Patents by Inventor Murali R.
Murali R. has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8229735Abstract: A visualization development system is provided. The system includes a visualization tool to develop one or more visualizations and a grammar engine that operates with the visualization tool to automatically detect visualization problems during the development of the visualizations.Type: GrantFiled: June 27, 2008Date of Patent: July 24, 2012Assignee: Microsoft CorporationInventors: George G. Robertson, Brian Scott Ruble, William G. Morein, Sean Michael Boon, Nathan Paul McCoy, Jakob Peter Nielsen, Michael Ehrenberg, Joshua Wyndham Lee, Jason Joseph Weber, Murali R. Krishnan, Stella Yick Chan
-
Patent number: 8214765Abstract: The claimed subject matter relates to an architecture that can construct a map for summarizing analyses with respect to data included in a database. In addition, the architecture can display the map in a special canvas area. Generally, the map is a hub-and-spoke-style map in which a hub is associated with an entity (e.g., a related set of records) included in a database. Likewise, the spokes are typically representative of operations (e.g., filter, join, transform) that act upon the hub/entity from which it extends. The map can aid with open-ended analysis on complex databases by recording and ordering competing hypotheses and can also further collaborative efforts with respect to analysis.Type: GrantFiled: June 20, 2008Date of Patent: July 3, 2012Assignee: Microsoft CorporationInventors: Morten Holm-Petersen, George G. Robertson, Christian Olaf Abeln, Thomas Michael Casey, Stella Yick Chan, Benjamin L. Chronister, Ian Michael Dunmore, Roland Fernandez, Danyel Fisher, David Francis Gainer, Alexandre Gorev, Ahmed Kamal, Matthew Jay Kotler, Murali R. Krishnan, Bongshin Lee, Greg Schechter, Curtis G. Wong
-
Publication number: 20120143758Abstract: Account transfer techniques are described. In one or more implementations, a user interface is output by a mobile communication device that describes funds in an account. The account is usable by the mobile communication device to purchase goods or service and the purchase performable at least in part using credentials stored in a secure element implemented in hardware of the mobile communication device. An input is received via interaction with the user interface to authorize a transfer of funds from the account associated with the mobile communication device to another account usable by another mobile communication device to purchase goods or services.Type: ApplicationFiled: December 1, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan, Miller Thomas Abel, Rupali Jain
-
Publication number: 20120143669Abstract: Loyalty offer modeling techniques are described. In one or more implementations, interaction with a loyalty service via a network is performed to model one or more loyalty offers for a use in conjunction with a merchant. Information is transmitted via the network for receipt by the loyalty service, at least a portion of the information describing consumer interaction with the merchant that pertains to the loyalty offer that is sufficient for use by the loyalty service to manage participation of the consumers with the one or more loyalty offers of the merchant.Type: ApplicationFiled: December 2, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan, Miller Thomas Abel
-
Publication number: 20120143769Abstract: Commerce card techniques are described. In one or more implementations, one or more credentials are received at a commerce card, the credentials encrypted using a public key. The one or more credentials are decrypted using a private key that corresponds to the public key, the decrypting performed by a secure element implemented in tamper-resistant hardware of the commerce card without exposing the private key outside of the secure element. The decrypted one or more credentials are stored within the secure element of the commerce card such that the decrypted one or more credentials are not exposed outside of the secure element, the one or more credentials usable by the commerce card as part of a transaction to purchase a good or service.Type: ApplicationFiled: December 2, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Murali R. Krishnan, Anoop Anantha
-
Publication number: 20120144201Abstract: Secure element authentication techniques are described. In implementations, a confirmation is received that an identity of a user has been physically verified using one or more physical documents. One or more credentials that are usable to authenticate the user are caused to be stored in a secure element of a mobile communication device of the user, the secure element implemented using tamper-resistant hardware.Type: ApplicationFiled: December 3, 2010Publication date: June 7, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan, Alan L. Marshall, Kamran Rajabi Zargahi, Miller Thomas Abel
-
Publication number: 20120089450Abstract: Loyalty offer techniques are described. In one or more implementations, data is received from a plurality of merchants via a network, the data describing transactions for goods or services initiated at physical locations of respective said merchants and including identifiers that uniquely identify mobile communication devices that were used to initiate the transactions. Information is updated that describes participation in one or more loyalty offers associated with the plurality of merchants using the identifiers that uniquely identify the mobile communication devices and the data that describes the transactions.Type: ApplicationFiled: October 7, 2010Publication date: April 12, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan
-
Publication number: 20120084138Abstract: Advertisement management techniques are described. In one or more implementations, a plurality of identifiers are collected of advertisements communicated to respective ones of a plurality of mobile communication devices, each identifier exposed by a respective mobile communication device at a physical location of a merchant. A monetary amount is calculated to be provided to a service that was involved in providing the one or more advertisements to the mobile communication device.Type: ApplicationFiled: October 5, 2010Publication date: April 5, 2012Applicant: MICROSOFT CORPORATIONInventors: Anoop Anantha, Murali R. Krishnan
