Patents by Inventor Geoff Hulten
Geoff Hulten has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250201145Abstract: The present disclosure is directed toward systems, methods, and non-transitory computer readable media for generating and providing intelligent insights for video calls and other virtual meetings. In some embodiments, the disclosed systems analyze stored meeting data from past video calls and other virtual meetings to generate intelligent insights for an upcoming video call. The disclosed systems also generate and provide intelligent insights or coaching tools for ongoing video calls. As part of the intelligent coaching tools for ongoing video calls, the disclosed systems can generate predictions for accomplishing target goals for the video calls. Further, the disclosed systems can generate intelligent insights or coaching tools after video calls take place.Type: ApplicationFiled: January 17, 2024Publication date: June 19, 2025Inventors: Ameya Bhatawdekar, Geoff Hulten, Kelsey Glatz, Sateesh Srinivasan, Joseph Grillo, Emir Aydin, Ritu Vincent, William Adamowicz
-
Publication number: 20250202727Abstract: The present disclosure is directed toward systems, methods, and non-transitory computer readable media for generating and providing intelligent insights for video calls and other virtual meetings. In some embodiments, the disclosed systems analyze stored meeting data from past video calls and other virtual meetings to generate intelligent insights for an upcoming video call. The disclosed systems also generate and provide intelligent insights or coaching tools for ongoing video calls. As part of the intelligent coaching tools for ongoing video calls, the disclosed systems can generate predictions for accomplishing target goals for the video calls. Further, the disclosed systems can generate intelligent insights or coaching tools after video calls take place.Type: ApplicationFiled: January 17, 2024Publication date: June 19, 2025Inventors: Ameya Bhatawdekar, Geoff Hulten, Kelsey Glatz, Sateesh Srinivasan, Joseph Grillo, Emir Aydin, Ritu Vincent, William Adamowicz
-
Publication number: 20250111148Abstract: The present disclosure relates to systems, non-transitory computer-readable media, and methods for generating composite actions for a user account. In particular, in one or more embodiments, the disclosed systems determine a set of tasks performable by the user account using software tools on a client device. In some embodiments, the disclosed systems generate a task initialization prompt to provide to a large language model. Additionally, in some implementations, the disclosed systems generate a composite action comprising a hybridized combination of the set of tasks performable by the user account along with a set of content items relevant to the set of tasks. Moreover, in some embodiments, the disclosed systems provide access to the composite action and the set of content items via a user interface of the client device. Furthermore, in some implementations, the disclosed systems generate and insert predicted content into a content item without user input.Type: ApplicationFiled: September 29, 2023Publication date: April 3, 2025Inventors: Vasanth Krishna Namasivayam, Devin Mancuso, Geoff Hulten, Shubham Goel, Sateesh Srinivasan, Tony Xu
-
Publication number: 20250111149Abstract: The present disclosure relates to systems, non-transitory computer-readable media, and methods for generating composite actions for a user account. In particular, in one or more embodiments, the disclosed systems determine a set of tasks performable by the user account using software tools on a client device. In some embodiments, the disclosed systems generate a task initialization prompt to provide to a large language model. Additionally, in some implementations, the disclosed systems generate a composite action comprising a hybridized combination of the set of tasks performable by the user account along with a set of content items relevant to the set of tasks. Moreover, in some embodiments, the disclosed systems provide access to the composite action and the set of content items via a user interface of the client device. Furthermore, in some implementations, the disclosed systems generate and insert predicted content into a content item without user input.Type: ApplicationFiled: September 29, 2023Publication date: April 3, 2025Inventors: Vasanth Krishna Namasivayam, Devin Mancuso, Geoff Hulten, Shubham Goel, Sateesh Srinivasan, Tony Xu
-
Patent number: 9690939Abstract: A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.Type: GrantFiled: January 5, 2015Date of Patent: June 27, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
-
Patent number: 9652614Abstract: Technologies for an application reputation service to assist users with minimizing their computerized machines' exposure to and infection from malware, including an application reputation service that contains the reputations for elements (e.g., applications) that are known to be non-malicious as well as those known to be malicious. In one example, when a user attempts to install or execute a new application, the service is queried by the user's machine with a set of identities for the element. The service determines the reputation of the application by referencing a knowledge base of known reputations and returns an indication (e.g., an overall rating, or a flag) of how safe that application would be to install and run on the user's computer.Type: GrantFiled: June 12, 2014Date of Patent: May 16, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Geoff Hulten, Paul Steve Rehfuss, Ron Franczyk, Christopher A. Meek, John Scarrow, Andrew Newman
-
Publication number: 20150128261Abstract: A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.Type: ApplicationFiled: January 5, 2015Publication date: May 7, 2015Inventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
-
Patent number: 8943526Abstract: Technologies described herein relate to estimating engagement of a person with respect to content being presented to the person. A sensor outputs a stream of data relating to the person as the person is consuming the content. At least one feature is extracted from the stream of data, and a level of engagement of the person is estimated based at least in part upon the at least one feature. A computing function is performed based upon the estimated level of engagement of the person.Type: GrantFiled: April 19, 2013Date of Patent: January 27, 2015Assignee: Microsoft CorporationInventors: Javier Hernandez Rivera, Zicheng Liu, Geoff Hulten, Michael Conrad, Kyle Krum, David DeBarr, Zhengyou Zhang
-
Patent number: 8931090Abstract: A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.Type: GrantFiled: March 5, 2012Date of Patent: January 6, 2015Assignee: Microsoft CorporationInventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
-
