Microsoft Patents
Microsoft Corporation develops, licenses, and supports a wide range of software products, services, and devices, including the Windows operating system, Microsoft Office application suite, Windows Phone operating system, Xbox game console platform, Windows Server, Windows SQL Server and Microsoft Azure cloud platform.
Microsoft Patents by Type- Microsoft Patents Granted: Microsoft patents that have been granted by the United States Patent and Trademark Office (USPTO).
- Microsoft Patent Applications: Microsoft patent applications that are pending before the United States Patent and Trademark Office (USPTO).
-
Patent number: 12259921Abstract: This disclosure relates to a content cluster system that provides a framework for leveraging large language models (LLMs) to tag content items (e.g., interactive multimedia content items, such as gaming content items) with attribute tags and, based on attribute tags for related content items, generating cluster descriptions of a cluster of content items. Features of the content cluster system involve tagging content items, determining multi-dimensional embeddings for the content items, and clustering the content items based on proximity of values contained within the multi-dimensional embeddings. The content cluster system may further utilize the LLM to generate one or more cluster descriptions based on the associated tags to create a more creative and dynamic representation of related groupings of titles (e.g., gaming titles). By utilizing LLMs and machine learning resources, the content cluster system provides a scalable approach to conventional approaches in determining and presenting groupings of titles.Type: GrantFiled: December 5, 2023Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Jennifer Rose Guriel, Abdelrahman Khaled Abdo Mohamed, Mingqi Wu, Gershom Payzer, Christopher Ian Charla, Madeline Jaye Whisenant, Bridgette Marie Kuehn, Jianxun Lian, Licheng Pan
-
Patent number: 12259854Abstract: A metafolder system manages a graph that identifies activities that are performed with respect to digital cards and that identifies relationships among the digital cards. The digital cards from a plurality of different locations in the de-centralized data storage system architecture can be aggregated for projection as coming from a single virtual location.Type: GrantFiled: June 13, 2022Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Salil Das, Peter Loren Engrav, Cezar Augusto Alevatto Guimaraes Neto, Daniel Gabriel Zarzar, Forest Woodcroft Gouin
-
Patent number: 12261733Abstract: A resilient incident management system is provided that continues operation when certain outages occur. An RSS feed is utilized to indicate incident-related information despite the certain outages. In an embodiment, the incident management system includes a redundant architecture that comprises a traffic manager and a backup traffic manager. The incident management system receives a client request for incident-related information and determines a priority level or a performance level of end points associated with the request. Based on a status of the traffic manager and the backup traffic manager, as well as based on the priority level or the performance level, the incident management system causes a computer operation to be executed via the redundant architecture to retrieve a response from a producer and generate the RSS feed.Type: GrantFiled: January 31, 2023Date of Patent: March 25, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Shantanu Uddhav Deshmukh, Prasanna Kumar Padmanabhan, Gregory C J Chang
-
Patent number: 12259774Abstract: A method of thermal and power control in a computing device includes, at the computing device, initializing a thermal module of the computing device, receiving data at the thermal module from a first component assigned to an interface of the thermal module, and sending an output to a second component from the thermal module based on the data. Initializing the thermal module includes detecting a presence of a plurality of potential components of the computing device; querying each of the plurality of potential components to determine capabilities of each component; in response to the querying, for each of at least a subset of the plurality of potential components receiving identification information for the component and, based on the received identification information, configuring one or more interfaces of the plurality of predefined interfaces of the thermal module to establish communication with the sub set of components.Type: GrantFiled: December 5, 2023Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Mika Juhani Rintamaeki, Gregory Allen Nielsen, Rajagopal K. Venkatachalam, Ajit Justin, Francisco Cantu De La Garza
-
Patent number: 12260338Abstract: A transformer-based neural network includes at least one mask attention network (MAN). The MAN computes an original attention data structure that expresses influence between pairs of data items in a sequence of data items. The MAN then modifies the original data structure by mask values in a mask data structure, to produce a modified attention data structure. Compared to the original attention data structure, the modified attention data structure better accounts for the influence of neighboring data items in the sequence of data items, given a particular data item under consideration. The mask data structure used by the MAN can have static and/or machine-trained mask values. In one implementation, the transformer-based neural network includes at least one MAN in combination with at least one other attention network that does not use a mask data structure, and at least one feed-forward neural network.Type: GrantFiled: August 27, 2020Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Jian Jiao, Yeyun Gong, Nan Duan, Ruofei Zhang, Ming Zhou
-
Patent number: 12259935Abstract: A computing device executing software displays a view of a search assignment in a user interface to a learning platform. The device receives user input comprising search terms associated with the search assignment, and generates queries based on the user input. The device submits the queries to a search engine, whereupon the search engine performs searches based on the queries, and the device displays the results. As a user evaluates resources provided in the results, the device updates the user interface to include an option selectable for adding evaluated ones of the resources to a collection of resources for the search assignment. In response to the user selecting the option with respect to a resource of the evaluated ones of the resources, the device adds the resource to the collection of resources.Type: GrantFiled: December 30, 2022Date of Patent: March 25, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Michael Tholfsen, Paul Ronald Ray, Jonathan Thomas Grudin, Sadiq Dhafir Alkhalili, Jason James Geiger
