Patents by Inventor Xuedong Huang

Xuedong Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9141977
    Abstract: Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one search term corresponding to at least one member of a network; disambiguating the at least one search term including associating the at least one search term with at least one of network-participation identifier data or device-identifier data; and presenting a disambiguated search term at least partly based on at least one of the network-participation identifier data or the device-identifier data.
    Type: Grant
    Filed: September 30, 2011
    Date of Patent: September 22, 2015
    Assignee: ELWHA LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, William Gates, Xuedong Huang, Roderick A. Hyde, Edward K. Y. Jung, Royce A. Levien, Richard T. Lord, Robert W. Lord, Qi Lu, Mark A. Malamud, Nathan P. Myhrvold, Satya Nadella, Daniel Reed, Harry Shum, Clarence T. Tegreene, Lowell L. Wood, Jr.
  • Patent number: 9083687
    Abstract: Disclosed herein are example embodiments for multi-device behavioral fingerprinting by a user device or a server device. For certain example embodiments, at least one device may obtain at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of two or more user devices by the at least one authorized user. The at least one device may perform at least one authentication-related operation based at least partially on the at least one behavioral fingerprint.
    Type: Grant
    Filed: July 31, 2012
    Date of Patent: July 14, 2015
    Assignee: ELWHA LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
  • Patent number: 9025587
    Abstract: An auto-answer feature is implemented in SIP by configuring a receiving device to automatically acknowledge and answer an incoming call or session from a specific trusted third party. The receiving device may skip to an OK response to an INVITE request when the call is routed through the trusted third party. When the device can automatically answer the incoming call, advanced features such as Push To Talk, Information Tone, Click to Call, and Remote Monitoring may be easily implemented.
    Type: Grant
    Filed: August 16, 2006
    Date of Patent: May 5, 2015
    Assignee: Microsoft Technology Licensing
    Inventors: Kuansan Wang, Xuedong Huang
  • Patent number: 9015860
    Abstract: Disclosed herein are example embodiments for behavioral fingerprinting via derived personal relation. For certain example embodiments, at least one indication of personal relation for at least one authorized user may be derived via at least one user-device interaction, and the at least one indication of personal relation may be incorporated into at least one behavioral fingerprint that is associated with the at least one authorized user, the at least one behavioral fingerprint including one or more indicators of utilization of one or more user devices by the at least one authorized user.
    Type: Grant
    Filed: September 28, 2012
    Date of Patent: April 21, 2015
    Assignee: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
  • Publication number: 20150050911
    Abstract: Mobile communication devices, such as mobile phones, may be capable of recommending to a user various providers of one or more solicited services, e.g., by identifying a user location and identifying providers near the user location that provide the services, and by initiating a call between the user and a selected provider. However, the equipment and service costs of such devices may be prohibitive, particularly for mid-range mobile communication devices that may appeal to cost-conscious users. The prohibitive costs may be diminished by redirecting part or all of the cost of providing the recommendation service from the providers, e.g., by charging the provider a service cost upon initiating a call from the user to the provider, or upon representing the provider in a provider database. In one such embodiment, all service costs may be borne by providers, providing to the user a free recommendation service via the mobile communication device.
    Type: Application
    Filed: August 25, 2014
    Publication date: February 19, 2015
    Inventors: Eric Horvitz, Xuedong Huang, Kamal Jain, Milind Vasudeo Mahajan
  • Patent number: 8959082
    Abstract: Structures and protocols are presented for facilitating a search partly based on a movement status of a search-capable device or on a position of a person's limb or on an association with another search-capable device.
    Type: Grant
    Filed: November 30, 2011
    Date of Patent: February 17, 2015
    Assignee: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, William Gates, Xuedong Huang, Roderick A. Hyde, Edward K. Y. Jung, Jordin T. Kare, Royce A. Levien, Qi Lu, Mark A. Malamud, Nathan P. Myhrvold, Satya Nadella, Daniel Reed, Harry Shum, Clarence T. Tegreene, Lowell L. Wood, Jr.
  • Patent number: 8874086
    Abstract: Described is a technology by which a communications identifier such as a telephone number is used in selecting relevant content (e.g., an advertisement) for outputting as audible and/or visible information to a destination device. The communications identifier is used like a search term/keyword to determine content relevant to that identifier. A telephone number may be the identifier, selected based on a partially-dialed or actually dialed number, or a user's current scrolling position among listed telephone numbers. A telephone number of an incoming call may be used as the identifier. Profile data and/or state data may be used in selecting relevant content. Some of the profile data may be mined based on previous user activities. In one example, the content may be provided via a remote source of the content, and used immediately or cached for later use (e.g., output).
