Patents Assigned to Microsoft
-
Publication number: 20100091995Abstract: The claimed subject matter provides systems and/or methods that effectuate a simple protocol for tangible security on mobile devices. The system can include devices that generate sets of keys and associated secret identifiers, employs the one or more keys to encrypt a secret and utilizes the identifiers and encryptions of the secret to populate a table associated with a security token device that is used in conjunction with a mobile device to release sensitive information persisted on the mobile device for user selected purposes.Type: ApplicationFiled: October 13, 2008Publication date: April 15, 2010Applicant: MICROSOFT CORPORATIONInventors: Yuqun Chen, Michael J. Sinclair, Josh Benaloh
-
Publication number: 20100095284Abstract: A program entity that generates code but that does not perturb global state is identified. Code produced by the identified program entity can be assigned an identifier and cached the first time it is executed. Subsequent executions of the program entity can eliminate generation of the code and/or translation of the generated code into native binary code. The runtime generated code and native binary code can be cached in a machine-wide cache, or can be added to the metadata of the assembly generated from the source code of the program entity.Type: ApplicationFiled: October 15, 2008Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Nathan Herring, David C. Wrighton
-
Publication number: 20100092007Abstract: This disclosure describes techniques of automatically identifying a direction of a speech source relative to an array of directional microphones using audio streams from some or all of the directional microphones. Whether the direction of the speech source is identified using audio streams from some of the directional microphones or from all of the directional microphones depends on whether using audio streams from a subgroup of the directional microphones or using audio streams from all of the directional microphones is more likely to correctly identify the direction of the speech source. Switching between using audio streams from some of the directional microphones and using audio streams from all of the directional microphones may occur automatically to best identify the direction of the speech source. A display screen at a remote venue may then display images having angles of view that are centered generally in the direction of the speech source.Type: ApplicationFiled: October 15, 2008Publication date: April 15, 2010Applicant: MICROSOFT CORPORATIONInventor: Xinding Sun
-
Publication number: 20100095272Abstract: A data set may be managed by a host that provides access to clients through a protocol, such as a RESTful HTTP interface. A resource script may be expressed according to a script language featuring two types of instructions: data set instructions that correspond to the verbs of the protocol, and flow control instructions that alter the flow of execution of the resource script. At runtime, an execution context for the resource script may be selected as a local execution context (through a local script processor that issues protocol verbs to the host based on the data set operations) or a remote execution context (by sending the resource script to a script processor located on the host.) The runtime selection of data context may be executed without having to reconfigure the resource script, and with an equivalent effect on the data set.Type: ApplicationFiled: October 14, 2008Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Dharma Shukla, Aditya Bhandarkar, Ori Amiga, Raymond Endres, Abhay Parasnis
-
Publication number: 20100093379Abstract: A unified messaging system allows the receipt and sending of different messages across devices is established by creating relationships that leverage the capabilities of different devices. A message server establishes a relationship with a mobile device. Through the relationship, the message server can use the mobile device to send different types of messages that the server computer cannot transmit. A relationship between a client and a server extends this capability to the client. Through these relationships, a client can retrieve mobile device messages as well as generate them. The generated mobile device messages are transmitted to the message server. The message server determines that the received messages are mobile device messages that the server cannot deliver and sends the mobile device messages to the user's mobile device. The mobile device receives the mobile device messages from the message server and transmits the mobile device message to recipient mobile devices.Type: ApplicationFiled: October 13, 2008Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Samuel J. Neely, John Allen Atwood, Harvinder S. Bhela, Selvaraj Nalliah, David. P. Limont, Katy Chen, Omar Aftab, Juan Vicente Esteve Balducci
-
Publication number: 20100094912Abstract: The present invention extends to methods, systems, and computer program products for preserving user intention in distributed data systems. Embodiments of the invention preserve user intention when different copies of the same data are independently edited at different locations. User intent can be preserved without centralized locking or other coordination. Thus, modifications to each copy of the date are appropriately reflected in all other copies of the data such that all copies end up in essentially the same state. Embodiments of the invention can be used in collaborative editing and data replication systems.Type: ApplicationFiled: October 15, 2008Publication date: April 15, 2010Applicant: Microsoft CorporationInventor: Pavel Curtis