-
Patent number: 12259770Abstract: A method is presented for selectively throttling subsystems of a battery-powered computing device. The method comprises determining an amount of power consumed a plurality of rest-of-platform (ROP) subsystems of the battery-powered computing device. A total amount of power consumed by subsystems of a battery-powered computing device is determined. The subsystems including at least a system on a chip (SOC) and the plurality of ROP subsystems. Responsive to recognizing a condition where the amount of power consumed by the plurality of ROP subsystems is above an ROP power threshold, and where the total amount of power consumed increases above a first throttling threshold, one or more ROP subsystems are throttled.Type: GrantFiled: February 23, 2023Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Donghwi Kim, Gregory Allen Nielsen
-
Patent number: 12259960Abstract: Permitting a claims holder to get a limited verifiable credential leveraging off of a previously-issued verifiable credential. This is done by having the limited verifiable credential include only a selected subset of the verifiable claims present within the previously-issued verifiable credential. The limited verifiable credential may then be exposed to a relying entity computing system so that the relying entity computing system can verify any of the selected subset of verifiable claims, but not verifiable claims that are outside of the selected subset of verifiable claims.Type: GrantFiled: April 27, 2021Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Brandon Murdoch, Ankur Patel, Nithya Ganesh, Ronald John Kamiel Eurphrasia Bjones
-
Patent number: 12260220Abstract: Accelerating fetch target queue (FTQ) processing is disclosed herein. In some aspects, a processor comprises an FTQ and an FTQ acceleration cache (FAC), and is configured to generate a FAC entry corresponding to an FTQ entry of a plurality of FTQ entries of the FTQ, wherein the FTQ entry comprises a fetch address bundle comprising a plurality of sequential virtual addresses (VAs), and the FAC entry comprises metadata for the FTQ entry. The processor is further configured to receive, using the FTQ, a request to access the FTQ entry. The processor is also configured to, responsive to receiving the request to access the FTQ entry, locate, using the FAC, the FAC entry corresponding to the FTQ entry among a plurality of FAC entries of the FAC. The processor is additionally configured to perform accelerated processing of the request to access the FTQ entry using the metadata of the FAC entry.Type: GrantFiled: December 16, 2022Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Saransh Jain, Rami Mohammad Al Sheikh, Daren Eugene Streett, Michael Scott McIlvaine, Somasundaram Arunachalam
-
Patent number: 12260004Abstract: Methods, systems, apparatuses, and computer program products are provided herein for rendering secured content. For instance, a computing device may be utilized to view content that is to be displayed via a display device coupled thereto. However, rather than rendering the content, the computing device generates and/or provides a graphical representation of the content to a rendering device coupled between the computing device and the display device. The rendering device analyzes the graphical representation to determine characteristics of the graphical representation, characteristics of a display region of an application window in which the content is to be rendered, and a network address at which the actual content is located. The rendering device retrieves the content using the network address and renders the retrieved content over the display region of the application window in accordance with the characteristics determined for the graphical representation and the display region of the application window.Type: GrantFiled: February 15, 2022Date of Patent: March 25, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Orr Srour, Vadim Makhervaks
-
Patent number: 12260522Abstract: Techniques for generating a fused enhanced image. A first image is generated using a first camera of a first modality, and a second image is generated using a second camera of a second modality. Pixels that are common between the two images are identified. Textures for the common pixels are determined. A camera characteristic, which is linked to noise, is identified. A scaling factor is applied to the textures in the first image. A first saliency is determined using the scaled textures. A second saliency is determined using the textures from the second image. An alpha map is generated and reflects edge detection weights that have been computed for each one of the common pixels based on the two saliencies. Based on the alpha map, textures are merged from the common pixels to generate the fused enhanced image.Type: GrantFiled: October 2, 2023Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Raymond Kirk Price, Michael Bleyer, Christopher Douglas Edmonds
-
Patent number: 12260029Abstract: Systems and methods are provided for interactively highlighting a region as pixel data on a screen and automatically retrieving context data associated with content of the highlighted region for contextual notetaking. The highlighted region includes at least a part of one or more windows and one or more applications associated with the one or more windows. The disclosed technology determines a context associated with content of the highlighted region and automatically retrieves context data that are contextually relevant to the content. Notes data are generated based on an aggregate of the highlighted content, window-specific context data, application-specific context data, and user-specific context data. A notetaking application retrieves stored the notes data from a notes database and displays the notes data for recall and for use. The contextual notetaking enables the user reducing a burden of performing manual operations for notetaking and utilizing notes that are enriched relevant data by context.Type: GrantFiled: September 22, 2022Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Fnu Primadona, Sivaramakrishna Mopati, Jason Glenn Silvis
