Patents by Inventor MICROSOFT

MICROSOFT has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140280664
    Abstract: The subject disclosure is directed towards using primary data deduplication concepts for more efficient access of data via content addressable caches. Chunks of data, such as deduplicated data chunks, are maintained in a fast access client-side cache, such as containing chunks based upon access patterns. The chunked content is content addressable via a hash or other unique identifier of that content in the system. When a chunk is needed, the client-side cache (or caches) is checked for the chunk before going to a file server for the chunk. The file server may likewise maintain content addressable (chunk) caches. Also described are cache maintenance, management and organization, including pre-populating caches with chunks, as well as using RAM and/or solid-state storage device caches.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: Microsoft Corporation
  • Publication number: 20140278047
    Abstract: Described is a technology by which driver safety technology such as collision detection is implemented via mobile device (e.g., smartphone) sensors and a cloud service that processes data received from vehicles associated with the devices. Trajectory-related data is received at the cloud service and used to predict collisions between vehicles and/or lane departures of vehicles. To operate the service in real-time with low latency, also described is dividing driving areas into grids, e.g., based upon traffic density, having parallel grid servers each responsible for only vehicles in or approaching its own grid, and other parallel/distributed mechanisms of the cloud service.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: Microsoft Corporation
  • Publication number: 20140267559
    Abstract: Pairing and configuring a computing device for use in a meeting space is provided. An appliance may communicate a broadcast to a computing device which announces the availability of a meeting space for a meeting. The computing device may establish a connection with the appliance. The computing device may then join the meeting in the meeting space.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Inventor: Microsoft Corporation
  • Publication number: 20140278091
    Abstract: The subject disclosure is directed towards resolving an uncertain transportation context by suggesting one or more potential diversions. An automated routing system may generate routing information that includes map data as well as a location of a diversion having an expected cost in compliance with the uncertain transportation context. Such a diversion may be a waypoint that satisfies one or more user needs given an unknown/uncertain destination.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: Microsoft Corporation
  • Publication number: 20140281512
    Abstract: The subject disclosure is directed towards secure query processing over encrypted database records without disclosing information to an adversary except for permitted information. In order to adapting semantic security to a database encryption scheme, a security model for all query processing is specified by a client and used to determine which information is permitted to be disclosed and which information is not permitted. Based upon the security model, a trusted, secure query processor transforms each query and an encrypted database into secure query results. Even though the adversary can view the secure query results during communication to the client, the adversary cannot determine any reliable information regarding the secure query results or the encrypted database.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: Microsoft Corporation
  • Publication number: 20140279719
    Abstract: The subject disclosure is directed towards processing evidence, which may include high-dimensional streaming evidence, into a future belief state. The existing evidence is used to project a belief about a future state. The future belief state may be used to determine whether to wait for additional evidence, or to act now without waiting for additional evidence, e.g., based on a cost of the delay. For example, an autonomous assistant may decide based upon the belief whether to engage a person or not, or to wait for more information before the engagement decision is made.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: Microsoft Corporation
  • Publication number: 20140278634
    Abstract: The subject disclosure is directed towards spatiotemporal crowdsourcing, in which a task including task criteria is received, and an actor set (e.g., human workers) are selected based upon user task preference data and task ability data with respect to accomplishing the task. The actor set is summoned to a location at a time to participate in the task. Spatiotemporal crowdsourcing may be implanted as a service that selects the actor set and tracks state information as to a completion state of the task.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: Microsoft Corporation
  • Publication number: 20140211860
    Abstract: A receiving apparatus comprises a receiver for receiving a video signal, an output for outputting the video signal to a screen, storage device or further terminal; and a concealment module for applying a concealment algorithm to a lost area of the video signal. The concealment module is configured to determine an estimate of concealment quality selectively directed toward a region of interest within the area in question, and based on this estimate to determine whether or not to apply the concealment algorithm.