-
Publication number: 20100095120Abstract: Techniques are provided to allow remote initialization of a Trusted Platform Module. The results may be trusted and confidential even if the target device has malicious operating system or other software running.Type: ApplicationFiled: October 10, 2008Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Stefan Thom, Kevin M. Litwack, Shon Eizenhoefer, Erik L. Holt, Yash Gandhi
-
Publication number: 20100094906Abstract: Modular forest automata (MFA) provide a unified description of partially-ordered regular tree patterns. MFAs provide simple methods for determinization, sub-typing, intersection, and complementation of these patterns. MFAs support high-performance pattern analysis and matching. Modular forest transducers, in conjunction with modular forest automata, enable compilers to place semantic actions on any state transition while supporting efficient transformation of labeled, directed graphs.Type: ApplicationFiled: September 30, 2008Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Giovanni M. Della-Libera, Steven E. Lucco
-
Publication number: 20100094915Abstract: A palette of representations that can be generated by an application for database, spreadsheet, word processing, and the like, is provided in response to a request for a new object within the application. If the application already has one or more objects open at the time of the request, the representations are also determined based on the context of the data such as from any currently open object(s). The new object is then generated based on the selected representation from the palette, the context of the data, and a structure of data consumed by the application. The layout parameters for the new object are automatically set based on the current context, the structure of the data, and the selected representation.Type: ApplicationFiled: December 17, 2009Publication date: April 15, 2010Applicant: MICROSOFT CORPORATIONInventors: Zachary P. Woodall, Dan Hough, Kumar Srinivasamurthy, Nishant Kumar, Pavel R. Karimov, Stephen I. Lesser, Clinton Covington, Michael J. McCormack, Christopher W. Bryant
-
Publication number: 20100095083Abstract: A method for selectively utilizing a plurality of disparate solid state storage locations is disclosed. The technology initially receives class types for a plurality of disparate solid state storage locations. The characteristics of the received data are determined. The received data is then allocated to one of the plurality of disparate solid state storage locations based upon the determined characteristics of the received data.Type: ApplicationFiled: December 16, 2009Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Bohdan Raciborski, Dilesh Dhokia, Bhrighu Sareen
-
Publication number: 20100091254Abstract: A light guide of the tapered-waveguide type includes an input slab (30) for expanding a projected image between an input end and an output end (40); and a tapered output slab (10) arranged to receive rays from the said output end of the input slab, and to emit them at a point on its face that corresponds to the angle at which the ray is received. The taper is calculated so that all rays injected into the input end undergo the same number of reflections before leaving the output face. The thickness of the input slab light guide (30) is greater in the transverse direction away from the centre line C, so that light travelling at the critical angle from the input face of the slab waveguide towards the output waveguide (10) bounces the same number of times in the input slab, regardless of its fan-out angle, in order to further reduce image distortion.Type: ApplicationFiled: October 2, 2007Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Adrian Travis, Timothy Andrew Large, Neil Emerton
-
Publication number: 20100095224Abstract: A method and computer-readable medium are provided for navigation between attachments to electronic mail messages. According to the method, a list of e-mail messages is displayed that includes header information associated with each of the messages. When one of the messages in the list is selected, a determination is made as to whether the selected message has attachments. If the selected message has attachments, an identifier is displayed adjacent to the header information for each attachment. The identifier indicates that the attachment is associated with the selected message and may provide other information such as the type and size of the attachment. The identifiers are displayed in a manner to indicate clearly to a user that the attachments are associated with the selected e-mail message. The identifiers may be selected to preview the corresponding attachment.Type: ApplicationFiled: December 16, 2009Publication date: April 15, 2010Applicant: MICROSOFT CORPORATIONInventors: Rebekah Yozell-Epstein, Aaron Hartwell, Hernan Savastano, Erich S. Finkelstein
-
Publication number: 20100094900Abstract: Defining a content package having media files and table of contents (TOC) data. The content package includes physical representation data and logical representation data for the media files (e.g., stored in the TOC data). Computing devices store, download, and play back the media files based on the data in the content package. Presentations (e.g., collections of files) within the content package are available for extraction based on a configuration of a media player. The media files are provided for presentation to a user of the computing device, or for storage by the computing device.Type: ApplicationFiled: June 9, 2009Publication date: April 15, 2010Applicant: Microsoft CorporationInventor: Robert K. Hughes, JR.
