Patents by Inventor Chandresh K. Jain

Chandresh K. Jain has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11030542
    Abstract: Techniques enable contextually-aware selections of event forums. Scheduling data can be analyzed to identify a context associated with an appointment. A forum that is appropriate for the identified context can be selected and utilized. The analysis can also utilize traffic data, map data, weather data, user preferences, and other contextual data to select one or more forums. A forum can be a place or communication medium. A service provider can associate one or more forums with a particular skill set. For example, a legal office can associate an online forum, such a videoconference, with a first category of services, and an on-site location for a second category of services. Depending on a category of services identified in one or more user preferences and/or meeting requests, a forum can be selected. Other factors, which may include weather conditions, traffic conditions, and commute times can also influence the selection of a forum.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: June 8, 2021
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Lamia Benmouffok
  • Publication number: 20170316331
    Abstract: Techniques enable contextually-aware selections of event forums. Scheduling data can be analyzed to identify a context associated with an appointment. A forum that is appropriate for the identified context can be selected and utilized. The analysis can also utilize traffic data, map data, weather data, user preferences, and other contextual data to select one or more forums. A forum can be a place or communication medium. A service provider can associate one or more forums with a particular skill set. For example, a legal office can associate an online forum, such a videoconference, with a first category of services, and an on-site location for a second category of services. Depending on a category of services identified in one or more user preferences and/or meeting requests, a forum can be selected. Other factors, which may include weather conditions, traffic conditions, and commute times can also influence the selection of a forum.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Lamia Benmouffok
  • Publication number: 20170316386
    Abstract: Techniques described herein provide mechanisms for generating contextually-aware scheduling exceptions. In some configurations, when a scheduling conflict is detected, the techniques disclosed herein can utilize contextual data from a number of resources to determine if a scheduling exception can be made. The contextual data can include preferences, such as preferences of a service provider or a customer, that define criteria and/or goals. The techniques disclosed herein prioritize customers based on the contextual data and provide different scheduling options for customers and other entities based on a priority associated with individual customers. When there is a conflict between two or more calendar events, a scheduling exception can be made for some customers and a scheduling conflict can be made for other customers depending on one or more priorities associated with the customers.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Mohit Mehtani, Anant Trivedi, Eva Britta Karolina Burlin, Dana Anne Lee, Joan Ching Li
  • Publication number: 20170316387
    Abstract: Techniques described herein provide the automation of workflow events. Input data can be processed with contextual data to generate workflow data. Workflow data can define a multi-stage process describing aspects of an orchestrated pattern of activity. In some configurations, input data indicating a calendar event can be received by one or more computing devices. The input data can include a voice input or text description indicating a desire to initiate a project, define a goal, achieve one or more metrics, etc. In response to receiving the input data, contextual data can be received from a number of resources, including specialized resources having a knowledgebase for particular topics. The techniques disclosed herein utilize the contextual data to generate workflow data that can define a multi-stage process. Calendar events, reminders and other forms of communication can be generated from the workflow data.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Tor-Helge Persett, Ricardo Alberto Rosales Guerrero
  • Publication number: 20170316484
    Abstract: Techniques described herein provide resource-based auto completion for data entry fields of a graphical user interface. In some configurations, the techniques disclosed herein utilize input data and contextual data from a number of resources to select and display text entry candidates for assisting users in populating one or more data entry fields. For example, the input data can include an indication of a service category or a topic and other data defining a calendar event. The contextual data can be related to service providers and customers including, data defining a prior work history between two or more entities, commute projections, scheduling conflicts, preferences, and other data, such as traffic data and weather data. Data indicating a lifetime value of a customer or provider can also be utilized to select text entry candidates.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: William Hart Holmes, Neel Joshi, Paul David Tischhauser, Chandresh K. Jain, Tor-Helge Persett, Anant Trivedi
  • Publication number: 20170316022
    Abstract: Techniques provide a contextually-aware resource manager. In response to one or more events, such as the creation or modification of a calendar event, one or more contextually-aware recommendations are generated and displayed to a user. For example, a recommendation can include the names of service providers, the names of customers, time slots for one or more calendar events, and notifications of one or more conditions. The recommendation can be based on data defining a level of eligibility for service providers and customers. The level of eligibility can be determined by a wide range of contextual data, including but not limited to traffic data, payment data, location data, map data, preference data, scheduling data, workload data, work history data, status data, skill set data, or weather data. The techniques assist user interaction with a computing device, and among other benefits, saves computing resources and reduce the number of inadvertent user entries.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Tor-Helge Persett, Eva Britta Karolina Burlin, Dana Anne Lee, Joan Ching Li
  • Publication number: 20170316385
    Abstract: Techniques described herein provide contextually-aware insights into calendar events. Generally described, the techniques disclosed herein can analyze a wide variety of contextual data including, but not limited to, weather data, traffic data, location data, performance data, preference data, and scheduling data, to generate salient insights that can be automatically displayed and/or communicated to a user. Insights related to one or more calendar events may be generated in response to a discovery of a predetermined condition. A predetermined condition may be detected at the time an appointment is made or at a later time when contextual data indicates a change in one or more conditions. An insight can include a text description, an image, a graphical indicator, a generated voice, and any other suitable form of communication describing useful information regarding one or more calendar events. An insight can include ranked list of recommendations can also be displayed.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Neel Joshi, William Hart Holmes, Paul David Tischhauser, Chandresh K. Jain, Mohit Mehtani, Tor-Helge Persett, Eva Britta Karolina Burlin, Dana Anne Lee, Joan Ching Li
  • Patent number: 8566406
    Abstract: A perimeter network may be utilized to filter electronic mail messages destined for an internal network. A computer may be utilized to monitor an electronic mail mailbox for changes to a safe recipients list and/or a blocked senders list. The computer may further be utilized to automatically copy the safe recipients list and/or the blocked senders list to a network directory in the internal network. The computer may further be utilized to automatically send the safe recipients list and/or the blocked senders list to a network directory in the perimeter network for utilization by one or more agents executing on a computer in the perimeter network. The one or more agents may be configured to utilize the safe recipients list and/or the blocked senders list to filter electronic mail messages received by the perimeter network which are destined for delivery to the internal network.
