Patents by Inventor Kamran Rajabi Zargahi
Kamran Rajabi Zargahi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11057102Abstract: Solutions for performing on-platform analytics for collected images include: enriching, on-board an orbital platform, collected images using a packaged analytics component; based at least on content of the collected images, selecting a set of the collected images to transmit to a ground station; and transmitting the selected set of the collected images to the ground station. Other solutions include: packaging an analytics component for on-platform execution by a platform in orbit; transmitting, from a ground station to the platform, at least one update selected from the list consisting of: an analytics algorithm update, a machine learning (ML) model, and ML training data; and executing the analytics component with the update. Other solutions include: performing intelligent compression on collected images, wherein the intelligent compression process determines data to transmit to a ground station, based at least on content of the collected images; and transmitting the data to the ground station.Type: GrantFiled: May 30, 2019Date of Patent: July 6, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Kamran Rajabi Zargahi, Ranveer Chandra
-
Publication number: 20200334442Abstract: Solutions for performing on-platform analytics for collected images include: enriching, on-board an orbital platform, collected images using a packaged analytics component; based at least on content of the collected images, selecting a set of the collected images to transmit to a ground station; and transmitting the selected set of the collected images to the ground station. Other solutions include: packaging an analytics component for on-platform execution by a platform in orbit; transmitting, from a ground station to the platform, at least one update selected from the list consisting of: an analytics algorithm update, a machine learning (ML) model, and ML training data; and executing the analytics component with the update. Other solutions include: performing intelligent compression on collected images, wherein the intelligent compression process determines data to transmit to a ground station, based at least on content of the collected images; and transmitting the data to the ground station.Type: ApplicationFiled: May 30, 2019Publication date: October 22, 2020Inventors: Kamran Rajabi ZARGAHI, Ranveer CHANDRA
-
Publication number: 20200336202Abstract: Solutions for performing on-platform analytics for collected images include: enriching, on-board an orbital platform, collected images using a packaged analytics component; based at least on content of the collected images, selecting a set of the collected images to transmit to a ground station; and transmitting the selected set of the collected images to the ground station. Other solutions include: packaging an analytics component for on-platform execution by a platform in orbit; transmitting, from a ground station to the platform, at least one update selected from the list consisting of: an analytics algorithm update, a machine learning (ML) model, and ML training data; and executing the analytics component with the update. Other solutions include: performing intelligent compression on collected images, wherein the intelligent compression process determines data to transmit to a ground station, based at least on content of the collected images; and transmitting the data to the ground station.Type: ApplicationFiled: May 30, 2019Publication date: October 22, 2020Inventors: Kamran Rajabi ZARGAHI, Ranveer CHANDRA
-
Publication number: 20200285968Abstract: Aspects and examples disclosed herein are directed to data enrichment on insulated appliances. An appliance for performing knowledge mining in a disconnected state is operative to: ingest data of a first type from a first data source coupled to the appliance; enrich at least a first portion of the ingested data, when in the disconnected state, with at least one of the cognitive functions of the plurality of containerized cognitive functions; identify at least a second portion of the ingested data for enrichment by a cognitive function that is not within the plurality of containerized cognitive functions; store the enriched data in an index; triage the ingested data and the enriched data in the index for uploading; upload the triaged data when reconnected to a network; and import an updated plurality of containerized cognitive functions when reconnected.Type: ApplicationFiled: May 8, 2019Publication date: September 10, 2020Inventors: Michael Mong-Kuan TSE, Kamran Rajabi ZARGAHI, Samuel Sau Man CHAN, Richard Jason ORTEGA
-
Publication number: 20200285967Abstract: Aspects and examples disclosed herein are directed to data enrichment on insulated appliances. An appliance for performing knowledge mining in a disconnected state is operative to: import a plurality of containerized cognitive functions and a seed index from a service node, when the appliance is initially connected to a network; ingest data of a first type from a first data source coupled to the appliance; enrich at least a first portion of the ingested data, when in the disconnected state, with at least one of the cognitive functions of the plurality of containerized cognitive functions; identify at least a second portion of the ingested data for enrichment by a cognitive function that is not within the plurality of containerized cognitive functions; based at least on knowledge extracted from the enriched data, further enrich the enriched data; and grow the seed index into an enhanced index with the enriched data.Type: ApplicationFiled: May 8, 2019Publication date: September 10, 2020Inventors: Michael Mong-Kuan TSE, Kamran Rajabi ZARGAHI, Samuel Sau Man CHAN, Richard Jason ORTEGA
