Patents by Inventor Chandresh K. Jain
Chandresh K. Jain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11030542Abstract: Techniques enable contextually-aware selections of event forums. Scheduling data can be analyzed to identify a context associated with an appointment. A forum that is appropriate for the identified context can be selected and utilized. The analysis can also utilize traffic data, map data, weather data, user preferences, and other contextual data to select one or more forums. A forum can be a place or communication medium. A service provider can associate one or more forums with a particular skill set. For example, a legal office can associate an online forum, such a videoconference, with a first category of services, and an on-site location for a second category of services. Depending on a category of services identified in one or more user preferences and/or meeting requests, a forum can be selected. Other factors, which may include weather conditions, traffic conditions, and commute times can also influence the selection of a forum.Type: GrantFiled: April 29, 2016Date of Patent: June 8, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Lamia Benmouffok
-
Publication number: 20170316331Abstract: Techniques enable contextually-aware selections of event forums. Scheduling data can be analyzed to identify a context associated with an appointment. A forum that is appropriate for the identified context can be selected and utilized. The analysis can also utilize traffic data, map data, weather data, user preferences, and other contextual data to select one or more forums. A forum can be a place or communication medium. A service provider can associate one or more forums with a particular skill set. For example, a legal office can associate an online forum, such a videoconference, with a first category of services, and an on-site location for a second category of services. Depending on a category of services identified in one or more user preferences and/or meeting requests, a forum can be selected. Other factors, which may include weather conditions, traffic conditions, and commute times can also influence the selection of a forum.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Lamia Benmouffok
-
Publication number: 20170316386Abstract: Techniques described herein provide mechanisms for generating contextually-aware scheduling exceptions. In some configurations, when a scheduling conflict is detected, the techniques disclosed herein can utilize contextual data from a number of resources to determine if a scheduling exception can be made. The contextual data can include preferences, such as preferences of a service provider or a customer, that define criteria and/or goals. The techniques disclosed herein prioritize customers based on the contextual data and provide different scheduling options for customers and other entities based on a priority associated with individual customers. When there is a conflict between two or more calendar events, a scheduling exception can be made for some customers and a scheduling conflict can be made for other customers depending on one or more priorities associated with the customers.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Mohit Mehtani, Anant Trivedi, Eva Britta Karolina Burlin, Dana Anne Lee, Joan Ching Li
-
Publication number: 20170316387Abstract: Techniques described herein provide the automation of workflow events. Input data can be processed with contextual data to generate workflow data. Workflow data can define a multi-stage process describing aspects of an orchestrated pattern of activity. In some configurations, input data indicating a calendar event can be received by one or more computing devices. The input data can include a voice input or text description indicating a desire to initiate a project, define a goal, achieve one or more metrics, etc. In response to receiving the input data, contextual data can be received from a number of resources, including specialized resources having a knowledgebase for particular topics. The techniques disclosed herein utilize the contextual data to generate workflow data that can define a multi-stage process. Calendar events, reminders and other forms of communication can be generated from the workflow data.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Tor-Helge Persett, Ricardo Alberto Rosales Guerrero
-
Publication number: 20170316484Abstract: Techniques described herein provide resource-based auto completion for data entry fields of a graphical user interface. In some configurations, the techniques disclosed herein utilize input data and contextual data from a number of resources to select and display text entry candidates for assisting users in populating one or more data entry fields. For example, the input data can include an indication of a service category or a topic and other data defining a calendar event. The contextual data can be related to service providers and customers including, data defining a prior work history between two or more entities, commute projections, scheduling conflicts, preferences, and other data, such as traffic data and weather data. Data indicating a lifetime value of a customer or provider can also be utilized to select text entry candidates.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventors: William Hart Holmes, Neel Joshi, Paul David Tischhauser, Chandresh K. Jain, Tor-Helge Persett, Anant Trivedi
-