-
Sharing of compute resources between the virtualized radio access network (vRAN) and other workloads
Patent number: 12260251Abstract: The present disclosure relates to systems and methods for sharing compute resources. The systems and methods may include identifying a plurality of workloads to complete by a deadline. The systems and methods may include generating a performance prediction for each workload of the plurality of workloads. The systems and methods may use the performance prediction to calculate a number of compute resources required for the plurality of workloads to complete by the deadline. The systems and methods may schedule the plurality of workloads across the number of compute resources.Type: GrantFiled: July 28, 2020Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Xenofon Foukas, Bozidar Radunovic -
Patent number: 12260207Abstract: The present disclosure relates to methods and systems for monitoring release pipelines. The methods and systems calculate health metrics of release pipelines using telemetry data from the release pipelines. The methods and systems determine whether the release pipelines are healthy based on the health metrics. The methods and systems automatically trigger one or more actions in response to determining that the release pipelines are unhealthy and continue to monitor the release pipelines in response to determining that the release pipelines are healthy.Type: GrantFiled: June 30, 2022Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Jeremy Michael Bares, Havva Gulay Gurbuz, Marc Van Eijk, Rajive Kumar, Jay Christopher Svoboda, Kiran Belthur Parthasarathy
-
Patent number: 12260662Abstract: A computer implemented method includes rendering a document page as an image; detecting tables, columns, and other associated table objects within the image via one or more table recognition models that model objects in the image as overlapping bounding boxes; transforming the set of objects into a structured representation of the table; extracting data from the objects into the structured representation; and exporting the table into the desired output format.Type: GrantFiled: June 21, 2021Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: J Brandon Smock, Pramod Kumar Sharma, Natalia Larios Delgado, Rohith Venkata Pesala, Robin Abraham
-
Patent number: 12261926Abstract: A fabric control protocol is described for use within a data center in which a switch fabric provides full mesh interconnectivity such that any of the servers may communicate packet data for a given packet flow to any other of the servers using any of a number of parallel data paths within the data center switch fabric. The fabric control protocol enables spraying of individual packets for a given packet flow across some or all of the multiple parallel data paths in the data center switch fabric and, optionally, reordering of the packets for delivery to the destination. The fabric control protocol may provide end-to-end bandwidth scaling and flow fairness within a single tunnel based on endpoint-controlled requests and grants for flows. In some examples, the fabric control protocol packet structure is carried over an underlying protocol, such as the User Datagram Protocol (UDP).Type: GrantFiled: November 12, 2021Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Deepak Goel, Narendra Jayawant Gathoo, Philip A. Thomas, Srihari Raju Vegesna, Pradeep Sindhu, Wael Noureddine, Robert William Bowdidge, Ayaskant Pani, Gopesh Goyal
-
Patent number: 12260937Abstract: Redundancy information can be included in nucleotide symbol strings encoding underlying data. To avoid propagation of errors during the decoding process, during encoding, a constrained encoding can be performed before the redundancy information is computed. The redundancy information can be an outer encoding across multiple nucleotide symbol strings. An inner coding within nucleotide symbol strings can also be supported. Such redundancy information can be interleaved into the underlying nucleotide symbol strings to which the constrained encoding has been applied, resulting in a relaxed constraint. Insertion/deletion redundancy information can also be included in the resulting strings, and an insertion/deletion-sensitive sequence can be included to assist in recovering accurate sequences during decoding operations.Type: GrantFiled: September 5, 2019Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Sergey Yekhanin, Sivakanth Gopi, Henry Pfister, Karin Strauss
-
Patent number: 12262072Abstract: Technologies for measuring and controlling live video latency are disclosed. Embodiments capture a live video scene, ingest the live video scene into a live video stream, and encode the live video stream with data that can be used to compute latency measurements. Embodiments communicate the live video stream to a content distribution network. The live video stream is distributed, directly or indirectly by the content distribution network, to one or more user systems. The one or more user systems present the live video stream to one or more users. Embodiments determine a latency of the live video stream based on, for example, a measurement that is obtained during the capturing of the live video stream and another measurement that is obtained during or in response to the presenting of the live video stream to the one or more users.Type: GrantFiled: November 29, 2021Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Yurong Jiang, Vidit Mihirbhai Soni, Karthiek Chandrasekaran, Federico Guillermo Hlawaczek
-
