Patents by Inventor Ajitesh Kishore

Ajitesh Kishore has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20100077327
    Abstract: Architecture that guides a user through a complex set of steps of a task that can span multiple applications and services, and/or multiple subprograms/services within a single application. A publication mechanism publishes categorized tasks and task steps to the end user client. Task publication allows end user/community modification or task creation for self use or for publishing to other users. A user interface (UI) associates a specific step with the larger task and helps the user to return back to the list of steps and otherwise navigate at the user discretion. A profile mechanism facilitates the storage of user choices over time and the development of a user profile from which future or similar task completion can be based. The architecture serves as a teaching tool that exposes the user to a variety of applications and services of which the user might now otherwise be aware.
    Type: Application
    Filed: September 22, 2008
    Publication date: March 25, 2010
    Applicant: MICROSOFT CORPORATION
    Inventors: Jon Pulsipher, Ajitesh Kishore
  • Publication number: 20090327896
    Abstract: A presentation system is provided. The presentation system includes a presentation component that provides an electronic data sequence for one or more members of an audience. A monitor component analyzes one or more media streams associated with the electronic data sequence, where a processing component automatically generates a media stream index or a media stream augmentation for the electronic data sequence.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Gurdeep Singh Pall, Ajitesh Kishore, Lewis C. Levin, Parichay Saxena, Patrice Y. Simard
  • Publication number: 20090327322
    Abstract: A data processing system for data exchange across application boundaries is provided. The system includes a canvas memory in which to open multiple applications. A transform component generates data structures across the canvas memory in at least one application form and automatically transforms the data structures to at least one other application form to mitigate application boundaries between disparate applications.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Gurdeep Singh Pall, Christopher H. Pratley, Ajitesh Kishore, Lewis C. Levin, Parichay Saxena, Patrice Y. Simard
  • Patent number: 7593924
    Abstract: A method, system, and apparatus are provided for receiving and responding to knowledge interchange (“KI”) queries. KI queries are search queries directed to database of KI profiles. A KI profile identifies the interests of a user, the individuals with which a user has communicated, and the topics on which communication with the user was made. KI profiles are received from a plurality of client computers and stored in a profile database. Out-of-process processing may be performed on the contents of the profile database. Requests may be received to query the profile database. In response to receiving such requests, the received queries may be executed over the profile database to identify search results. The search results may then be returned as a response to the query.
    Type: Grant
    Filed: September 20, 2004
    Date of Patent: September 22, 2009
    Assignee: Microsoft Corporation
    Inventors: Ajitesh Kishore, Sandeep Sahasrabudhe
  • Publication number: 20090171649
    Abstract: A system (and corresponding method) that employs wiki-type models to consider authoring rather than composition in an application environment is provided. The innovation enables collaborative information and templates to be used to enhance quality, productivity, etc. within a software application environment. These wiki-type models can provide features, functions and benefits related to, but not limited to, general information, auto-fills, formats, schema, conversions, preferences, etc.
    Type: Application
    Filed: December 28, 2007
    Publication date: July 2, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Ajitesh Kishore, Brian Meek, Christopher Hugh Pratley, Alexander G. Gounares, Lewis Charles Levin
  • Publication number: 20090157570
    Abstract: The claimed subject matter provides a system and/or a method that facilitates managing data within an environment. An interface component can receive a role-based model reflective of at least one position within an environment, wherein the environment includes two or more entities within an organized hierarchy. The role-based model can include at least one role assigned to an entity in which the assignment is indicative of the position of the entity within the environment. A role component can provide data access to the entity within the environment in accordance with the role assigned to such entity.
    Type: Application
    Filed: December 18, 2007
    Publication date: June 18, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Gurdeep S. Pall, Jeffrey S. Raikes, Alexander G. Gounares, Ajitesh Kishore
  • Publication number: 20090125988
    Abstract: A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host.