    Type: Grant
    Filed: February 7, 2008
    Date of Patent: October 28, 2014
    Assignee: Microsoft Corporation
    Inventors: Xuedong Huang, Milind V. Mahajan, Abhiram G. Khune
  • Patent number: 8869241
    Abstract: A computationally-implemented method, for certain example embodiments, may include, but is not limited to: identifying a network connection coupling a computer server to a computing device; and transmitting, via the network connection, a behavioral fingerprint associated with an authorized user of the computing device, the behavioral fingerprint providing at least one status of the authorized user with respect to the computing device. In addition to the foregoing, other example aspects are presented in the claims, drawings, and written description forming a part of the present disclosure.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: October 21, 2014
    Assignee: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
  • Publication number: 20140279991
    Abstract: Systems, methods, and computer-readable storage media are provided for conducting searches utilizing search navigation patterns. Search queries are received that include search terms that are of a particular type. It is recognized that at least one prior search session has been conducted that included a search query having search terms of an equivalent or similar type and followed a particular navigation pattern. Such prior search(es) may have been conducted by the user or by a different user and/or may have a navigation pattern that was affirmatively recorded by the requesting user or that was recorded by the system without explicit contemporaneous user instruction to do so. Upon identifying the navigation pattern associated with the prior search, the system effectively conducts a search session following the navigation pattern.
    Type: Application
    Filed: March 14, 2013
    Publication date: September 18, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: ANOOP GUPTA, XUEDONG HUANG
  • Patent number: 8818415
    Abstract: Mobile communication devices, such as mobile phones, may be capable of recommending to a user various providers of one or more solicited services, e.g., by identifying a user location and identifying providers near the user location that provide the services, and by initiating a call between the user and a selected provider. However, the equipment and service costs of such devices may be prohibitive, particularly for mid-range mobile communication devices that may appeal to cost-conscious users. The prohibitive costs may be diminished by redirecting part or all of the cost of providing the recommendation service from the providers, e.g., by charging the provider a service cost upon initiating a call from the user to the provider, or upon representing the provider in a provider database. In one such embodiment, all service costs may be borne by providers, providing to the user a free recommendation service via the mobile communication device.
    Type: Grant
    Filed: December 6, 2012
    Date of Patent: August 26, 2014
    Assignee: Microsoft Corporation
    Inventors: Eric Horvitz, Xuedong Huang, Kamal Jain, Milind Vasudeo Mahajan
  • Publication number: 20140223381
    Abstract: An invisible control may be implemented in a client device or in an application of the client device. A user may activate the invisible control by applying a gesture on a predetermined region of the client device or the application. In response to receiving the user gesture, a predetermined action associated with the invisible control may be activated. The predetermined action may be applied to the application or some or all of the content associated with the application. An Application Programming Interface may further be provided to allow the user, an application vendor or a content provider to customize the invisible control or operating modes associated with activation of the invisible control.
    Type: Application
    Filed: May 23, 2011
    Publication date: August 7, 2014
    Applicant: Microsoft Corporation
    Inventors: Xuedong Huang, Zheng Chen, Zhimin Zhang, Jian-Tao Sun, Peng Bai, Xiaochuan Ni, Mario Esposito
  • Publication number: 20140222724
    Abstract: A log-linear model may be trained using a modified version of an original limited-memory Broyden-Fletcher-Goldfarb-Shanno (L-BFGS) algorithm. The modified version may be based on modifying the original L-BFGS algorithm using a single map-reduce implementation. In another aspect, a sparse log-linear model may be accessed. The sparse log-linear model may be trained with L1-regularization, based on data indicating past user ad selection behaviors. A probability of a user selection of an ad may be determined based on the sparse log-linear model.
    Type: Application
    Filed: February 2, 2013
    Publication date: August 7, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Jianfeng Gao, Xuedong Huang, Zhenghao Wang, Yunhong Zhou
  • Publication number: 20140173426
    Abstract: Computer-readable media, computer systems, and computing devices for inserting online content within editable content of a document being composed or manipulated within a document-authoring application, without exiting the document-authoring application or leaving a context of composing or manipulating the document, are provided. Initially, a user-initiated selection of a portion of the editable content within the document is detected. The selected portion of the editable content is automatically distributed to a search engine, where the search engine is equipped to generate search results that are relevant to the selected portion. Upon receiving the search results, they are presented to the user. At this point, the user is allowed to target at least one of the presented search results. Online content associated with the targeted search result is then inserted within the editable content of the document.
    Type: Application
    Filed: December 19, 2012
    Publication date: June 19, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: XUEDONG HUANG, STEVEN MACBETH, LAWRENCE BRIAN RIPSHER, BRIAN ALBRECHT, LISA WOODS
  • Patent number: 8751306
    Abstract: A computing system and method for managing an identity of a user are provided. A server may be configured to communicate with each of a plurality of client devices in corresponding request and response streams. An inference engine is configured to monitor the request and response streams for identifying factors that distinguish each of the plurality of client devices from other of the plurality of client devices. Upon detecting one or more of the identifying factors for each of the two or more client devices that match within a threshold probability, the inference engine makes an inference that two or more of the plurality of client devices are used by the user. Based upon the inference, the inference engine creates a virtual identity record at the server linking the two or more client devices.