-
Publication number: 20100093310Abstract: A deployable computing environment may facilitate interaction and data sharing between users and devices. Users, devices, and relationships between the users and devices may be represented within the deployable computing environment. A relationship between a user and a device may specify that the device is owned by the user and that the device is authorized to perform operations within the deployable computing environment on behalf of the user. Secure authentication of devices and users for interaction within the deployable computing environment is achieved by authenticating tickets corresponding to the user, the device, and the relationship. A device identification ticket and a user identification ticket are used to authenticate the device and user for interaction within the deployable computing environment. A device claim ticket allows the device to perform delegated operations (e.g., data synchronization, peer connectivity, etc.) on behalf of the user without the user's credentials (e.g.Type: ApplicationFiled: October 9, 2008Publication date: April 15, 2010Applicant: Microsoft CorporationInventors: Abolade Gbadegesin, Dharma K. Shukla, Thomas A. Galvin, David R. Reed, Nikolay Smolyanskiy, Eric Fleischman, Roman Batoukov
-
Publication number: 20100094991Abstract: A usage data collection and evaluation mechanism may collect usage information from various sources and summarize the usage information to determine a role for a system. The role and usage information may be transmitted to a centralized server for aggregation and analysis. The collection and transmission of usage data may be governed by and conform to a privacy agreement and may be collected when an end user agrees to such collection. Role determination may be performed using data collected from a single device, multiple devices, or from a network monitoring system. The usage data collection and evaluation mechanism may determine an installed role base and any changes in the installed role base since a previous report.Type: ApplicationFiled: October 15, 2008Publication date: April 15, 2010Applicant: MICROSOFT CORPORATIONInventors: Ashish Parikh, Henry Lyons, Michael Van Snellenberg, Olga Ivanova, Rahul Chabukswar, Rohan Lam
-
Publication number: 20100094800Abstract: Methods and apparatus for evaluating decision trees on a GPU are described. In an embodiment, the structure of a decision tree is converted into a 2D “tree” array with each row representing a node in the tree. Each row comprises details of any child nodes and the parameters which are required to perform the binary test at the node. A pixel shader can then be used to evaluate the decision tree in parallel for each input data point in an input array by navigating through rows in the 2D tree array. For each row, data is read from the input array dependent upon the parameters in the row and the shader moves to another row dependent upon the result of the binary test. On reaching a row which represents a leaf node, the pixel shader outputs evaluation results, such as a leaf node index or a probability distribution over classes.Type: ApplicationFiled: October 9, 2008Publication date: April 15, 2010Applicant: Microsoft CorporationInventor: Toby Sharp
-
Publication number: 20100094809Abstract: Techniques to manage retention policy tags are described. A system may comprise a tagging component operative to tag a message with an expiration tag to form an expiration tagged message, the expiration tag having expiration information used to expire the expiration tagged message in accordance with a retention policy. The system may further comprise a presentation component communicatively coupled to the tagging component, the presentation component operative to present a view of the expiration tagged message with an expiration field having the expiration information for the expiration tagged message. Other embodiments are described and claimed.Type: ApplicationFiled: September 25, 2008Publication date: April 15, 2010Applicant: MICROSOFT CORPORATIONInventors: Ashish Consul, Harvey Rook, Rajasi Saha, Andrew Sullivan, Galen Elias, Julian Zbogar-Smith
-
Patent number: 7696866Abstract: A sensor monitoring system is described that identifies inaccurate or degraded sensor data and corresponding sensors. The system analyzes a plurality of sensors to determine reliable sensors and isolate or reinterpret unreliable sensor data. An analysis component analyzes a traffic representation that varies as context varies and determines the probability that current sensor data is invalid. Learning and reasoning are performed from a case library of sensor failure data to build predictive models of sensor health that can provide inferences about the output of sensors. Resulting inferences about sensor reliability can be employed in base-level inferences and predictions about traffic flow.Type: GrantFiled: June 28, 2007Date of Patent: April 13, 2010Assignee: Microsoft CorporationInventor: Eric J. Horvitz
-
Patent number: 7698332Abstract: A method and system for projecting queries and images into a similarity space where queries are close to their relevant images is provided. A similarity space projection (“SSP”) system learns a query projection function and an image projection function based on training data. The query projection function projects the relevance of the most relevant words of a query into a similarity space and the image projection function projects the relevance to an image of the most relevant words of a query into the same similarity space so that queries and their relevant images are close in the similarity space. The SSP system can then identify images that are relevant to a target query and queries that are relevant to a target image using the projection functions.Type: GrantFiled: March 13, 2006Date of Patent: April 13, 2010Assignee: Microsoft CorporationInventors: Tie-Yan Liu, Tao Qin, Wei-Ying Ma
-
Patent number: D613756Type: GrantFiled: April 29, 2009Date of Patent: April 13, 2010Assignee: Microsoft CorporationInventors: Samuel J. Moreau, Mike Pell, Lindsey R. Barcheck, Kieran M. Phelan, Ginger J. Gloystein, Martin J. Hall, Denise Michele Trabona