    Type: Grant
    Filed: January 14, 2010
    Date of Patent: October 22, 2013
    Assignee: Microsoft Corporation
    Inventors: Mayerber L. Carvalho Neto, Chandresh K. Jain, Mayank Mehta, Mihai Costea
  • Patent number: 8447976
    Abstract: Business to business secure mail may be provided. Consistent with embodiments of the invention, a protected message may be received. The recipient may request a token from a trust broker, submit the token to an authorization server associated with the sender, receive a user license from the authorization server; and decrypt the protected message using the user license. The protected message may restrict actions that may be taken by the recipient, such as forwarding to other users.
    Type: Grant
    Filed: June 1, 2009
    Date of Patent: May 21, 2013
    Assignee: Microsoft Corporation
    Inventors: Chandresh K. Jain, Mayank Mehta, Frank D. Byrum, Edward Banti, Ayse Yesim Koman, James R. Knibb, Michael A. Nelte, Christopher Barnes, Hao Zhang, Victor Boctor, Tejas D. Patel, Yuhui Zhong, Gregory Kostal, Vladimir Yarmolenko, Pankaj M. Kamat, Amit K. Fulay, Krassimir E. Karamfilov
  • Patent number: 8028026
    Abstract: Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A content filtering application located outside a trusted network receives messaging preferences information from within the trusted network regarding the mail recipients. This messaging preferences information may be utilized to allow certain pre-authorized messages from particular senders to bypass content filtering. Moreover, the messaging preferences information may be hashed to further protect the information on the perimeter network and to speed in review and comparison of the messaging preferences information. In addition, other types of user-specific information may be propagated to the perimeter network for use with other applications other than messaging.
    Type: Grant
    Filed: May 31, 2006
    Date of Patent: September 27, 2011
    Assignee: Microsoft Corporation
    Inventors: Chandresh K. Jain, Malcolm E. Pearson, Nathan F. Waddoups, Mihai Costea, Eric D. Tribble
  • Publication number: 20110173272
    Abstract: A perimeter network may be utilized to filter electronic mail messages destined for an internal network. A computer may be utilized to monitor an electronic mail mailbox for changes to a safe recipients list and/or a blocked senders list. The computer may further be utilized to automatically copy the safe recipients list and/or the blocked senders list to a network directory in the internal network. The computer may further be utilized to automatically send the safe recipients list and/or the blocked senders list to a network directory in the perimeter network for utilization by one or more agents executing on a computer in the perimeter network. The one or more agents may be configured to utilize the safe recipients list and/or the blocked senders list to filter electronic mail messages received by the perimeter network which are destined for delivery to the internal network.
    Type: Application
    Filed: January 14, 2010
    Publication date: July 14, 2011
    Applicant: Microsoft Corporation
    Inventors: Mayerber L. Carvalho Neto, Chandresh K. Jain, Mayank Mehta, Mihai Costea
  • Publication number: 20100313016
    Abstract: Transport pipeline decryption may be provided. Consistent with embodiments of the invention, a protected message may be received and decrypted. The decrypted message may be provided to pipeline agents, such as anti-virus, anti-spam, journaling, and/or policy enforcement agents. The message may then be re-encrypted and delivered.
