Patents by Inventor Sanjib Saha
Sanjib Saha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240082238Abstract: The invention provides methods, compositions, and kits that are useful for treating cancer (e.g., endometrial cancer).Type: ApplicationFiled: August 18, 2022Publication date: March 14, 2024Applicant: UNIVERSITY OF IOWA RESEARCH FOUNDATIONInventors: Aliasger K. Salem, Kareem Ebeid, Youssef Wahib Naguib Ibrahim, Sanjib Saha, Emad I. Wafa, Suhaila Alhaj-Suliman
-
Publication number: 20220249399Abstract: A composition comprising an amount of an anti-oxidant comprising one or more of ubiquinol, MitoQ, vitamin E, vitamin C, ascorbate-2-phosphate, idebenone, pyrroloquinoline quinone (PQQ), N-acetyl-L-cysteine (NAC), palmitate, reduced glutathione, or a C14-C18 saturated fatty acid effective to preserve, e.g., corneal tissue, and methods of using the composition, are provided.Type: ApplicationFiled: March 4, 2020Publication date: August 11, 2022Inventors: Aliasger K. Salem, Youssef Wahib Naguib lbrahim, Somaya Ali Mohammed Elsaid Abdelrahman, Jessica M. Skeie, Benjamin T. Aldrich, Gregory Schmidt, Cynthia R. Reed, Mark A. Greiner, Darryl Y. Nishimura, Sanjib Saha
-
Patent number: 11327774Abstract: A method for personalizing resource strings within a user interface of a computing device. The method includes accessing a personalization editor via the computing device, and receiving a user modification to a resource string associated with one or more applications. The method also includes storing an original unmodified resource string associated with the resource string, the modified resource string, and the associated applications. The method also includes receiving a request from a first application for a first resource string associated with a specified resource identifier. The method also includes determining if the first resource string has an associated modified resource string stored in the personalized resource string database, and displaying the modified resource string based on the first resource string being determined to be associated with the modified resource string stored in the personalized resource string database.Type: GrantFiled: December 27, 2018Date of Patent: May 10, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Abhijit Chatterjee, Sanjib Saha, Neil Andrew Brench, Jack Lee Miller, Mithun Sibi Thomas, Andrei V. Nagornyi
-
Patent number: 11307838Abstract: In a device for de-duplicating localized resources including a processor and a memory in communication with the processor, the memory includes executable instructions that, when executed by the processor, cause the processor to control the device to perform functions of accessing, from a data storage, a source resource package and a localized resource package containing first and second resources, respectively; filtering the localized resource package to identify the second resources that are not duplicates of the first resources; creating, based on the first resources, a language-neutral resource collection including a plurality of language-neutral resources; creating a localized resource collection including the second resources that are not duplicates of the first resources; and creating a deployment resource package containing the language-neutral and localized resource collections.Type: GrantFiled: May 21, 2020Date of Patent: April 19, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Anatoliy Burukhin, Sanjib Saha, Mithun Sibi Thomas
-
Publication number: 20220035895Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: ApplicationFiled: August 10, 2021Publication date: February 3, 2022Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Publication number: 20210365254Abstract: In a device for de-duplicating localized resources including a processor and a memory in communication with the processor, the memory includes executable instructions that, when executed by the processor, cause the processor to control the device to perform functions of accessing, from a data storage, a source resource package and a localized resource package containing first and second resources, respectively; filtering the localized resource package to identify the second resources that are not duplicates of the first resources; creating, based on the first resources, a language-neutral resource collection including a plurality of language-neutral resources; creating a localized resource collection including the second resources that are not duplicates of the first resources; and creating a deployment resource package containing the language-neutral and localized resource collections.Type: ApplicationFiled: May 21, 2020Publication date: November 25, 2021Applicant: Microsoft Technology Licensing, LLCInventors: Anatoliy BURUKHIN, Sanjib SAHA, Mithun Sibi THOMAS
-
Patent number: 11115423Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: GrantFiled: July 10, 2019Date of Patent: September 7, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, Jr., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Publication number: 20200210211Abstract: A method for personalizing resource strings within a user interface of a computing device. The method includes accessing a personalization editor via the computing device, and receiving a user modification to a resource string associated with one or more applications. The method also includes storing an original unmodified resource string associated with the resource string, the modified resource string, and the associated applications. The method also includes receiving a request from a first application for a first resource string associated with a specified resource identifier. The method also includes determining if the first resource string has an associated modified resource string stored in the personalized resource string database, and displaying the modified resource string based on the first resource string being determined to be associated with the modified resource string stored in the personalized resource string database.Type: ApplicationFiled: December 27, 2018Publication date: July 2, 2020Inventors: Abhijit CHATTERJEE, Sanjib SAHA, Neil Andrew BRENCH, Jack Lee MILLER, Mithun Sibi THOMAS, Andrei V. NAGORNYI
