acquired digital content items are stored under service control in one or more local storage machines of a computer based on service commands provided by a centralized management service; and voluntarily-acquired digital content items are stored under user control in the one or more local storage machines of the computer based on user commands. The obligatorily-acquired digital content items are protected from user-commanded deletion. The obligatorily-acquired digital content items are deleted from the one or more local storage machines based on service commands provided by the centralized management service. However, the voluntarily-acquired digital content items are deleted from the one or more local storage machines based on user commands.
    Type: Application
    Filed: April 27, 2017
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Alexander Burba, Brandon Hunt, Michael Gallop, Scott Rosemund, Frank R. Morrison, III, Mark J. McNulty, Nima Ganjeh
  • Publication number: 20170230356
    Abstract: Various embodiments are disclosed that relate to security of a computer accessory device. For example, one non-limiting embodiment provides a host computing device configured to conduct an initial portion of a mutual authentication session with an accessory device, and send information regarding the host computing device and the accessory device to a remote pairing service via a computer network. The host computing device is further configured to, in response, receive a pairing certificate from the remote pairing service, the pairing certificate being encrypted via a private key of the remote pairing service, and complete the mutual authentication with the accessory device using the pairing certificate from the remote pairing service.
    Type: Application
    Filed: April 24, 2017
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Harish Krishnamurthy, Ming Zhu, Kurt Torben Nielsen, Matthew Morris
  • Publication number: 20170228182
    Abstract: Techniques for implementing container credentialing by a host are described herein. In one example, a system for providing credentials includes a memory device for storing instructions and a processing device for executing instructions. The system can also include a container to execute a runtime environment for an application through the memory device and processing device, the application to request access to a credential locked resource. The system can also include a host environment to share the memory and the processing device with the container. In an example, the host environment may detect a request for a credential for the credential locked resource from the container. In an example, the host environment may also provide a credential for a credential locked resource to the container if the container is approved to receive the credential based on a policy.
    Type: Application
    Filed: May 24, 2016
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Mark Novak, Benjamin Moore
  • Publication number: 20170228899
    Abstract: Performance and capability improvements of computer devices that provide digital images of heatmap visualizations for datasets are provided via both systems and methods. A value-color spectrum is correlated to the dataset via a multi-pass rendering. The multi-pass rendering yields a two-channel mask, which is applied to a map to show the dataset in a heatmap visualization on that map, and may be continually used as the map is manipulated by a user. User interface tools are also provided to enable a user to specify a custom value-color spectrum, how the dataset is to be aggregated, the area of effect for a data point in the visualization, the strength of effect for a data point in the visualization, and which specifies how a dataset will be visually represented in a heatmap.
    Type: Application
    Filed: June 30, 2016
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC.
    Inventors: Daniel Benjamin Witriol, Matthew W. Asplund, Lewey Alec Geselowitz, Igor Borisov Peev, Ehab Sobhy Deraz
  • Publication number: 20170230551
    Abstract: A camera includes a sensor array including a plurality of individually addressable sensor elements, each of the plurality of sensor elements responsive to incident light over a broad wavelength band. Covering the sensor array is a light valve switchable electronically between closed and open states. The light valve is configured to, in the closed state, block light of a stopband and transmit light outside the stopband, and, in the open state, transmit the light of the stopband. An electronic controller of the camera is configured to switch the light valve from the closed to the open state and, synchronously with switching the light valve, address the sensor elements of the sensor array.
    Type: Application
    Filed: February 10, 2016
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Onur Can Akkaya, Cyrus Bamji, Arrigo Benedetti, Michael S. Fenton, Jayachandra Gullapalli
  • Publication number: 20170228465
    Abstract: A set of user interfaces is provided to an administrator of a website. The user interfaces enable the administrator to configure search functionality of the website to present different types of search results differently. For instance, the administrator can use the user interfaces to configure the search functionality to present different properties for search results belonging to different result types.
    Type: Application
    Filed: April 27, 2017
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Charles Keller Smith, Jonathan Thomas Campbell, Zhenguang Chen, Arun Keller Krishnamoorthy, Boxin Li, Charles Reeves Little, II, Viktoriya Taranov, Brian William Timm, Andrew Joseph Violino
  • Publication number: 20170228036
    Abstract: A multimedia entertainment system combines both gestures and voice commands to provide an enhanced control scheme. A user's body position or motion may be recognized as a gesture, and may be used to provide context to recognize user generated sounds, such as speech input. Likewise, speech input may be recognized as a voice command, and may be used to provide context to recognize a body position or motion as a gesture. Weights may be assigned to the inputs to facilitate processing. When a gesture is recognized, a limited set of voice commands associated with the recognized gesture are loaded for use. Further, additional sets of voice commands may be structured in a hierarchical manner such that speaking a voice command from one set of voice commands leads to the system loading a next set of voice commands.
    Type: Application
    Filed: April 28, 2017
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Christian Klein, Ali M. Vassigh, Jason S. Flaks, Vanessa Larco, Thomas M. Soemo
  • Publication number: 20170228061
    Abstract: A touch-sensitive display device includes a touch sensor, drive circuitry and receive circuitry. The touch sensor has a matrix of row electrodes and column electrodes. The drive circuitry drives the row electrodes during a touch-sensing frame to influence electrical conditions on the column electrodes. The receive circuitry, during the touch-sensing frame, for each row electrode of the matrix, measures a capacitance of each column electrode while the row electrode is being driven, for each of a plurality of different sections of column electrodes of the matrix, performs local analysis of the measured capacitances of the column electrodes of the section to estimate a row-specific noise capacitance for each column electrode, and determines a touch input based on a difference between the measured capacitance of the column electrode while the row electrode is being driven and the estimated row-specific noise capacitance of the column electrode.