Patent number: 12259992Abstract: Methods for centralized access control for cloud relational database management system resources are performed by systems and devices. The methods utilize a central policy storage, managed externally to database servers, which stores external policies for access to internal database resources at up to fine granularity. Database servers in the processing system each receive external access policies that correspond to users of the system by push or pull operations from the central policy storage, and store the external access policies in a cache of the database servers for databases. For resource access, access conditions are determined via policy engines of database servers based on an external access policy in the cache that corresponds to a user, responsive to a resource access request from a device of the user specifying the internal resource. Data associated with the resource is provided to the user based on the access condition being met.Type: GrantFiled: January 31, 2024Date of Patent: March 25, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Yueren Wang, Elnata Degefa, Andreas Wolter, Steven Richard Gott, Nitish Gupta, Raghav Kaushik, Rakesh Khanduja, Shafi Ahmad, Dilli Dorai Minnal Arumugam, Pankaj Prabhakar Naik, Nikolas Christopher Ogg
-
Patent number: 12259973Abstract: Systems and methods related to flush plus reload cache side-channel attack mitigation are described. An example method for mitigating a side-channel timing attack in a system including a processor having at least one cache is described. The method includes receiving a first instruction, where the first instruction, when executed by the processor, is configured to flush at least one cache line from the at least one cache associated with the processor. The method further includes, prior to execution of the first instruction by the processor, automatically mapping the first instruction to a second instruction such that the at least one cache line is not flushed from the at least one cache even in response to receiving the first instruction.Type: GrantFiled: June 13, 2022Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Ishwar Agarwal, Bharat Pillilli, Vishal Soni
-
Patent number: 12260237Abstract: Methods, systems, and computer storage media for providing a set of common flat files in a composite image that can be mounted as a container (i.e. composite container) to support isolation and interoperation of computing resources. Container management is provided for a container management system based on a composite image file system engine that executes composite operations to support resource isolation and operating system (OS) virtualization functionality. In particular, a layout manager operates with a composite engine interface to support generating composite images with optimized configurations (i.e., pre-alignment and pre-computed hashes of for executable files). In operation, a plurality of files for generating a composite image are accessed.Type: GrantFiled: October 29, 2019Date of Patent: March 25, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: John Andrew Starks, Scott A. Brender, Shaheed Gulamabbas Chagani, Ping Xie
-
Patent number: 12261623Abstract: Embodiments of the present disclosure include techniques for encoding and decoding metadata in error correction codes. During read operation, a decoder generates a first output corresponding to the at least one metadata bit having a first state and a second output corresponding to the at least one metadata bit having a second state. When one of the first and second outputs have a zero value, the decoder sets a value of the at least one metadata bit to the first state or the second state corresponding to the first output or the second output having the zero value. When both the first and second outputs are non-zero, the decoder decodes the codeword with the assumption of both the metadata bit having the first state and the second state to determine if the codeword is correctable with the at least one metadata bit.Type: GrantFiled: May 12, 2023Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Srikanth Dakshinamoorthy, Majid Anaraki Nemati, Perry Willmann Remaklus, Jr., Ravinder Kumar
-
Patent number: 12262032Abstract: Implementations of the subject matter described herein provide a solution for rate control based on reinforcement learning. In this solution, an encoding state of a video encoder is determined, the encoding state being associated with encoding of a first video unit by the video encoder. An encoding parameter associated with rate control in the video encoder is determined by a reinforcement learning model and based on the encoding state of the video encoder. A second video unit different from the first video unit is encoded based on the encoding parameter. In this way, it is possible to achieve a better quality of experience (QOE) for real time communication with computation overhead being reduced.Type: GrantFiled: June 30, 2020Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Jiahao Li, Bin Li, Yan Lu, Tom W. Holcomb, Mei-Hsuan Lu, Andrey Mezentsev, Ming-Chieh Lee
-
Patent number: 12259968Abstract: Methods, systems, apparatuses, and computer-readable storage mediums described herein are configured to detect anomalous post-authentication behavior/state change(s) with respect to a workload identity. For example, audit logs that specify actions performed with respect to the workload identity of a platform-based identity service, a causing state change(s), while another identity is authenticated with the platform-based identity service, are analyzed. The audit log(s) are analyzed via a model for anomaly prediction based on actions. The model generates an anomaly score indicating a probability whether a particular sequence of the actions is indicative of anomalous behavior/state change(s). A determination is made that an anomalous behavior has occurred based on the anomaly score, and when anomalous behavior has occurred, a mitigation action may be performed that mitigates the anomalous behavior.Type: GrantFiled: March 30, 2022Date of Patent: March 25, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Shinesa Elaine Cambric, Maria Puertas Calvo, Ye Xu, Etan Micah Basseri, Sergio Romero Zambrano, Jeffrey Thomas Sakowicz
-
Patent number: 12260866Abstract: A method, computer program product, and computing system for processing audio information associated with a speech processing system and encoding a watermark in a non-disruptive portion of the audio information.Type: GrantFiled: August 30, 2022Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Patrick Aubrey Naylor, Dushyant Sharma, William Francis Ganong, III, Uwe Helmut Jost, Ljubomir Milanovic
-