Publication number: 20170316022Abstract: Techniques provide a contextually-aware resource manager. In response to one or more events, such as the creation or modification of a calendar event, one or more contextually-aware recommendations are generated and displayed to a user. For example, a recommendation can include the names of service providers, the names of customers, time slots for one or more calendar events, and notifications of one or more conditions. The recommendation can be based on data defining a level of eligibility for service providers and customers. The level of eligibility can be determined by a wide range of contextual data, including but not limited to traffic data, payment data, location data, map data, preference data, scheduling data, workload data, work history data, status data, skill set data, or weather data. The techniques assist user interaction with a computing device, and among other benefits, saves computing resources and reduce the number of inadvertent user entries.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Tor-Helge Persett, Eva Britta Karolina Burlin, Dana Anne Lee, Joan Ching Li
-
Publication number: 20170316385Abstract: Techniques described herein provide contextually-aware insights into calendar events. Generally described, the techniques disclosed herein can analyze a wide variety of contextual data including, but not limited to, weather data, traffic data, location data, performance data, preference data, and scheduling data, to generate salient insights that can be automatically displayed and/or communicated to a user. Insights related to one or more calendar events may be generated in response to a discovery of a predetermined condition. A predetermined condition may be detected at the time an appointment is made or at a later time when contextual data indicates a change in one or more conditions. An insight can include a text description, an image, a graphical indicator, a generated voice, and any other suitable form of communication describing useful information regarding one or more calendar events. An insight can include ranked list of recommendations can also be displayed.Type: ApplicationFiled: April 29, 2016Publication date: November 2, 2017Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Mohit Mehtani, Tor-Helge Persett, Eva Britta Karolina Burlin, Dana Anne Lee, Joan Ching Li
-
Patent number: 8566406Abstract: A perimeter network may be utilized to filter electronic mail messages destined for an internal network. A computer may be utilized to monitor an electronic mail mailbox for changes to a safe recipients list and/or a blocked senders list. The computer may further be utilized to automatically copy the safe recipients list and/or the blocked senders list to a network directory in the internal network. The computer may further be utilized to automatically send the safe recipients list and/or the blocked senders list to a network directory in the perimeter network for utilization by one or more agents executing on a computer in the perimeter network. The one or more agents may be configured to utilize the safe recipients list and/or the blocked senders list to filter electronic mail messages received by the perimeter network which are destined for delivery to the internal network.Type: GrantFiled: January 14, 2010Date of Patent: October 22, 2013Assignee: Microsoft CorporationInventors: Mayerber L. Carvalho Neto, Chandresh K. Jain, Mayank Mehta, Mihai Costea
-
Patent number: 8447976Abstract: Business to business secure mail may be provided. Consistent with embodiments of the invention, a protected message may be received. The recipient may request a token from a trust broker, submit the token to an authorization server associated with the sender, receive a user license from the authorization server; and decrypt the protected message using the user license. The protected message may restrict actions that may be taken by the recipient, such as forwarding to other users.Type: GrantFiled: June 1, 2009Date of Patent: May 21, 2013Assignee: Microsoft CorporationInventors: Chandresh K. Jain, Mayank Mehta, Frank D. Byrum, Edward Banti, Ayse Yesim Koman, James R. Knibb, Michael A. Nelte, Christopher Barnes, Hao Zhang, Victor Boctor, Tejas D. Patel, Yuhui Zhong, Gregory Kostal, Vladimir Yarmolenko, Pankaj M. Kamat, Amit K. Fulay, Krassimir E. Karamfilov
-
Patent number: 8028026Abstract: Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A content filtering application located outside a trusted network receives messaging preferences information from within the trusted network regarding the mail recipients. This messaging preferences information may be utilized to allow certain pre-authorized messages from particular senders to bypass content filtering. Moreover, the messaging preferences information may be hashed to further protect the information on the perimeter network and to speed in review and comparison of the messaging preferences information. In addition, other types of user-specific information may be propagated to the perimeter network for use with other applications other than messaging.Type: GrantFiled: May 31, 2006Date of Patent: September 27, 2011Assignee: Microsoft CorporationInventors: Chandresh K. Jain, Malcolm E. Pearson, Nathan F. Waddoups, Mihai Costea, Eric D. Tribble
-
Publication number: 20110173272Abstract: A perimeter network may be utilized to filter electronic mail messages destined for an internal network. A computer may be utilized to monitor an electronic mail mailbox for changes to a safe recipients list and/or a blocked senders list. The computer may further be utilized to automatically copy the safe recipients list and/or the blocked senders list to a network directory in the internal network. The computer may further be utilized to automatically send the safe recipients list and/or the blocked senders list to a network directory in the perimeter network for utilization by one or more agents executing on a computer in the perimeter network. The one or more agents may be configured to utilize the safe recipients list and/or the blocked senders list to filter electronic mail messages received by the perimeter network which are destined for delivery to the internal network.Type: ApplicationFiled: January 14, 2010Publication date: July 14, 2011Applicant: Microsoft CorporationInventors: Mayerber L. Carvalho Neto, Chandresh K. Jain, Mayank Mehta, Mihai Costea