-
Publication number: 20180295121Abstract: Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.Type: ApplicationFiled: June 13, 2018Publication date: October 11, 2018Inventors: Anoop Anantha, Murali R. Krishnan, Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel
-
Patent number: 9721279Abstract: Determining a mobile operator for a mobile device. The mobile operator is determined using one or more of an international mobile subscriber identity (IMSI) and a current operator name (CON) and service provider name (SPN) pair. Correlations between the IMSI and mobile operators, and between the CON/SPN pairs and mobile operators, are maintained. Correlations between unrecognized CON/SPN pairs and mobile operators are created based on a quantity of requests received from the mobile devices. In some embodiments, identifying the mobile operator enables financial transactions by the mobile device when visiting, for example, a mobile applications store.Type: GrantFiled: March 23, 2010Date of Patent: August 1, 2017Assignee: Microsoft Technology Licensing, LLCInventor: Kamran Rajabi Zargahi
-
Publication number: 20170048232Abstract: Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.Type: ApplicationFiled: November 1, 2016Publication date: February 16, 2017Inventors: Anoop Anantha, Murali R. Krishnan, Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel
-
Patent number: 9542949Abstract: Techniques are described herein that are capable of satisfying specified intent(s) based on multimodal request(s). A multimodal request is a request that includes at least one request of a first type and at least one request of a second type that is different from the first type. Example types of request include but are not limited to a speech request, a text command, a tactile command, and a visual command. A determination is made that one or more entities in visual content are selected in accordance with an explicit scoping command from a user. In response, speech understanding functionality is automatically activated, and audio signals are automatically monitored for speech requests from the user to be processed using the speech understanding functionality.Type: GrantFiled: July 21, 2014Date of Patent: January 10, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Lisa J. Stifelman, Anne K. Sullivan, Adam D. Elman, Larry Paul Heck, Stephanos Tryphonas, Kamran Rajabi Zargahi, Ken H. Thai
-
Patent number: 9525548Abstract: Provisioning techniques are described. In implementations, a particular one of a plurality of public keys are located using an identifier included in a request received via a network. The located public key is communicated via the network, the public key configured to encrypt data that is to be decrypted by a secure element of a mobile communication device, the secure element implemented using hardware and including a private key that is configured to decrypt the data that was encrypted using the public key.Type: GrantFiled: October 21, 2010Date of Patent: December 20, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel, Murali Krishnan, Anoop Anantha
-
Patent number: 9509686Abstract: Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.Type: GrantFiled: December 3, 2010Date of Patent: November 29, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Anoop Anantha, Murali R. Krishnan, Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel
-
Publication number: 20140330570Abstract: Techniques are described herein that are capable of satisfying specified intent(s) based on multimodal request(s). A multimodal request is a request that includes at least one request of a first type and at least one request of a second type that is different from the first type. Example types of request include but are not limited to a speech request, a text command, a tactile command, and a visual command. A determination is made that one or more entities in visual content are selected in accordance with an explicit scoping command from a user. In response, speech understanding functionality is automatically activated, and audio signals are automatically monitored for speech requests from the user to be processed using the speech understanding functionality.Type: ApplicationFiled: July 21, 2014Publication date: November 6, 2014Inventors: Lisa J. Stifelman, Anne K. Sullivan, Adam D. Elman, Larry Paul Heck, Stephanos Tryphonas, Kamran Rajabi Zargahi, Ken H. Thai
-
Patent number: 8788269Abstract: Techniques are described herein that are capable of satisfying specified intent(s) based on multimodal request(s). A multimodal request is a request that includes at least one request of a first type and at least one request of a second type that is different from the first type. Example types of request include but are not limited to a speech request, a text command, a tactile command, and a visual command. A determination is made that one or more entities in visual content are selected in accordance with an explicit scoping command from a user. In response, speech understanding functionality is automatically activated, and audio signals are automatically monitored for speech requests from the user to be processed using the speech understanding functionality.Type: GrantFiled: December 15, 2011Date of Patent: July 22, 2014Assignee: Microsoft CorporationInventors: Lisa J. Stifelman, Anne K. Sullivan, Adam D. Elman, Larry Paul Heck, Stephanos Tryphonas, Kamran Rajabi Zargahi, Ken H. Thai