    Type: Application
    Filed: February 10, 2016
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Tianzhu Qiao, Jonathan Westhues
  • Publication number: 20170228184
    Abstract: Embodiments provide a method and system for enabling access to a storage device. Specifically, a node may request admittance to a cluster that has read and write access to a storage device. The node seeking access to the storage device must be first be approved by other nodes in the cluster. As part of the request, the node seeking access to the storage device sends a registration key to a storage device. Upon expiration of a registration timer, the node seeking access to the storage device receives a registration table from the storage device and determines whether its registration key is stored in the registration table. If the registration key is stored in the registration table the node has been accepted in the cluster and as a result, has been granted read and write access to the storage device.
    Type: Application
    Filed: April 28, 2017
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Vyacheslav Kuznetsov, Vinod R. Shankar, Andrea D'Amato, David Allen Dion
  • Publication number: 20170228240
    Abstract: The present disclosure describes a system for responding to a user input and for providing a contextually-related communication related to the user input. The system receives an input from the user, determines contextual information about the input and generates a response to the input. The system also generates a contextually-related communication, where the contextually-related communication are based on the contextual information and can be based on user-specific information. The response to the input and the contextually-related communication are provided to the user. The system can also identify domains related to the input and use those domains in preparation of the contextually-related communication. The system can also present new system capabilities to the user after providing the response to the input.
    Type: Application
    Filed: February 5, 2016
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Omar Zia Khan, Ruhi Sarikaya
  • Publication number: 20170228223
    Abstract: A type system includes a dual representation for basic data types. One representation is the basic data type representation common to such basic built-in data types, known as an unboxed value type or simply as a value type. Each of the basic data types also has a boxed representation that can be stored in the object hierarchy of the type system. This dual representation can also be extended to user-defined types, so that user-defined types may exist both as an unboxed value type and as an object within the object hierarchy of the type system. This dual representation allows the compiler and/or runtime environment to select the most effective and efficient representation for the data type depending on the particular need at the moment.
    Type: Application
    Filed: April 20, 2017
    Publication date: August 10, 2017
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: George H. Bosworth, Patrick H. Dussud, James S. Miller, Daryl B. Olander
  • Patent number: 9727535
    Abstract: Embodiments of the present disclosure provide a method and system for authoring a presentation with electronic ink data. Specifically, embodiments disclosed herein provide for receiving touch input and identifying type object(s) of presentation data that correspond to the received touch input. A layout may then be identified, in certain embodiments, corresponding to the touch input. A presentation is then generated based on the received touch input, identified type objects, and identified layout. The presentation data is then displayed.
    Type: Grant
    Filed: June 11, 2013
    Date of Patent: August 8, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Christopher Maloney, Onur Onder
  • Patent number: 9727445
    Abstract: A web application intended to be called by a cloud service is debugged locally in a developer's machine. A debugging session is configured to initiate execution of the web application in its intended cloud context by utilizing a reverse proxy mechanism to forward network traffic from a calling cloud service to the developer's machine. In a first embodiment, an integrated development environment (IDE) is able to establish a connection with the reverse proxy mechanism during the debugging session. In a second embodiment, a separate process is used to establish the connection with the reverse proxy mechanism where the separate process is outside of the IDE.
    Type: Grant
    Filed: November 9, 2013
    Date of Patent: August 8, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC.
    Inventors: Iouri Simernitski, Doug Bunting, David Zhao, Chakkaradeep Chinnakonda Chandran
  • Patent number: 9727136
    Abstract: Examples relating calibrating an estimated gaze location are disclosed. One example method comprises monitoring the estimated gaze location of a viewer using gaze tracking data from a gaze tracking system. Image data for display via a display device is received and, without using input from the viewer, at least one target visual that may attract a gaze of the viewer and a target location of the target visual are identified within the image data. The estimated gaze location of the viewer is compared with the target location of the target visual. An offset vector is calculated based on the estimated gaze location and the target location. The gaze tracking system is calibrated using the offset vector.
    Type: Grant
    Filed: May 19, 2014
    Date of Patent: August 8, 2017
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Weerapan Wilairat, Vaibhav Thukral, David Nister, Morgan Kolya Venable, Bernard James Kerr, Chris Aholt
  • Patent number: 9730133
    Abstract: Techniques for synthetic transaction for wireless handover are described. According to various embodiments, a synthetic transaction is utilized to determine a signal quality of a wireless network. Based on the signal quality, a decision is made whether to perform a handover of a communication session to a wireless network.
    Type: Grant
    Filed: May 15, 2015
    Date of Patent: August 8, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: Amer Aref Hassan
  • Patent number: 9727465
    Abstract: A method to monitor the behavior of a working set cache of a full data set at run time and determine whether it provides a performance benefit is disclosed. An effectiveness metric of the working set cache is tracked over a period of time by efficiently computing the amount of physical memory consumption the cache saves and comparing this to a straightforward measure of its overhead. If the effectiveness metric is determined to be on an ineffective side of a selected threshold amount, the working set cache is disabled. The working set cache can be re-enabled in response to a predetermined event.
    Type: Grant
    Filed: April 15, 2014
    Date of Patent: August 8, 2017
    Assignee: Microsoft Technology Licensing, LLC
    Inventor: David J. Hiniker-Roosa