    Type: Application
    Filed: June 4, 2009
    Publication date: December 9, 2010
    Applicant: Microsoft Corporation
    Inventors: Hao Zhang, Danny Tin-Van Chow, Ayse Yesim Koman, Frank D. Byrum, Mayank Mehta, Chandresh K. Jain, Victor Boctor, Charlie R. Chung, Tejas D. Patel, Yuhui Zhong, Amit K. Fulay, Gregory Kostal, Pankaj M. Kamat, Vladimir Yarmolenko, Krassimir E. Karamfilov
  • Publication number: 20100313276
    Abstract: A web-based client for creating and accessing protected content may be provided. Consistent with embodiments of the invention, a webmail client may be provided allowing a user to apply a restriction template to a document. The webmail client may be further operative to decrypt and display the document and enforce the restriction against a recipient.
    Type: Application
    Filed: June 5, 2009
    Publication date: December 9, 2010
    Applicant: Microsoft Corporation
    Inventors: Edward T. Banti, Steven O. Hubbell, Mayerber L. Carvalho Neto, Chandresh K. Jain, Mayank Mehta, Durlabh Malik, Christopher Barnes, Michael A. Nelte, Frank D. Byrum, Tejas D. Patel, Yuhui Zhong, Amit K. Fulay, Gregory Kostal, Pankaj M. Kamat, Vladimir Yarmolenko
  • Publication number: 20100306535
    Abstract: Business to business secure mail may be provided. Consistent with embodiments of the invention, a protected message may be received. The recipient may request a token from a trust broker, submit the token to an authorization server associated with the sender, receive a user license from the authorization server; and decrypt the protected message using the user license. The protected message may restrict actions that may be taken by the recipient, such as forwarding to other users.
    Type: Application
    Filed: June 1, 2009
    Publication date: December 2, 2010
    Applicant: Microsoft Corporation
    Inventors: Chandresh K. Jain, Mayank Mehta, Frank D. Byrum, Edward Banti, Ayse Yesim Koman, James R. Knibb, Michael A. Nelte, Christopher Barnes, Hao Zhang, Victor Boctor, Tejas D. Patel, Yuhui Zhong, Gregory Kostal, Vladimir Yarmolenko, Pankaj M. Kamat, Amit K. Fulay, Krassimir E. Karamfilov
  • Patent number: 7568008
    Abstract: Journaling e-mail messages, containing information about an e-mail message and/or entities associated with the e-mail messages, are sent to journaling mailboxes. An e-mail server sends an original journaling e-mail message, preferably through an envelope protocol extension, to an entity's journaling mailbox. Upon detecting additional recipients of the e-mail message (e.g. an expansion of a distribution list or alternate recipient forwarding rule) the e-mail server sends an additional journaling e-mail message, containing information about the additional recipients, to the entity's journaling mailbox.
    Type: Grant
    Filed: January 28, 2005
    Date of Patent: July 28, 2009
    Assignee: Microsoft Corporation
    Inventors: Chandresh K. Jain, Daniel D. Longley, James H. Baker, Massimiliano Ciccotosto, Wilbert De Graaf
  • Patent number: 7552179
    Abstract: E-mail envelope journaling. A server determines that an entity's (e.g., a recipient revealed from an expanded distribution list) home mailbox store has envelope journaling enabled and specifies a journaling mailbox address. The server sets a journaling property in an e-mail message identifying that the e-mail message is to be journaled. The server adds the journaling mailbox address specified by the entity's home mailbox store to the journaling property. The server sends envelope journaling information through an envelope protocol extension to the journaling mailbox addresses specified in the journaling property. The server sends the e-mail message to one or more recipients specified in the e-mail message and journaling mailbox addresses specified in the journaling property. Journaling servers receiving envelope journaling information, place journaling information in archive messages, and attach portions e-mail messages to archive messages.
    Type: Grant
    Filed: September 20, 2004
    Date of Patent: June 23, 2009
    Assignee: Microsoft Corporation
    Inventors: Chandresh K. Jain, Daniel D. Longley, James H. Baker, Massimiliano Ciccotosto, Wilbert De Graaf
  • Publication number: 20070282953
    Abstract: Propagating messaging preferences of one or more users from a recipient mailbox to a perimeter network administering e-mail content blocking and routing. A content filtering application located outside a trusted network receives messaging preferences information from within the trusted network regarding the mail recipients. This messaging preferences information may be utilized to allow certain pre-authorized messages from particular senders to bypass content filtering. Moreover, the messaging preferences information may be hashed to further protect the information on the perimeter network and to speed in review and comparison of the messaging preferences information. In addition, other types of user-specific information may be propagated to the perimeter network for use with other applications other than messaging.
    Type: Application
    Filed: May 31, 2006
    Publication date: December 6, 2007
    Applicant: MICROSOFT CORPORATION
    Inventors: Chandresh K. Jain, Malcolm E. Pearson, Nathan F. Waddoups, Mihai Costea, Eric D. Tribble