    Type: Grant
    Filed: June 20, 2011
    Date of Patent: June 10, 2014
    Assignee: Microsoft Corporation
    Inventors: Doug Burger, Lili Cheng, Xuedong Huang, Stelios Paparizos
  • Patent number: 8713704
    Abstract: A computationally-implemented method, for certain example embodiments, may include, but is not limited to: determining that a first user of a computing device is associated with the computing device; and determining a level of authentication associated with the first user via the computing device, the level of authentication at least partially based on a behavioral fingerprint. A level of authentication determination may additionally/alternatively include at least determining a behavioral fingerprint via establishing a statistical predictability of one or more future actions of an authorized user of a computing device. A level of authentication determination may additionally/alternatively include at least determining an authentication level with respect to a computing device at least partially based on a behavioral fingerprint determined from interaction(s) with another device.
    Type: Grant
    Filed: May 18, 2012
    Date of Patent: April 29, 2014
    Assignee: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
  • Patent number: 8688980
    Abstract: A computationally implemented method includes, but is not limited to: for determining one or more behavioral fingerprints associated with one or more network accessible users; relationally mapping the one or more behavioral fingerprints to generate a trust verification schema associated with the one or more network accessible users; and determining whether to authenticate one or more transactions via the trust verification schema. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
    Type: Grant
    Filed: November 23, 2011
    Date of Patent: April 1, 2014
    Assignee: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
  • Patent number: 8689350
    Abstract: A computationally implemented method includes, but is not limited to: determining a behavioral fingerprint associated with a network accessible user of one or more devices, the behavioral fingerprint providing a current status of the network accessible user; and disabling the one or more devices automatically as a function of the determined behavioral fingerprint. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure.
    Type: Grant
    Filed: November 23, 2011
    Date of Patent: April 1, 2014
    Assignee: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
  • Publication number: 20140040989
    Abstract: Disclosed herein are example embodiments for multi-device behavioral fingerprinting by a user device or a server device. For certain example embodiments, at least one device may obtain at least one behavioral fingerprint that is associated with at least one authorized user, with the at least one behavioral fingerprint including one or more indicators of utilization of two or more user devices by the at least one authorized user. The at least one device may perform at least one authentication-related operation based at least partially on the at least one behavioral fingerprint.
    Type: Application
    Filed: July 31, 2012
    Publication date: February 6, 2014
    Inventors: Marc E. Davis, Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien, Richard T. Lord, Robert W. Lord, Mark A. Malamud, Nathan P. Myhrvold, Clarence T. Tegreene
  • Publication number: 20130268756
    Abstract: Methods, apparatuses, computer program products, devices and systems are described that carry out receiving level-two encrypted data and at least one associated hash; storing the level-two encrypted data and at least one associated hash; and transmitting the level-two encrypted data and at least one associated hash in response to a request for at least one of the level-two encrypted data or the at least one associated hash.
    Type: Application
    Filed: March 14, 2013
    Publication date: October 10, 2013
    Applicant: Elwha LLC
    Inventors: Marc E. Davis, Matthew G. Dyor, William Gates, Xuedong Huang, Roderick A. Hyde, Edward K.Y. Jung, Jordin T. Kare, Royce A. Levien, Richard T. Lord, Robert W. Lord, Qi Lu, Mark A. Malamud, Nathan P. Myhrvold, Satya Nadella, Danny Allen Reed, Harry Shum, Clarence T. Tegreene, Lowell L. Wood, JR.
  • Publication number: 20130268773
    Abstract: Methods, apparatuses, computer program products, devices and systems are described that carry out accepting at least one identifier corresponding to a user having at least one instance of data for encryption; encrypting the at least one identifier corresponding to the user to produce at least one encrypted identifier, wherein the at least one encrypted identifier also corresponds to the at least one instance of data for encryption; and transmitting the encrypted identifier to an encryption entity.
    Type: Application
    Filed: March 14, 2013
    Publication date: October 10, 2013
    Inventors: Marc E. Davis, Matthew G. Dyor, William Gates, Xuedong Huang, Roderick A. Hyde, Edward K.Y. Jung, Jordin T. Kare, Royce A. Levien, Richard T. Lord, Robert W. Lord, Qi Lu, Mark A. Malamud, Nathan P. Myhrvold, Satya Nadella, Danny Allen Reed, Harry Shum, Clarence T. Tegreene, Lowell L. Wood, Jr.