Patent number: 12260028Abstract: A data input system is described for inputting text items to an electronic device. The data input system has a store holding a vocabulary of embeddings of text items, each embedding being a numerical encoding of a text item. The data input system receives user input comprising a sequence of one or more context text items and a new text item, the new text item being a text item with an embedding to be computed and added to the vocabulary or with an embedding already in the vocabulary and to be updated. A neural network predictor predicts a next text item in the sequence given the context text items and the vocabulary. An online training module updates the vocabulary by using either a direction associated with the predicted next item, or, by comparing the new text item and the predicted next text item.Type: GrantFiled: March 30, 2017Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Douglas Alexander Harper Orr, Juha Iso-Sipila, Marco Fiscato, Matthew James Willson, Joseph Osborne
-
Patent number: 12262043Abstract: Disclosed herein are exemplary embodiments of methods, apparatus, and systems for performing content-adaptive deblocking to improve the visual quality of video images compressed using block-based motion-predictive video coding. For instance, in certain embodiments of the disclosed technology, edge information is obtained using global orientation energy edge detection (“OEED”) techniques on an initially deblocked image. OEED detection can provide a robust partition of local directional features (“LDFs”). For a local directional feature detected in the partition, a directional deblocking filter having an orientation corresponding to the orientation of the LDF can be used. The selected filter can have a filter orientation and activation thresholds that better preserve image details while reducing blocking artifacts. In certain embodiments, for a consecutive non-LDF region, extra smoothing can be imposed to suppress the visually severe blocking artifacts.Type: GrantFiled: January 11, 2024Date of Patent: March 25, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Xiaoyan Sun, Zhiwei Xiong, Feng Wu
-
Publication number: 20250094882Abstract: A technique suggests resources within a particular environment. The technique operates by receiving a query via a search interface presentation, and using a prefix tree data structure to retrieve candidate resource descriptors that match the query. The candidate resource descriptors are data items that describe different types of candidate resources. The technique further includes: generating feature information that describes the candidate resource descriptors; using a machine-trained ranking model to generate scores associated with the candidate resource descriptors, based on the feature information; sorting the candidate resource descriptors based on the scores, to provide sorted resource descriptors; and generating output information that represents a selected set of resource descriptors drawn from the sorted resource descriptors, for presentation via the search interface presentation.Type: ApplicationFiled: September 15, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Homa BARADARAN HASHEMI, Bing LI, Wenjin XU, Upul Asanka SAMARAWICKRAMA LIYANAGE, Simerpreet KAUR
-
Publication number: 20250094904Abstract: A computing system is provided for risk management. The computing system includes processing circuitry configured to receive input of a control opportunity score, a numerical status score, and one or a plurality of risk impact values for a respective plurality of target objectives for a given risk, calculate a residual risk value for the given risk based on the control opportunity score and an inherent risk value, calculate a relative risk value for the given risk based on the residual risk value, the numerical status score, and the one or the plurality of risk impact values, generate a prompt including the relative risk value and a description of the given risk, input the prompt into a generative model to generate a recommendation for mitigating the given risk, and output the recommendation generated by the generative model.Type: ApplicationFiled: September 20, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventor: Kirk Frank RUSSELL
-
Publication number: 20250094720Abstract: Validation of alt text for images in web pages includes extracting image data from the web pages, the image data including source data and alt text data for a plurality of image elements in the web pages. Natural language descriptions of the image elements are generated by providing images defined by the source data to a computer vision component. Prompts are then generated for a semantic comparison model. The prompts include the natural language descriptions of image elements and the alt text for the image elements. The semantic comparison model is trained to output similarity scores for the prompts. Each of the similarity scores is indicative of a similarity between the natural language description and the alt text data for the image element associated with each prompt. Image elements having inaccurate alt text can then be determined based the similarity score.Type: ApplicationFiled: September 15, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Meshack Kokonya MUSUNDI, Jia MA, Victor Onyango ORIKO
-
Publication number: 20250095161Abstract: Examples of the present disclosure describe systems and methods for track aware object detection. In examples, image content comprising one or more objects is received. Frames in the image content are identified. Candidate bounding boxes are created around objects to be tracked in the frames and a confidence score is assigned to each candidate bounding box. The candidate bounding boxes for each object are compared to a predicted bounding box that is generated based on a current track for the object. Candidate bounding boxes that are determined to be similar to the predicted bounding box and/or that exceed a confidence score threshold are selected. The selected candidate bounding boxes are filtered until a single candidate bounding box that is most representative of each object to be tracked remains. The frame comprising the representative bounding box for each object is then added to a current track for the object.Type: ApplicationFiled: December 29, 2023Publication date: March 20, 2025Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Shay AMRAM, Zvi FIGOV, Moti KADOSH, Yonit HOFFMAN
-