-
Publication number: 20100313016Abstract: Transport pipeline decryption may be provided. Consistent with embodiments of the invention, a protected message may be received and decrypted. The decrypted message may be provided to pipeline agents, such as anti-virus, anti-spam, journaling, and/or policy enforcement agents. The message may then be re-encrypted and delivered.Type: ApplicationFiled: June 4, 2009Publication date: December 9, 2010Applicant: Microsoft CorporationInventors: Hao Zhang, Danny Tin-Van Chow, Ayse Yesim Koman, Frank D. Byrum, Mayank Mehta, Chandresh K. Jain, Victor Boctor, Charlie R. Chung, Tejas D. Patel, Yuhui Zhong, Amit K. Fulay, Gregory Kostal, Pankaj M. Kamat, Vladimir Yarmolenko, Krassimir E. Karamfilov
-
Publication number: 20100313276Abstract: A web-based client for creating and accessing protected content may be provided. Consistent with embodiments of the invention, a webmail client may be provided allowing a user to apply a restriction template to a document. The webmail client may be further operative to decrypt and display the document and enforce the restriction against a recipient.Type: ApplicationFiled: June 5, 2009Publication date: December 9, 2010Applicant: Microsoft CorporationInventors: Edward T. Banti, Steven O. Hubbell, Mayerber L. Carvalho Neto, Chandresh K. Jain, Mayank Mehta, Durlabh Malik, Christopher Barnes, Michael A. Nelte, Frank D. Byrum, Tejas D. Patel, Yuhui Zhong, Amit K. Fulay, Gregory Kostal, Pankaj M. Kamat, Vladimir Yarmolenko
-
Publication number: 20100306535Abstract: Business to business secure mail may be provided. Consistent with embodiments of the invention, a protected message may be received. The recipient may request a token from a trust broker, submit the token to an authorization server associated with the sender, receive a user license from the authorization server; and decrypt the protected message using the user license. The protected message may restrict actions that may be taken by the recipient, such as forwarding to other users.Type: ApplicationFiled: June 1, 2009Publication date: December 2, 2010Applicant: Microsoft CorporationInventors: Chandresh K. Jain, Mayank Mehta, Frank D. Byrum, Edward Banti, Ayse Yesim Koman, James R. Knibb, Michael A. Nelte, Christopher Barnes, Hao Zhang, Victor Boctor, Tejas D. Patel, Yuhui Zhong, Gregory Kostal, Vladimir Yarmolenko, Pankaj M. Kamat, Amit K. Fulay, Krassimir E. Karamfilov
-
Patent number: 7568008Abstract: Journaling e-mail messages, containing information about an e-mail message and/or entities associated with the e-mail messages, are sent to journaling mailboxes. An e-mail server sends an original journaling e-mail message, preferably through an envelope protocol extension, to an entity's journaling mailbox. Upon detecting additional recipients of the e-mail message (e.g. an expansion of a distribution list or alternate recipient forwarding rule) the e-mail server sends an additional journaling e-mail message, containing information about the additional recipients, to the entity's journaling mailbox.Type: GrantFiled: January 28, 2005Date of Patent: July 28, 2009Assignee: Microsoft CorporationInventors: Chandresh K. Jain, Daniel D. Longley, James H. Baker, Massimiliano Ciccotosto, Wilbert De Graaf
-
Patent number: 7552179Abstract: E-mail envelope journaling. A server determines that an entity's (e.g., a recipient revealed from an expanded distribution list) home mailbox store has envelope journaling enabled and specifies a journaling mailbox address. The server sets a journaling property in an e-mail message identifying that the e-mail message is to be journaled. The server adds the journaling mailbox address specified by the entity's home mailbox store to the journaling property. The server sends envelope journaling information through an envelope protocol extension to the journaling mailbox addresses specified in the journaling property. The server sends the e-mail message to one or more recipients specified in the e-mail message and journaling mailbox addresses specified in the journaling property. Journaling servers receiving envelope journaling information, place journaling information in archive messages, and attach portions e-mail messages to archive messages.Type: GrantFiled: September 20, 2004Date of Patent: June 23, 2009Assignee: Microsoft CorporationInventors: Chandresh K. Jain, Daniel D. Longley, James H. Baker, Massimiliano Ciccotosto, Wilbert De Graaf
-
Publication number: 20070282953Abstract: Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A content filtering application located outside a trusted network receives messaging preferences information from within the trusted network regarding the mail recipients. This messaging preferences information may be utilized to allow certain pre-authorized messages from particular senders to bypass content filtering. Moreover, the messaging preferences information may be hashed to further protect the information on the perimeter network and to speed in review and comparison of the messaging preferences information. In addition, other types of user-specific information may be propagated to the perimeter network for use with other applications other than messaging.Type: ApplicationFiled: May 31, 2006Publication date: December 6, 2007Applicant: MICROSOFT CORPORATIONInventors: Chandresh K. Jain, Malcolm E. Pearson, Nathan F. Waddoups, Mihai Costea, Eric D. Tribble