    Type: Application
    Filed: December 10, 2008
    Publication date: May 14, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Brian Evans, Ajitesh Kishore, M. Jay Parks
  • Publication number: 20090119604
    Abstract: The claimed subject matter provides a system and/or a method that facilitates communicating data utilizing holographic representations. An interface component can receive a portion of data related to a virtual meeting. A holographic component can generate at least one holographic image within a virtual meeting space, wherein the holographic image can virtually represent at least one of the portion of data related to the virtual meeting or a user associated with the virtual meeting. Moreover, a share component can employ a public view or a private view for the holographic image within the virtual meeting space.
    Type: Application
    Filed: November 6, 2007
    Publication date: May 7, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Patrice Simard, Ajitesh Kishore
  • Publication number: 20090089751
    Abstract: The claimed subject matter provides a system and/or a method that facilitates exposing a software feature to increase productivity of performing a task. A software component can include a plurality of software features in which the software component can rank and assign a skill level to an entity utilizing at least one software feature. A smart help component can supply the entity with an informative tip based on the skill level rank, wherein the informative tip can assist in utilizing at least one software feature.
    Type: Application
    Filed: September 28, 2007
    Publication date: April 2, 2009
    Applicant: MICROSOFT CORPORATION
    Inventors: Jeffrey S. Raikes, Alexander Gounares, Brian Meek, Patrice Y. Simard, Ajitesh Kishore, Derek Burney
  • Patent number: 7472270
    Abstract: A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host.
    Type: Grant
    Filed: November 13, 2002
    Date of Patent: December 30, 2008
    Assignee: Microsoft Corporation
    Inventors: Brian Evans, Ajitesh Kishore, M. Jay Parks
  • Publication number: 20080172363
    Abstract: Embodiments are provided to enable a user to easily and conveniently assign, share, and/or locate characteristic and other information associated with others. In an embodiment, a user can assign, share, and use one or more characterizing tags. A user can use the one or more characterizing tags to characterize a person of interest and/or a relationship or association between the user and the person of interest. A user can also perform searches using one or more characterizing tags to locate others who may be associated with the one or more characterizing tags. Users can also view user profiles including any characterizing tags and/or communicate with others based in part on a characterizing tag. The various embodiments provide a forum for social tagging, allowing a user to apply and use one or more characterizing tags that are associated with a person of interest.
    Type: Application
    Filed: January 12, 2007
    Publication date: July 17, 2008
    Applicant: Microsoft Corporation
    Inventors: Esther Hsiu-Meng Wang, Ajitesh Kishore
  • Publication number: 20070236742
    Abstract: A method and system for implementing a document processor and re-aggregator is described herein. A document is divided into one or more sections and formatting is removed. A condensed document is generated that includes one or more links to the one or more sections. The condensed document is transmitted to a mobile device to be displayed for a user. The user may choose to download one or more of the sections by selecting one or more of the links. Once downloaded, a section may be modified by the user. The one or more modified sections may be transmitted from the mobile device. The one or more modified sections may then be re-aggregated with the unmodified sections to form a revised document.
    Type: Application
    Filed: March 28, 2006
    Publication date: October 11, 2007
    Applicant: Microsoft Corporation
    Inventors: Leland Hale, Sandeep Sahasrabudhe, Ajitesh Kishore
  • Publication number: 20070182822
    Abstract: A mobile device for implementing a media composer is described herein. The mobile device includes an image capturing device and an audio capturing device. Image data is obtained via the image capturing device. Audio data is obtained via the audio capturing device. The image data is associated with the audio data. The image data may then be displayed on the mobile device while the associated audio data is played. The image data and associated audio data forms a data set that may be communicated to a computing device. The computing device may then modify the data set and send the modified data set to the mobile device. The mobile device may then display the modified data set.