-
Publication number: 20120025971Abstract: A method and apparatus are provided for finding fires. The method includes providing a plurality of reference locations within a facility where each of the reference locations is associated with a readily identifiable feature of the facility, detecting a fire within the facility, receiving a fire location request from a monitoring location within the facility and dynamically generating a routing map from the monitoring location to a location of the fire and from the fire to a fire exit of the facility using at least some of the plurality of reference locations based upon the request.Type: ApplicationFiled: July 27, 2010Publication date: February 2, 2012Applicant: Honeywell International Inc.Inventors: Arunkumar K., Murali R., Deepak Sundar
-
Publication number: 20110205912Abstract: A method and apparatus for performing packet time measurements. In one embodiment, the method comprises transmitting a packet in the network from a sender to a receiver through a plurality of devices; creating a plurality of packets by copying the packet at each of the plurality of devices as the packet is being transmitted through the plurality of devices, including adding a time stamp to each packet in the plurality of packets, wherein time stamps of plurality of packets are generated with data from time stamp engines synchronized to a global clock; sending the plurality of packets with their time stamps to a tool; and performing analysis on the plurality of packets using the tool.Type: ApplicationFiled: February 19, 2010Publication date: August 25, 2011Inventors: Patrick Pak Tak Leong, Murali R. Bommana
-
Patent number: 7873598Abstract: A method and a processing device may be provided for creating a shadow database, having a size being approximately a desired percentage of a size of a relational database. Referential integrity of tables of the relational database may be preserved in the created shadow database. A representation of a connected graph may be created, based on a schema description of the relational database, and may be used to find driving tables and related tables of the relational database. Portions of driving tables of the relational database may be copied to corresponding tables of the shadow database and rows of tables of the relational database, related to the copied portions of the driving tables, may be copied to corresponding tables of the shadow database in a number of iterations until the size of the shadow database is approximately the desired percentage of the size of the relational database.Type: GrantFiled: April 15, 2008Date of Patent: January 18, 2011Assignee: Microsoft CorporationInventors: Hui Shi, Kenton Gidewall, Marcelo M. De Barros, Chan Chaiyochlarb, Murali R. Krishnan, Robert Irwin Voightmann, Christina Ruth Dhanaraj
-
Publication number: 20100304699Abstract: Methods and circuits for positioning a signal sampling window within a wireless receiver device for use in a multi-transmitter wireless broadcast network include generating a long channel model based upon a signal identifying transmitters that can be processed without aliases, and positioning the signal sampling window based upon the long channel model. For example, in a MediaFLO® broadcast, the long channel model may be generated by receiving positioning pilot channel (PPC) signals. Positions for the signal sampling window may be determined by identifying hypothetical signal sampling window positions, calculating signal to interference and noise ratio (SINR) values for each identified hypothetical, and selecting the hypothetical with the best SINR. Using a long channel model to position the signal sampling window may provide improved window placement, reduce destructive aliasing, and reduce a time guard in the window placement. The long channel model may be used in conjunction with terrain databases.Type: ApplicationFiled: May 25, 2010Publication date: December 2, 2010Applicant: QUALCOMM IncorporatedInventors: GORDON K. WALKER, Murali R. Chari, Fuyun Ling
-
Publication number: 20100260161Abstract: Methods and devices for encoding and interleaving data packets for broadcast and for de-interleaving and decoding data packets in a communication system eliminate detrimental biasing effects by using pseudo-random M-sequence bit encoding as part of the turbo encoding and decoding. The use of pseudo-random M-sequence bit encoding mitigates biasing effects that may otherwise be introduced if conventional r-c interleaving is applied to long turbo encoded data which would degrade reception in the presence of broadcast interference.Type: ApplicationFiled: April 8, 2010Publication date: October 14, 2010Applicant: QUALCOMM IncorporatedInventors: DURK L. VAN VEEN, Murali R. Chari, Thomas Sun
-
Publication number: 20100195628Abstract: Methods, systems and apparatus, including computer programs encoded on computer storage media, for operating time division multiplexing (TDM) on segments of MediaFLO superframes comprising: generating a MediaFLO OFDM waveform with at least one MediaFLO frame; allocating a MediaFLO local multiplex time segment in the at least one MediaFLO frame for non-MediaFLO data; and inserting the non-MediaFLO data into the MediaFLO local multiplex time segment. In one example, the non-MediaFLO data is a DVB-H table that is split into two time segments within the MediaFLO OFDM waveform. In another aspect, the apparatus and method for operating time division multiplexing (TDM) on alternate whole superframes of time comprising generating a MediaFLO OFDM waveform with a plurality of MediaFLO superframes; multiplexing the MediaFLO OFDM waveform with non-MediaFLO data over the plurality of MediaFLO superframes for whole superframe durations; and inserting MediaFLO data in at least one of the plurality of MediaFLO superframes.Type: ApplicationFiled: January 29, 2010Publication date: August 5, 2010Applicant: QUALCOMM IncorporatedInventors: GORDON K. WALKER, Murali R. Chari