Publication number: 20250094368Abstract: One example provides a device comprising a FIFO data buffer comprising a load shift register, a request line encoder, a state machine, and one or more clocks to provide a clock signal. The load shift register comprises a plurality of register locations and is configured to shift data between at least two register locations controllable on at least one shift instruction and to load data into at least one of the register locations controllable on at least one load instruction. The request line encoder is configured to receive one or more requests each comprising a corresponding priority value, and to determine a request number value representing a number of requests to load into the load shift register. The state machine is configured to determine, based at least in part on the request number value, a state, one or more shift instructions, and one or more load instructions.Type: ApplicationFiled: December 27, 2022Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventor: Amiram HOCHMAN
-
Publication number: 20250098115Abstract: A thermal management system includes a boiler tank and at least one heat-generating component positioned in the boiler tank. The boiler tank is in fluid communication with a vapor return line and a liquid return line. A condenser is in fluid communication with the vapor return line and the liquid return line. The condenser is positioned between vapor return line and the liquid return line in the fluid communication.Type: ApplicationFiled: December 4, 2024Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Ioannis MANOUSAKIS, Eric Clarence PETERSON, Husam Atallah ALISSA, Nicholas Andrew KEEHN
-
Publication number: 20250095319Abstract: The technology relates to methods and systems for performing two-stage suppression of bounding boxes generated during object detection techniques for digital images. The two-stage suppression includes a per-class suppression stage and a class-agnostic suppression stage. In an example method, preliminary bounding boxes are generated for multiple objects in a digital image. A first subset of bounding boxes is selected by performing a per-class suppression of the preliminary bounding boxes. A second subset of bounding boxes is selected by performing a class-agnostic suppression of the first subset of bounding boxes. Based on the second subset of bounding boxes, at least one of an enriched image or a video index is generated.Type: ApplicationFiled: March 12, 2024Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Shay AMRAM, Moti KADOSH, Yonit HOFFMAN, Zvi FIGOV
-
Publication number: 20250094714Abstract: Systems and methods for open-domain dialogue segmentation and state tracking are provided. In particular, a computing device may obtain and analyze a dialogue in near real-time, generate a structured prompt template for a state prediction model based on the dialogue, and generate a structured output using the state prediction model based on the structured prompt template. The structured output includes a turn summary and state labels for each dialogue turn.Type: ApplicationFiled: September 14, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Tara Lynn SAFAVI, Sarkar Snigdha Sarathi DAS, Chirag SHAH, Jennifer Lynay NEVILLE, Mengting WAN, Longqi YANG, Reid Marlow ANDERSEN, Georg Ludwig Wilhelm BUSCHER
-
Publication number: 20250094177Abstract: A method for firmware access on a computing device includes, at a firmware access agent of the computing device, receiving a read request for firmware instructions from a hardware logic component of the computing device. The read request is generated as part of a boot sequence of the hardware logic component, and is received via a data interface communicatively coupling the hardware logic device and the firmware access agent. The firmware access agent retrieves the firmware instructions over a computer network from a remote firmware storage system separate from the computing device. The firmware instructions are provided to the hardware logic component via the data interface, such that the hardware logic component executes the firmware instructions and continues the boot sequence.Type: ApplicationFiled: September 15, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Karunakara KOTARY, Venkatesh RAMAMURTHY, Ankur GARG, Nagasubramanian GURUMOORTHY, Andrew Richard PUTNAM
-
Publication number: 20250094000Abstract: Methods and computing devices for estimating a finger force exerted on a touchpad are disclosed. In one example, a method comprises calculating a plurality of forces produced by a palm at a plurality of capacitive force sensors of the touchpad, where at least one of the sensors is saturated. After calculating the forces produced by the palm, the method determines that the touchpad is being contacted by the palm and a finger. The method uses the forces produced by the palm to determine the finger force exerted on the touchpad by the finger.Type: ApplicationFiled: September 28, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Ahia PERETZ, Shiran BARNEA, On HARAN
-
Publication number: 20250093165Abstract: A technique automatically identifies and resolves prohibited maneuvers in candidate routes generated by a routing system. Examples of prohibited maneuvers include traveling over a non-navigable path, traveling in an incorrect direction over a roadway, and an improper turn. The technique determines whether the candidate routes contain prohibited maneuvers by comparing the candidate routes with plural types of route-related validation data in plural respective validation processes. For example, a first validation process compares the candidate routes with a collection of GPS traces. A second validation process compares the candidate routes with map reference data. The technique further includes provisions for correcting the causes of identified prohibited maneuvers. Overall, the technique reduces the amount of manual effort involved in verifying the accuracy of routes produced by the routing system, and improves the accuracy, reliability, and safety of the routing system.Type: ApplicationFiled: September 18, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Antonios KARATZOGLOU, Tijana BEKIC, Vashutosh AGRAWAL, Mohit KHANNA, Varun KAKKAR, Michael Robert EVANS, Jacob Nicholas WHITBECK, Dragomir Dimitrov YANKOV, Nikola PERIN, Nikola TODIC, Goran PREDOVIC, Aleksandar SAMARDZIJA
-