    Type: Application
    Filed: March 14, 2013
    Publication date: July 31, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: MICROSOFT CORPORATION
  • Publication number: 20140211858
    Abstract: A video signal comprises a sequence of source frames to be encoded. A pre-processing stage determines a region of interest for a plurality of the source frames, and spatially adapts each of the plurality of the source frames to produce a respective warped frame. In the respective warped frame, the region of interest comprises a higher spatial proportion of the warped frame than in the source frame. The pre-processing stage supplies the warped frames to an encoder to be encoded into an encoded version of the video signal.
    Type: Application
    Filed: March 14, 2013
    Publication date: July 31, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: MICROSOFT CORPORATION
  • Publication number: 20140201176
    Abstract: A file system uses data integrity techniques that are a selectable attribute of a file system object. Some file system objects have integrity on for various accesses, while other file system objects do not. Different default settings can be provided for different file system objects. Such a setting for a file system object can be changed to and from having integrity on. Given a file system object with an attribute, the file system provides file system operations for which the data integrity operation used on the file system object depends on this attribute. Such operations include, but are not limited to, operations for changing the attribute, creating file system objects with such attributes, providing and changing default settings for such attributes, and writing data to and reading data from files, which use different data integrity techniques based on this attribute.
    Type: Application
    Filed: January 15, 2013
    Publication date: July 17, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: Microsoft Corporation
  • Publication number: 20140181093
    Abstract: Systems, methods, and computer-readable media for responding to a search query with search results ranked according to interest circles of a plurality of computer users are presented. Interest circles are formed from a computer user's navigation data, including the computer user's navigation history. A search query is received from a requesting computer user. The search query is directed to a query topic or set of query topics. A set of search results responsive to the search query are obtained. A plurality of computer users, each of the plurality of computer users having an established interest circle corresponding to the query topic, is identified. The set of search results are then ordered according to the interest circles of the identified plurality of computer users. Thereafter, the higher ordered search results are returned to the requesting computer user in response to the search query.
    Type: Application
    Filed: December 21, 2012
    Publication date: June 26, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: Microsoft Corporation
  • Publication number: 20140168229
    Abstract: Embodiments described herein relate to improving throughput of a CPU and a GPU working in conjunction to render graphics. Time frames for executing CPU and GPU work units are synchronized with a refresh rate of a display. Pending CPU work is performed when a time frame starts (a vsync occurs). When a prior GPU work unit is still executing on the GPU, then a parallel mode is entered. In the parallel mode, some GPU work and some CPU work is performed concurrently. When the parallel mode is exited, for example when there is no CPU work to perform, the parallel mode may be exited.
    Type: Application
    Filed: December 14, 2012
    Publication date: June 19, 2014
    Applicant: Microsoft
    Inventor: Microsoft
  • Publication number: 20140164059
    Abstract: Various embodiments provide an ability to detect an input associated with an element for which a cascading operation has been defined. Some embodiments apply the cascading operation to the element, and further apply one or more cascading operations to less than all ancestral elements in an associated tree for which cascading operations have been defined. In some cases, the one or more cascading operations can be applied to one or more respective ancestral elements after a predefined waiting period.
    Type: Application
    Filed: December 11, 2012
    Publication date: June 12, 2014
    Applicant: MICROSOFT CORPORATION
    Inventor: MICROSOFT CORPORATION
  • Publication number: 20140149508
    Abstract: Interfacing a wireless device with web services, including social networking web services, is described. For example, a system for interfacing a wireless device with a plurality of web services comprises a web service proxy having an API to allow other modules to interface with the web service proxy; a plurality of web services adapters interfaced with the web services proxy through the API, each one of the web services adapters configured to communicate with a particular web service using the specific communication formats for the web service; where the web services adapters and the web services proxy convert between the communication formats employed to communicate with each of the web services and a wireless communication format, the wireless communication format being a different format than the communication formats for each of the web services, thereby enabling bi-directional communication between the wireless device and the plurality of web services.