Publication number: 20140298465Abstract: The claimed subject matter is directed to the use of an application reputation service to assist users with minimizing their computerized machines' exposure to and infection from malware. Specifically, the claimed subject matter provides a method and system of an application reputation service that contains the reputations for elements that are known to be non-malicious as well as those known to be malicious. One embodiment of the claimed subject matter is implemented as a method to determine the reputation of an element (e.g., an application). When a user attempts to install or execute a new application, the Application Reputation Service is queried by the user's machine with a set of identities for the element. The Application Reputation Service determines the reputation of the application by referencing a knowledge base of known reputations and returns an indication (e.g., an overall rating, or a flag) of how safe that application would be to install and run on the user's computer.Type: ApplicationFiled: June 12, 2014Publication date: October 2, 2014Inventors: Geoff Hulten, Paul Steve Rehfuss, Ron Franczyk, Christopher A. Meek, John Scarrow, Andrew Newman
-
Patent number: 8769702Abstract: The claimed subject matter is directed to the use of an application reputation service to assist users with minimizing their computerized machines' exposure to infection from malware. The claimed subject matter provides an application reputation service that contains the reputations for elements that are known to be non-malicious as well as those known to be malicious. One embodiment is implemented as a method to determine the reputation of an element (e.g., an application). When a user attempts to install or execute a new application, the Application Reputation Service is queried by the user's machine with a set of identities for the element. The reputation of the application is determined by referencing a knowledge base of known reputations and returns an indication (e.g., an overall rating, or a flag) of how safe that application would be to install and run on the user's computer.Type: GrantFiled: April 16, 2008Date of Patent: July 1, 2014Assignee: Micosoft CorporationInventors: Geoff Hulten, Steve Rehfuss, Ron Franczyk, Christopher A. Meek, John Scarrow, Andrew Newman
-
Publication number: 20130232515Abstract: Technologies described herein relate to estimating engagement of a person with respect to content being presented to the person. A sensor outputs a stream of data relating to the person as the person is consuming the content. At least one feature is extracted from the stream of data, and a level of engagement of the person is estimated based at least in part upon the at least one feature. A computing function is performed based upon the estimated level of engagement of the person.Type: ApplicationFiled: April 19, 2013Publication date: September 5, 2013Applicant: Microsoft CorporationInventors: Javier Hernandez Rivera, Zicheng Liu, Geoff Hulten, Michael Conrad, Kyle Krum, David DeBarr, Zhengyou Zhang
-
Publication number: 20120167213Abstract: A method of safe file transmission and reputation lookup is provided. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.Type: ApplicationFiled: March 5, 2012Publication date: June 28, 2012Applicant: Microsoft CorporationInventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
-
Patent number: 8146151Abstract: Safe file transmission and reputation lookup. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.Type: GrantFiled: February 27, 2008Date of Patent: March 27, 2012Assignee: Microsoft CorporationInventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson
-
Patent number: 8028031Abstract: Determining email filtering type based on sender classification. Incoming email is accessed and a sender of the incoming email is identified. The reputation of the sender of the incoming email is determined. An email sender classification is made based on the reputation of the sender. A determination of the type of filtering operations to be performed by an email filter on the email is made based on the classification. The parameters of the type of filtering operations to be performed are determined. The parameters of the type of filtering operations to be performed are provided to the email filter.Type: GrantFiled: June 27, 2008Date of Patent: September 27, 2011Assignee: Microsoft CorporationInventors: Ryan Colvin, Chad Mills, Robert McCann, Geoff Hulten, Harry Katz, Eriola Kruja, Xin Huang, Joshua Korb
-
Publication number: 20100005291Abstract: The claimed subject matter is directed to the use of an application reputation service to assist users with minimizing their computerized machines' exposure to and infection from malware. Specifically, the claimed subject matter provides a method and system of an application reputation service that contains the reputations for elements that are known to be non-malicious as well as those known to be malicious. One embodiment of the claimed subject matter is implemented as a method to determine the reputation of an element (e.g., an application). When a user attempts to install or execute a new application, the Application Reputation Service is queried by the user's machine with a set of identities for the element. The Application Reputation Service determines the reputation of the application by referencing a knowledge base of known reputations and returns an indication (e.g., an overall rating, or a flag) of how safe that application would be to install and run on the user's computer.Type: ApplicationFiled: April 16, 2008Publication date: January 7, 2010Applicant: MICROSOFT CORPORATIONInventors: Geoff Hulten, Steve Rehfuss, Ron Franczyk, Christopher A. Meek, John Scarrow, Andrew Newman
-
Publication number: 20090327430Abstract: Determining email filtering type based on sender classification. Incoming email is accessed and a sender of the incoming email is identified. The reputation of the sender of the incoming email is determined. An email sender classification is made based on the reputation of the sender. A determination of the type of filtering operations to be performed by an email filter on the email is made based on the classification. The parameters of the type of filtering operations to be performed are determined. The parameters of the type of filtering operations to be performed are provided to the email filter.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: Ryan COLVIN, Chad MILLS, Robert McCANN, Geoff HULTEN, Harry Katz, Eriola KRUJA, Xin HUANG, Joshua KORB
-
Publication number: 20090217370Abstract: Safe file transmission and reputation lookup. As a part of the safe file transmission and reputation lookup methodology, a data file that is to be made available to a data file receiver is accessed and it is determined whether the data file needs to be provided a protective file. The data file is wrapped in a protective file to create a non-executing package file. Access is provided to the non-executing package file where the associated data file is prevented from being executed until data file reputation information is received.Type: ApplicationFiled: February 27, 2008Publication date: August 27, 2009Applicant: MICROSOFT CORPORATIONInventors: Geoff Hulten, John Scarrow, Ivan Osipkov, Kristofer N. Iverson