Publication number: 20250097520Abstract: Systems and methods relating to full motion video (FMV) routing in one-way transfer (OWT) systems are described herein. The present technology modifies or adds packetized elementary streams (PESs) of video streams, that are sent from the low-trust side of the OWT system, with a global unique identifier (GUID) that is used as an identifier to determine a particular destination on the high-trust side of the OWT system. The enriched video stream is then transmitted through an OWT system that provide high reliability for the enriched video stream. When the enriched video stream is received on the high-trust side, the GUID from the PES is extracted and used to identify destination addresses for destination devices in the high-trust computing environment. The video stream is then delivered to the destination devices having the corresponding destination addresses.Type: ApplicationFiled: September 30, 2024Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Jeffrey A. WEST, William Harry SCHULDEN
-
Publication number: 20250094432Abstract: An example system includes a processor to receive production log data and pre-process the production log data to generate an exploration data set. The production log data includes continuous updates of a ranking function associated with different actions for a same query issued by a same user in different impressions. The processor can perform offline estimation of online metrics for ranking functions using the exploration data set, evaluate a proposed ranking function by comparing the estimated online metrics to a set of baseline metrics of a baseline ranking function, detect that the proposed ranking function is a preferred ranking function having a higher detected metric score than the baseline ranking function based on a comparison of the estimated online metrics with the baseline metrics of the baseline ranking function, and execute an action on an information retrieval system based on the preferred ranking function.Type: ApplicationFiled: December 2, 2024Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Lihong LI, Jinyoung KIM, Imed ZITOUNI
-
Publication number: 20250097272Abstract: A data processing system implements techniques for automatically generating visualizations of content for meetings on an online communications platform. The visualizations are interactive and encourage participant engagement. The system automatically generates the visualizations based on a transcript of the meeting and other information associated with the meeting as the meeting is taking place. The system determines a meeting category based on this information and suggests a visualization layout based on the meeting category. The system then automatically generates the visualization using a generative language model. The generative language model generates interactive visualization based on the suggested visualization layout and transcript of the meeting and other information associated with the meeting as the meeting.Type: ApplicationFiled: September 20, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Candice Allison LAM, Adam Michael GLEISNER, Francois ROUAIX, Sarah Ragab Ismail SALEH, Erez KIKIN-GIL, Ian William MIKUTEL
-
Publication number: 20250093652Abstract: One example provides a head mounted display (HMD) device comprising a projection system and left eye and right eye display optical paths configured to transmit left eye and right eye images for viewing. The projection system comprises left and right display image projectors. The HMD device further comprises a display alignment tracker (DAT) system comprising a DAT optical path comprising left side and right side DAT optical paths. The DAT system further comprises a camera coupled to an output of the DAT optical path, and a visible light filter located along the DAT optical path. The HMD device further comprises a controller configured to control the projection system to output a fiducial image comprising a visible color of light transmitted by the visible light filter and to blank the visible color of the fiducial image from a fiducial portion of both the left and right eye images.Type: ApplicationFiled: September 19, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Lasse-Petteri LEPPANEN, Xiao Chuan ONG, Yarn Chee POON, Yifei ZHANG, Wyatt Owen DAVIS, Matthew David ELLIS, Algird Michael GUDAITIS, Akash ARORA
-
Publication number: 20250093980Abstract: A computing device comprises a touch sensing touchpad, a processor, and memory storing instructions to detect contacts at the touchpad over a plurality of frames of data. At each frame a measured coordinate and a current plurality of characteristics of the contacts are determined. The current plurality of characteristics of a current frame are compared to characteristics of an immediately prior frame. Where at least one of the comparisons satisfies a corresponding threshold, a coordinate jump is detected between the current frame and the immediately prior frame. Based at least on detecting the coordinate jump, a current frame intermediate coordinate value is set to an immediately prior frame intermediate coordinate value of the immediately prior frame, and a smoothing filter is applied to the immediately prior frame intermediate coordinate value to generate a smoothed immediately prior frame intermediate coordinate value, which is outputted.Type: ApplicationFiled: December 12, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Molly Jo GESELL, Tal BIZINSKY TOVEL, Arthur GERSHFELD, Hila MALIHI, Robert Bryce JOHNSON, Solomon Stone ROMNEY, Elizabeth Ann PINA, Adam Benjamin MESHI
-
Publication number: 20250094827Abstract: A technique produces a reduced-size language model using explanation tuning. Explanation tuning composes a prompt that includes two parts: a system instruction and a client instruction. The client instruction expresses a query. The system instruction requests a language model to formulate responses to queries that describe final results and processes of producing the final results. The language model responds to the prompt by providing a language-model response that describes a final result and a process of producing the final result, e.g., by providing a step-by-step explanation of how the final result is derivable. In some implementations, the technique uses a teacher-student approach to producing the reduced-size language model. In some examples, the technique performs training in two stages using two respective teacher language models, the first-stage model being less versatile and accurate compared to the second-stage model.Type: ApplicationFiled: November 15, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Ahmed AWADALLAH, Arindam MITRA, Sahaj Raghvendra AGARWAL, Hamid PALANGI, Subhabrata MUKHERJEE
