Patents by Inventor Stephanie Chou
Stephanie Chou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250123697Abstract: A computer stylus may have a shaft with a metal tube and a cap slidable between open and closed positions. A connector port may be exposed in the open position and hidden in the closed position. An antenna element may be formed from conductive traces on a printed circuit board in the shaft and aligned with a window in the metal tube. The cap may include a metal hook extending from a conductive wall into the shaft. The hook may overlap the antenna element in the closed position. The shaft may include a dielectric bumper in an opening of the hook. The hook and wall may slide relative to the shaft along the dielectric bumper. The cap may include a metal sleeve around the port. The cap may include a conductive bumper on the wall. The conductive bumper may contact the sleeve when the cap is in the closed position.Type: ApplicationFiled: October 16, 2023Publication date: April 17, 2025Inventors: Brandon Y Leung, Zhe Zhang, Caleb J Flori, Lu Zhang, Stephen J Marrone, Harish Rajagopalan, Colin J Abraham, Kevin Bui, Stephanie Chou
-
Publication number: 20250110583Abstract: An input device, such as a stylus, can be operated to determine one or more conditions and select an appropriate operating mode. For example, a stylus can be attached to a host device when not in active use by a user. Attachment can be securely and releasably achieved with magnetic coupling. In such a configuration, the stylus can detect the attachment based on the presence and modification of magnetic fields. Based on such detection, the stylus can select an operating mode that allows power to be conserved when it is determined that certain components of the stylus need not be actively operated.Type: ApplicationFiled: March 22, 2024Publication date: April 3, 2025Inventors: Qigen JI, Jeremy GOLDBERG, Nicolas HUYNH, Patrick LIU, Stephanie CHOU, Stephen J. MARRONE, Youqun DONG
-
Patent number: 10484387Abstract: In an example embodiment, a submission of confidential data is received from a user via a first computerized user interface. An identification of the user is obtained, and details regarding the submission are stored in a submission table. Then a request to display, to the user, statistical information derived from confidential data from users other than the user, is received from a second computerized user interface. Based on information stored in the submission table, a determination is made that the request to display, to the user, statistical information derived from confidential data from users other than the user should be granted. In response to the determining, the statistical information derived from confidential data from users other than the user is displayed via the second computerized user interface.Type: GrantFiled: July 29, 2016Date of Patent: November 19, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Krishnaram Kenthapadi, Ahsan Chudhary, Stephanie Chou, Joseph Florencio, Ryan Wade Sandler, Anthony Duane Duerr
-
Patent number: 10460128Abstract: In an example embodiment, an attribute interference model is trained by a machine learning algorithm to output missing attribute values from a member profile of a social networking service. In an attribute inference phase, an identification of a member of a social networking service is obtained. A member profile corresponding to the member of the social networking service is retrieved using the identification. The member profile is then passed to the attribute inference model to generate one or more missing attribute values for the member profile. A collection flow, defined in a user interface of a computing device, is modified based on the generated one or more missing attribute values, the collection flow defining a sequence of screens for collecting confidential data. The modified collection flow is then presented to the member in the user interface to collect confidential data from the member.Type: GrantFiled: October 31, 2018Date of Patent: October 29, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Krishnaram Kenthapadi, Stephanie Chou, Ahsan Chudhary, Ryan Wade Sandler
-
Patent number: 10261958Abstract: In an example embodiment, a submission of confidential data is received from a user. A first service is queried using an identification of the user to obtain a member profile corresponding to the user in a social networking service. One or more primary attribute values are identified from the member profile. The one of the primary attribute values are used to query a second service to obtain a derived attribute value corresponding to the one or more primary attribute values. The confidential data, one or more of the primary attribute values, and the derived attribute value are stored in a first submission table in a confidential information database. Then the one or more of the primary attribute values and the derived attribute value are used to classify the user into one or more slices.Type: GrantFiled: July 29, 2016Date of Patent: April 16, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Krishnaram Kenthapadi, Ahsan Chudhary, Stephanie Chou, Joseph Florencio, Anthony Duane Duerr
-
Publication number: 20190068610Abstract: In an embodiment, a submission history table is maintained by tracking an identification of each user making a submission of a confidential data value and a timestamp of when the corresponding submission was made. A first confidential data value submission is received from a user having a first identification. Member usage information for the user having the first identification, are retrieved based on the first identification. The submission history table is referenced to determine a length of time since the user having the first identification last made a submission of confidential data. It is determined that the user having the first identification is not permitted to submit confidential information based on the member usage information and the length of time since the user having the first identification last made a submission of confidential data. In response to the determining, the first confidential data value is discarded.Type: ApplicationFiled: October 30, 2018Publication date: February 28, 2019Inventors: Krishnaram Kenthapadi, Ahsan Chudhary, Stephanie Chou, Ryan Wade Sandler
-
Publication number: 20190065779Abstract: In an example embodiment, an attribute interference model is trained by a machine learning algorithm to output missing attribute values from a member profile of a social networking service. In an attribute inference phase, an identification of a member of a social networking service is obtained. A member profile corresponding to the member of the social networking service is retrieved using the identification. The member profile is then passed to the attribute inference model to generate one or more missing attribute values for the member profile. A collection flow, defined in a user interface of a computing device, is modified based on the generated one or more missing attribute values, the collection flow defining a sequence of screens for collecting confidential data. The modified collection flow is then presented to the member in the user interface to collect confidential data from the member.Type: ApplicationFiled: October 31, 2018Publication date: February 28, 2019Inventors: Krishnaram Kenthapadi, Stephanie Chou, Ahsan Chudhary, Ryan Wade Sandler
-
Patent number: 10158645Abstract: In an embodiment, a submission history table is maintained by tracking an identification of each user making a submission of a confidential data value and a timestamp of when the corresponding submission was made. A first confidential data value submission is received from a user having a first identification. Member usage information for the user having the first identification, are retrieved based on the first identification. The submission history table is referenced to determine a length of time since the user having the first identification last made a submission of confidential data. It is determined that the user having the first identification is not permitted to submit confidential information based on the member usage information and the length of time since the user having the first identification last made a submission of confidential data. In response to the determining, the first confidential data value is discarded.Type: GrantFiled: July 29, 2016Date of Patent: December 18, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Krishnaram Kenthapadi, Ahsan Chudhary, Stephanie Chou, Ryan Wade Sandler
-
Patent number: 10157291Abstract: In an example embodiment, an attribute interference model is trained by a machine learning algorithm to output missing attribute values from a member profile of a social networking service. In an attribute inference phase, an identification of a member of a social networking service is obtained. A member profile corresponding to the member of the social networking service is retrieved using the identification. The member profile is then passed to the attribute inference model to generate one or more missing attribute values for the member profile. A collection flow, defined in a user interface of a computing device, is modified based on the generated one or more missing attribute values, the collection flow defining a sequence of screens for collecting confidential data. The modified collection flow is then presented to the member in the user interface to collect confidential data from the member.Type: GrantFiled: July 28, 2016Date of Patent: December 18, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Krishnaram Kenthapadi, Stephanie Chou, Ahsan Chudhary, Ryan Wade Sandler
-
Patent number: 10043040Abstract: In an example embodiment, a method for protecting against incorrect confidential data values in a computer system is provided. A machine learning algorithm is used to train a confidential data value quality score based on metrics extracted from member profile and member usage information in a social networking service. The confidential data value quality score model is then used to output an estimated quality score for submitted confidential data values.Type: GrantFiled: July 29, 2016Date of Patent: August 7, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Krishnaram Kenthapadi, Ahsan Chudhary, Stephanie Chou, Ryan Wade Sandler