-
Publication number: 20200045055Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: ApplicationFiled: July 10, 2019Publication date: February 6, 2020Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Patent number: 10389731Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: GrantFiled: November 22, 2016Date of Patent: August 20, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, Jr., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Patent number: 10338962Abstract: A system and method of using metrics to control throttling and swapping in a message processing system is provided. A workload status of a message processing system is determined, and the system polls for a new message according to the workload status. The message processing system identifies a blocked instance and calculates an expected idle time for the blocked instance. The system dehydrates the blocked instance if the expected idle time exceeds a predetermined threshold.Type: GrantFiled: October 10, 2016Date of Patent: July 2, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Yossi Levanoni, Sanjib Saha, Bimal Kumar Mehta, Paul Maybee, Lee B. Graber, Balasubramanian Sriram, Eldar Azerovich Musayev, Kevin Bowen Smith
-
Patent number: 9998866Abstract: The location of a computing device is determined, and the location of an area of interest that is a geographic area referred to as a geo-fence is identified. The accuracy of the determined location of the computing device has an associated uncertainty, so the exact position of the computing device cannot typically be pinpointed. In light of this, the uncertainty associated with the determined location is evaluated relative to the size of the geo-fence in order to determine whether the computing device is inside the geo-fence or outside the geo-fence. Based on this determination, various actions can be taken if the user is entering the geo-fence, exiting the geo-fence, remaining in the geo-fence for at least a threshold amount of time, and so forth.Type: GrantFiled: June 14, 2013Date of Patent: June 12, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Lanny D. Natucci, Jr., Janet L Schneider, Mark A. Inderhees, Frank Gorgenyi, Stuart J. Harper, Cristina del Amo Casado, Fernando Gonzalez, Sanjib Saha, Shaun C. Hedrick
-
Publication number: 20180145990Abstract: Techniques described herein provide multi-factor authentication based on positioning data. Generally described, configurations disclosed herein enable a system to authorize a particular action using positioning data, and possibly other data, associated with an identity. For example, when a user wishes to change a password or access a secured account, the system can authenticate a user if a device associated with the user is located in the secure area. The system can authenticate a user if a requested operation and/or a predetermined pattern of movement associated with the user is detected. For instance, the system allows the user to change the password when the user's computer has followed a predetermined pattern of movement, and when one or more verification procedures meets one or more criteria while the location of the computing device is within the predetermined area.Type: ApplicationFiled: November 22, 2016Publication date: May 24, 2018Inventors: Stephen P. DiAcetis, David Mahlon Hoover, Cristina del Amo Casado, Lanny D. Natucci, JR., Janet Lynn Schneider, Sanjib Saha, Fernando Gonzalez, Jonathan Matthew Kay
-
Publication number: 20180049132Abstract: A device location is determined, and the location of an area of interest that is a geographic area referred to as a geo-fence is identified. Multiple geo-fences can be identified by the device, and different geo-fences can be associated with different programs on the device. An operating system of the device implements multiple different periods of operation for the device, including a conservation period during which certain programs are not typically scheduled to run, and an execution period during which such programs are typically scheduled to run. A system identifies geo-fence events, which occur when the device enters or exits the geo-fence. The system maintains a record of the geo-fence events for each of multiple geo-fences, and provides to a program selected ones of those geo-fence events at a time when the program is scheduled to run on the device during an execution period of the operating system.Type: ApplicationFiled: October 6, 2017Publication date: February 15, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Frank Gorgenyi, Daniel Estrada Alva, Fernando Gonzalez, Sanjib Saha
-