    Type: Application
    Filed: April 22, 2013
    Publication date: May 29, 2014
    Applicant: Microsoft Corporation
    Inventor: Microsoft Corporation
  • Publication number: 20140146825
    Abstract: Shortest-path spanning trees are created outward from each portal on a Rbridge network with nodes on the network being assigned to the spanning trees. For those nodes equidistant to two portals, an election process is used to determine which tree the node should join. To enable routes associated with nodes on the Rbridge network to be distinguished from routes external to the Rbridge network, messages may be transmitted between the portals. The messages enable portals to identify routing updates received from the external network as containing internal routes, so that traffic that is required to pass between nodes on different trees may pass over the Rbridge network rather than over the external network.
    Type: Application
    Filed: May 1, 2013
    Publication date: May 29, 2014
    Applicant: Microsoft Corporation
    Inventor: Microsoft Corporation
  • Publication number: 20140149835
    Abstract: Various embodiments utilize structured data contained within a resource, such as a web page, to enable a user to define collections of data. Individual constituent parts of a collection or “links” are collected within a collection. In one or more embodiments, a full page viewing experience can be provided which enables users to not only view more details for a given link, but to view multiple different links at a time. Other viewing options and collection interactions are provided.
    Type: Application
    Filed: April 19, 2013
    Publication date: May 29, 2014
    Applicant: Microsoft Corporation
    Inventor: Microsoft Corporation
  • Publication number: 20140150119
    Abstract: A security model restricts binary behaviors on a machine based on identified security zones. Binary behaviors can be attached to an element of a document, web-page, or email message. The binary behavior potentially threatens security on the local machine. A security manager intercepts download requests and/or execution requests, identifies a security zone for the requested binary behavior, and restricts access based on the security zone. The binary behavior can identify a security zone according to the related URL. In one example, all binary behaviors associated with a security zone are handled identically. In another example, a list of permissible binary behaviors is associated with a security zone such that only specified binary behaviors are granted access. In still another example, a list of impermissible binary behaviors is associated with a security zone such that binary behaviors that are found in the list cannot initiate access.
    Type: Application
    Filed: April 22, 2013
    Publication date: May 29, 2014
    Applicant: Microsoft Corporation
    Inventor: Microsoft Corporation
  • Publication number: 20140132518
    Abstract: For each of multiple user inputs, multiple keys of a keyboard that are touched as part of the user input are identified. Additionally, for each of the multiple user inputs, multiple characters that are to be displayed concurrently are determined based on the multiple keys that are touched as part of the user input. Both a character input field and the multiple characters determined for each of the multiple user inputs are displayed. One or more suggested inputs can also be displayed, and a user-selected one of the suggested inputs identified as an input to the character input field.
    Type: Application
    Filed: April 8, 2013
    Publication date: May 15, 2014
    Applicant: Microsoft Corporation
    Inventor: Microsoft Corporation
  • Publication number: 20140128038
    Abstract: This document describes various techniques for implementing local voicemail on a mobile device. These techniques may include enabling the mobile device to answer a voice call, record audio of the voice call to provide a voicemail file, and store the voicemail file to local computer-readable media. A locally stored voicemail file may be associated with relevant data, exposed via the associated data for local processing, and/or manipulated through a user interface of the mobile device.
    Type: Application
    Filed: March 28, 2013
    Publication date: May 8, 2014
    Applicant: Microsoft Corporation
    Inventor: Microsoft Corporation
  • Publication number: 20140129817
    Abstract: Booting a computing device includes executing one or more firmware components followed by a boot loader component. A protection component for the computing device, such as an anti-malware program, is identified and executed as an initial component after executing the boot loader component. One or more boot components are also executed, these one or more boot components including only boot components that have been approved by the protection component. A list of boot components that have been previously approved by the protection component can also be maintained in a tamper-proof manner.
    Type: Application
    Filed: April 5, 2013
    Publication date: May 8, 2014
    Applicant: Microsoft Corporation
    Inventor: Microsoft Corporation