-
Publication number: 20250097268Abstract: A computing system comprises one or more processors configured to obtain two or more security graphs that at least partially overlap. Each security graph comprises a plurality of nodes and at least one edge. The at least one edge represents a potential security vulnerability. Each node is classified as a permission scope node or a floating node. Each of the permission scope nodes is sorted into a respective permission scope profile. For each floating node that matches another floating node, such matching floating nodes are unified into a unified floating node. A set of edges that connects the sorted permission scope nodes and the unified floating nodes is defined based on the at least one edge of each security graph of the two or more security graphs. An interconnected security graph is output comprising the sorted permission scope nodes, the unified floating nodes, and the set of edges.Type: ApplicationFiled: September 14, 2023Publication date: March 20, 2025Applicant: Microsoft Technology Licensing, LLCInventors: Chen LAHAV, Idan HEN, Smadar CARMEL
-
Patent number: 12255824Abstract: An entropy value is generated for a data packet to be transmitted on a computing network. The entropy value is usable to select or change a network path for the data packet. In response to receiving an acknowledgement message for the data packet, the entropy value is saved in a storage structure if the entropy value is acknowledged as not congested. When transmitting an additional data packet, the oldest saved entropy from the storage structure is reused and the oldest saved entropy value is invalidated.Type: GrantFiled: November 13, 2023Date of Patent: March 18, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Abdul Kabbani, Torsten Hoefler
-
Patent number: 12254129Abstract: Examples are provided that relate to determining a capacitance based on a charge accumulated on a sense capacitor electrode. One example provides a head-mounted device comprising a facial-tracking sensor, a controller, and a charge sensing circuit connected to the facial-tracking sensor. The facial-tracking sensor includes a sense capacitor electrode configured to be positioned proximate to a surface of a face and form a capacitance based upon a distance between the sense capacitor electrode and the surface of the face, and the controller configured to apply a reference voltage to the sense capacitor electrode. The charge sensing circuit is configured to determine the capacitance of the sense capacitor electrode by determining an amount of charge accumulated on the sense capacitor electrode resulting from the reference voltage.Type: GrantFiled: June 28, 2022Date of Patent: March 18, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Charles Walter Boecker, Jouya Jadidian, Barry Thompson, Niranjan Achugundla Puttaswamy, Lawrence Albert Prather
-
Patent number: 12254313Abstract: The disclosed technology is generally directed to code transparency. In one example of the technology, raw input data that includes version information that is associated with code is received. The version information includes pull requests associated with the code. Extracted key phrases are provided by performing a key-phrase extraction on the raw input data. A list of documents and a list of people are determined based at least in part on the extracted key phrases. A relevance ranking is performed on the list of documents and the list of people. Based on the relevance ranking, relevant documents and relevant people are determined, such that the relevant documents and the relevant people are relevant to the code. To a developer environment that is associated with the code, information associated with the relevant documents and/or the relevant people is provided.Type: GrantFiled: June 9, 2022Date of Patent: March 18, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Bjarte Sjursen, Dino Ilić, Yiran Liu, Zhengyuan Liu, Fatma Mohamed Ali, Tudor Marius Popa, Victor Manuel Garcia Rosales
-
Patent number: 12253620Abstract: An intelligent assistant records speech spoken by a first user and determines a self-selection score for the first user. The intelligent assistant sends the self-selection score to another intelligent assistant, and receives a remote-selection score for the first user from the other intelligent assistant. The intelligent assistant compares the self-selection score to the remote-selection score. If the self-selection score is greater than the remote-selection score, the intelligent assistant responds to the first user and blocks subsequent responses to all other users until a disengagement metric of the first user exceeds a blocking threshold. If the self-selection score is less than the remote-selection score, the intelligent assistant does not respond to the first user.Type: GrantFiled: September 27, 2021Date of Patent: March 18, 2025Assignee: Microsoft Technology Licensing, LLCInventors: Kazuhito Koishida, Alexander A. Popov, Uros Batricevic, Steven Nabil Bathiche
-
Patent number: 12254069Abstract: The present invention extends to methods, systems, and computer program products for identifying and consenting to permissions for workflow and code execution. Aspects of the invention can be used to automatically scan a workflow or code definition to identify (potentially all) the actions/triggers a workflow or program intends to perform on behalf of a user. The user is shown the actions/triggers the workflow or program intends to perform (e.g., at a user interface) before consent to perform the actions/triggers is granted. As such, a user is aware of intended actions/triggers of a workflow or program before granting consent. Further, since actions/triggers are identified from the workflow or code definition (and not formulated by an author), permission requests better align with permissions that workflow or program functionality actually uses during execution.Type: GrantFiled: December 26, 2023Date of Patent: March 18, 2025Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Sunay Vaishnav, Merwan Vishnu Hade, Stephen Christopher Siciliano, David Nissimoff, Fnu Anubhav