    Type: Application
    Filed: December 12, 2005
    Publication date: August 9, 2007
    Applicant: Microsoft Corporation
    Inventors: Leland Hale, Ajitesh Kishore
  • Publication number: 20070174304
    Abstract: A data model models a social network. The data model can be embodied as a person profile schema and a connector profile schema. The person profile schema defines properties of persons in the social network. The connector profile schema defines connectivity properties of persons that connect a searcher to the persons in social network that the searcher desires to find. Query languages can be based on the data model and can be used to express queries of social networks. Queries can be for persons, for connecting persons, or for both.
    Type: Application
    Filed: January 20, 2006
    Publication date: July 26, 2007
    Applicant: Microsoft Corporation
    Inventors: Adel Shrufi, Ajitesh Kishore, Glen Anderson, Sameer Mahajan, Sunil Swami
  • Publication number: 20060074863
    Abstract: A method, system, and apparatus are provided for maintaining user privacy in a knowledge interchange (“KI”) system. A user may provide privacy preferences relating to their participation in the KI system. The user may identify specific keywords, noun phrases, and contacts that should not be transmitted to a server computer. The user may also specify whether each keyword, noun phrase, or contact should be public or private. If a public keyword is identified during a search query as being associated with the user, the user's identity will be made available to a seeker If a private keyword is identified during a search query as being associated with the user, the user's identity will not be made available and a brokered communication process between the seeker and the user will be performed.
    Type: Application
    Filed: September 20, 2004
    Publication date: April 6, 2006
    Applicant: Microsoft Corporation
    Inventors: Ajitesh Kishore, Sandeep Sahasrabudhe
  • Publication number: 20060064431
    Abstract: A method, system, and apparatus are provided for creating a knowledge interchange (“KI”) profile for a user that identifies the interests of the user, the individuals with which the user has communicated, and the topics on which the communication with the user was made. In order to create the KI profile, items of interest are gathered at the client computer by monitoring the interaction between a user and programs executing on the client computer. Once the items of interest have been identified, the KI profile is created by performing a social network analysis, an interest analysis, and a noun phrase analysis. Once the KI profile has been created, it may be uploaded to a server computer where it is aggregated with KI profiles created for other users.
    Type: Application
    Filed: September 20, 2004
    Publication date: March 23, 2006
    Applicant: Microsoft Corporation
    Inventors: Ajitesh Kishore, Sandeep Sahasrabudhe
  • Publication number: 20060064404
    Abstract: A method, system, and apparatus are provided for receiving and responding to knowledge interchange (“KI”) queries. KI queries are search queries directed to database of KI profiles. A KI profile identifies the interests of a user, the individuals with which a user has communicated, and the topics on which communication with the user was made. KI profiles are received from a plurality of client computers and stored in a profile database. Out-of-process processing may be performed on the contents of the profile database. Requests may be received to query the profile database. In response to receiving such requests, the received queries may be executed over the profile database to identify search results. The search results may then be returned as a response to the query.
    Type: Application
    Filed: September 20, 2004
    Publication date: March 23, 2006
    Applicant: Microsoft Corporation
    Inventors: Ajitesh Kishore, Sandeep Sahasrabudhe
  • Publication number: 20030194093
    Abstract: A host securely transmits content to a peripheral thereof. The peripheral has a symmetric key (PK) and a copy of (PK) encrypted according to a public key (PU) of an entity ((PU(PK))). In the method, the host receives (PU(PK)) from the peripheral, and sends (PU(PK)) to the entity. The entity has a private key (PR) corresponding to (PU), applies (PR) to (PU(PK)) to obtain (PK), and sends (PK) back to the host. The host receives (PK) from the entity, encrypts at least a portion of the content according to (PK), and transmits the encrypted content to the peripheral. The peripheral may then decrypt the encrypted content based on (PK). A bind key (BK) encrypted by (PK) ((PK(BK))) may accompany (PU(PK)), where the content is to be encrypted according to (BK). Thus, (PK) is not revealed to the host.
    Type: Application
    Filed: November 13, 2002
    Publication date: October 16, 2003
    Applicant: Microsoft Corporation
    Inventors: Brian Evans, Ajitesh Kishore, M. Jay Parks