-
Publication number: 20100080163Abstract: A venue-cast system and method for providing and receiving venue level transmissions and services, including discovery of a venue specific transmission by receiving an overhead signal from a non-venue network, extracting information for receiving the venue specific transmission from the overhead signal, and tuning to receive the venue specific transmission based on the extracted information. The venue level transmission may be provided and received in a manner that does not prevent an access terminal from receiving a local area or wide area transmission.Type: ApplicationFiled: September 29, 2009Publication date: April 1, 2010Applicant: QUALCOMM IncorporatedInventors: Raghuraman Krishnamoorthi, Pankaj V. Rahate, Pankaj Jain, Devarshi P. Shah, Pavel A. Seliverstov, George A. Rothrock, Nilabh Khare, Anil K. Wadhwani, Jiming Guo, Sanjiv Nanda, Fuyun Ling, Murali R. Chari, Avneesh Agrawal, Rinat Burdo, Prasanna Kannan, Krishna K. Mukkavilli, Reynaldo W. Newman, Michael M. Fan, Manoj M. Deshpande, Ranjith S. Jayaram
-
Patent number: 7680035Abstract: The adaptive bandwidth throttling system implements a graceful diminution of services to the clients by delaying a first class of services provided by a network server in response to the effective bandwidth utilized by this network server exceeding a first threshold. If the demand for the bandwidth by this network server exceeds a second threshold, the bandwidth throttling system escalates the throttling response and blocks the first class of services from execution and can also concurrently delay execution of a second class of services. The implementation of the throttling process can be varied, to include additional levels of response or finer gradations of the response, to include subsets of a class of services. In addition, the threshold levels of bandwidth used to trigger the throttling response can be selected as desired by the system administrator.Type: GrantFiled: June 28, 2006Date of Patent: March 16, 2010Assignee: Microsoft CorporationInventor: Murali R. Krishnan
-
Patent number: 7669177Abstract: The present systems and methods disclose a system for personalizing computer functionality. End-users are provided with tools to easily write rich and complex preferences, for example, by using a plurality simple IF-THEN propositional logic. The preferences are then transformed into queries and executed efficiently on structured data. Preferences that are satisfied then execute actions such as providing notification or storing data in a particular folder. Furthermore, according to an aspect of the invention, data, logic, events, inter alia, are all schematized, thereby enabling sharing of data between application components and across applications.Type: GrantFiled: October 24, 2003Date of Patent: February 23, 2010Assignee: Microsoft CorporationInventors: Robert H. Gerber, Holly Knight, Murali R. Krishnan, Niranjan Nilakantan, Shahaf Abileah, Shyamalan Pather
-
Publication number: 20090322756Abstract: Various types of data can be collected into a data set and related content and/or related concepts across the data in the data set and/or across search histories can be displayed as a visual representation. The related content/concepts can be presented as a function of incremental revealing of relationships. After reviewing the visual representation, a user can customize the data set and relationships by specifically excluding a related data segment. The visual representation can be applied across multiple searches or other obtained data. Through interaction with the visual representation, a user can drill down into common linkages of the data to more narrowly focus on a subset of the data and/or to refocus a search result and/or to provide annotations.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: George G. Robertson, Danyel A. Fisher, Bongshin Lee, Roland L. Fernandez, Lev Boris Nachmanson, Timothy Garry Dwyer, Mikkel Ronne Jakobsen, Olga Kulyk, Matthew Jay Kotler, Kipper V. Jewsbury, Brian L. Welcker, Gur Kimchi, Morten Holm-Peterson, Stella Yick Chan, Jason J. Weber, B. Scott Ruble, Murali R. Krishnan, Benjamin L. Chronister, Christian Olaf Abeln
-
Publication number: 20090326921Abstract: A visualization development system is provided. The system includes a visualization tool to develop one or more visualizations and a grammar engine that operates with the visualization tool to automatically detect visualization problems during the development of the visualizations.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: George G. Robertson, Brian Scott Ruble, William G. Morein, Sean Michael Boon, Nathan Paul McCoy, Jakob Peter Nielsen, Michael Ehrenberg, Joshua Wyndham Lee, Jason Joseph Weber, Murali R. Krishnan, Stella Yick Chan
-
Publication number: 20090327921Abstract: Modifications to a collection of data are maintained in chronological order and selectively rendered as a function of time. The selective rendering can include an animated version of the modification, which can include a timeline of events. The modifications can be associated with related data that includes information as to who made the modification, when the modification was made, and so forth. The related data can also include a motivation behind the modification. Further, confidence information can be related to the modification to add further detail to the modifications and events surrounding the collection of data.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: Morten Holm-Peterson, George G. Robertson, William G. Morein, Jason J. Weber, Danyel Aharon Fisher, Gur Kimchi, Benjamin Edward Rampson, Ahmed K. Kamal, Kipper Jewsbury, Benjamin L. Chronister, Roland L. Fernandez, Christian Olaf Abeln, B. Scott Ruble, Stella Yick Chan, Murali R. Krishnan, Brian L. Welcker, Bongshin Lee