-
Patent number: 8751524Abstract: An application sequence may be composed in response to a user query. The application sequence may be based upon user data accessed by the application concierge service. Each application within the personalized chain of applications may request and receive data from the application concierge service about the other applications within the chain.Type: GrantFiled: October 29, 2010Date of Patent: June 10, 2014Assignee: Microsoft CorporationInventors: Joseph Futty, Miller T. Abel, Eric P. Gilmore, Kamran Rajabi Zargahi, John Clavin, Viswanath Vadlamani
-
Publication number: 20130159001Abstract: Techniques are described herein that are capable of satisfying specified intent(s) based on multimodal request(s). A multimodal request is a request that includes at least one request of a first type and at least one request of a second type that is different from the first type. Example types of request include but are not limited to a speech request, a text command, a tactile command, and a visual command. A determination is made that one or more entities in visual content are selected in accordance with an explicit scoping command from a user. In response, speech understanding functionality is automatically activated, and audio signals are automatically monitored for speech requests from the user to be processed using the speech understanding functionality.Type: ApplicationFiled: December 15, 2011Publication date: June 20, 2013Applicant: MICROSOFT CORPORATIONInventors: Lisa J. Stifelman, Anne K. Sullivan, Adam D. Elman, Larry Paul Heck, Stephanos Tryphonas, Kamran Rajabi Zargahi, Ken H. Thai
-
Publication number: 20120143694Abstract: Some implementations provide techniques for managing features provided by a computer service. A service side framework may receive usage data relating to an application executed on a client device. One or more behavioral algorithms may be implemented to perform behavioral analysis on the received usage data to identify at least one behavioral trend associated with the application. At least one feature of the computer service may be modified based on at least some of the behavioral analysis performed on the usage data. In some implementations, location data may also be taken into consideration.Type: ApplicationFiled: December 3, 2010Publication date: June 7, 2012Applicant: Microsoft CorporationInventors: Kamran Rajabi Zargahi, John Bruno, Miller T. Abel, Joseph Futty
-
Publication number: 20120143677Abstract: The present disclosure describes a system and method of increasing discoverability of software applications in a marketplace catalog via behavioral data. Specifically, a client monitors behavioral usage of applications with a local usage tracking framework, optionally utilizing a data template. The data is aggregated either on the client or on a server or both, and synchronized with a server storage to be made available via application behavioral services. The client may also host an advertising placement framework to place selected advertising in the view of the client's user. Application behavioral services may apply one or more behavioral algorithms to the aggregated behavioral usage, to generate recommendations to maximize marketplace catalog ranking, visibility and projected revenue.Type: ApplicationFiled: December 3, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: John Bruno, Joseph Futty, Miller T. Abel, Kamran Rajabi Zargahi
-
Publication number: 20120144201Abstract: Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.Type: ApplicationFiled: December 3, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan, Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel
-
Publication number: 20120124028Abstract: Techniques for discovery of applications across a plurality of application stores are described herein. The discovery may be in response to a query and intent process, which may be initiated by a search query. The search query may reveal user intent to discover an application by operation of a search engine. The user intent may be matched with indexed application content. The application content may be obtained by operation of a discovery and indexing process. A crawler may discover and crawl a plurality of application stores. Additionally or alternatively, a feed store may receive direct feeds of application information and links to download locations from a plurality of application stores. Both the discovered data and direct feeds may be sent to an indexer, to create and maintain an index. Search results pages may be returned to provide users with information, links to developer websites and links to download pages from a plurality of application stores.Type: ApplicationFiled: November 12, 2010Publication date: May 17, 2012Applicant: Microsoft CorporationInventors: Steven Charles Tullis, Steven William Macbeth, Ram Nick Talwar, Viswanath Vadlamani, Kamran Rajabi Zargahi
-
Publication number: 20120109999Abstract: An application sequence may be composed in response to a user query. The application sequence may be based upon user data accessed by the application concierge service. Each application within the personalized chain of applications may request and receive data from the application concierge service about the other applications within the chain.Type: ApplicationFiled: October 29, 2010Publication date: May 3, 2012Applicant: Microsoft CorporationInventors: Joseph Futty, Miller T. Abel, Eric P. Gilmore, Kamran Rajabi Zargahi, John Clavin, Viswanath Vadlamani