Patent number: 9820231Abstract: A device location is determined, and the location of an area of interest that is a geographic area referred to as a geo-fence is identified. Multiple geo-fences can be identified by the device, and different geo-fences can be associated with different programs on the device. An operating system of the device implements multiple different periods of operation for the device, including a conservation period during which certain programs are not typically scheduled to run, and an execution period during which such programs are typically scheduled to run. A system identifies geo-fence events, which occur when the device enters or exits the geo-fence. The system maintains a record of the geo-fence events for each of multiple geo-fences, and provides to a program selected ones of those geo-fence events at a time when the program is scheduled to run on the device during an execution period of the operating system.Type: GrantFiled: June 14, 2013Date of Patent: November 14, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Frank Gorgenyi, Daniel Estrada Alva, Fernando Gonzalez, Sanjib Saha
-
Patent number: 9749794Abstract: A computing device includes at least one processor and a memory, the memory storing computer-executable instructions for causing the device to be configured to load a subset of geo-fences from secondary storage to primary storage for tracking by the computing device, the subset of geo-fences selected from a set of available geo-fences stored in the secondary storage, based on a selection criteria. The computing device further creates a boundary geo-fence with a radius corresponding to a distance between a current location of the computing device and an edge of a geo-fence in the subset of geo-fences that is furthest from the current location of the computing device. Upon detecting a geo-fence event associated with a new location of the computing device in relation to the boundary geo-fence, a new subset of geo-fences is re-loaded, and a new boundary geo-fence is created based on the new location of the computing device.Type: GrantFiled: December 28, 2015Date of Patent: August 29, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Sanjib Saha, Fernando Gonzalez, Shaun Hedrick, Parmjeet Singh, Ashish Gadre, Frank Gorgenyi, Mark Inderhees, Janet Schneider, Stuart Harper
-
Publication number: 20170024252Abstract: A system and method of using metrics to control throttling and swapping in a message processing system is provided. A workload status of a message processing system is determined, and the system polls for a new message according to the workload status. The message processing system identifies a blocked instance and calculates an expected idle time for the blocked instance. The system dehydrates the blocked instance if the expected idle time exceeds a predetermined threshold.Type: ApplicationFiled: October 10, 2016Publication date: January 26, 2017Inventors: Yossi Levanoni, Sanjib Saha, Bimal Kumar Mehta, Paul Maybee, Lee B. Graber, Balasubramanian Sriram, Eldar Azerovich Musayev, Kevin Bowen Smith
-
Patent number: 9471392Abstract: A system and method of using metrics to control throttling and swapping in a message processing system is provided. A workload status of a message processing system is determined, and the system polls for a new message according to the workload status. The message processing system identifies a blocked instance and calculates an expected idle time for the blocked instance. The system dehydrates the blocked instance if the expected idle time exceeds a predetermined threshold.Type: GrantFiled: July 14, 2008Date of Patent: October 18, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Yossi Levanoni, Sanjib Saha, Bimal Kumar Mehta, Paul Maybee, Lee Graber, Balasubramanian Sriram, Eldar Azerovich Musayev, Kevin Bowen Smith
-
Publication number: 20160135005Abstract: A computing device includes at least one processor and a memory, the memory storing computer-executable instructions for causing the device to be configured to load a subset of geo-fences from secondary storage to primary storage for tracking by the computing device, the subset of geo-fences selected from a set of available geo-fences stored in the secondary storage, based on a selection criteria. The computing device further creates a boundary geo-fence with a radius corresponding to a distance between a current location of the computing device and an edge of a geo-fence in the subset of geo-fences that is furthest from the current location of the computing device. Upon detecting a geo-fence event associated with a new location of the computing device in relation to the boundary geo-fence, a new subset of geo-fences is re-loaded, and a new boundary geo-fence is created based on the new location of the computing device.Type: ApplicationFiled: December 28, 2015Publication date: May 12, 2016Applicant: Microsoft Technology Licensing, LLCInventors: Sanjib Saha, Fernando Gonzalez, Shaun Hedrick, Parmjeet Singh, Ashish Gadre, Frank Gorgenyi, Mark Inderhees, Janet Schneider, Stuart Harper
-
Patent number: 9258677Abstract: Systems and methods disclosed herein may include tracking one or more geo-fences using a GNSS hardware processor within a computing device. The tracking may use at least one GNSS signal. State changes of the one or more geo-fences during the tracking may be saved in a shared state database. The shared state database may be shared between the GNSS hardware processor and an application processor within the computing device. Upon detecting a deterioration of the at least one GNSS signal, tracking the one or more geo-fences may be switched from using the GNSS hardware processor to using the application processor. After the switching, an initial state of each of the one or more geo-fences may be set by using states currently stored in the shared state database prior to the switching.Type: GrantFiled: November 21, 2013Date of Patent: February 9, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Sanjib Saha, Fernando Gonzalez, Shaun Hedrick, Parmjeet Singh, Ashish Gadre, Frank Gorgenyi, Mark Inderhees, Janet Schneider, Stuart Harper