Microsoft Patent Applications

WORKFLOW FOR DATABASE SYSTEM RECOVERY USING LOCAL AND BACKED UP RESOURCES

Granted: March 27, 2025
Application Number: 20250103615
A data processing system implements techniques for operating and recovering databases that includes a plurality of replicas. The plurality of replicas includes a primary replica, a secondary replica, and a delta replica. The primary replica handles read and write operations, the secondary replica is a backup of the primary replica capable of read-only operations. The delta replica comprising a copy of the transactional log information of the primary replica but not the data. The system…

ACCESS BRIDGE FOR ACCESS CONTROL METHODOLOGY MIGRATION

Granted: March 27, 2025
Application Number: 20250106259
Implementations of an access bridge to facilitate migration from a role-based access control management system to an attribute-based access control management system are provided. One aspect provides a computing system comprising processing circuitry coupled to memory that stores instructions, which, upon execution by the processing circuitry, cause the processing circuitry to: identify a role-based protected resource; identify a set of user accounts permitted to access the role-based…

CONFIGURATION VERIFICATION USING VARIABLE INPUTS AND HASH FUNCTIONS

Granted: March 27, 2025
Application Number: 20250106035
Systems and methods for configuration verification using variable inputs and hash functions are disclosed. A computing device may receive, via an operating system user interface, configuration data associated with a configuration setting of the computing device. In response to receiving the configuration data, the computing device may store the configuration data and obtain, based on a hash configuration, a set of inputs and a hash function. The computing device may hash, using the hash…

INTELLIGENT SYSTEM AND METHOD OF PROVIDING SPEECH ASSISTANCE DURING A COMMUNICATION SESSION

Granted: March 27, 2025
Application Number: 20250104689
A system and method and for providing speech assistance during a virtual meeting includes receiving a request over a communication network to provide speech assistance during a virtual meeting between a plurality of participants and analyzing speech data of the virtual meeting, via a speech impediment detection engine, to detect a speech impediment for one of the plurality of participants. Upon detecting the speech impediment, an avatar is automatically generated for the participant…

DIGITAL IMAGE SUB-DIVISION AND ANALYSIS FOR NEIGHBORING SUB-IMAGE IDENTIFICATION

Granted: March 27, 2025
Application Number: 20250104244
Digital image processing methods performed by a computer are disclosed. In one example, a first digital image captured by a real camera is sub-divided into a first plurality of sub-images. A second digital image captured by a real camera is sub-divided into a second plurality of sub-images. A set of image features in a first sub-image of the first plurality of sub-images is identified. A subset of neighboring sub-images is identified from the second plurality of sub-images based at least…

DISTORTION CORRECTION FOR DIGITAL IMAGE SUB-DIVISION

Granted: March 27, 2025
Application Number: 20250104203
Digital image processing methods performed by a computer are disclosed. In one example, a digital image captured by a real camera having intrinsic and extrinsic parameters is received. One or more distortion correction transformations are applied to the digital image to generate a distortion-corrected digital image. The distortion-corrected digital image is sub-divided into a plurality of distortion-corrected sub-images. For each distortion-corrected sub-image of the plurality of…

METHOD AND SYSTEM OF ANALYZING ENTERPRISE-TO-ENTERPRISE CONNECTIONS

Granted: March 27, 2025
Application Number: 20250103994
A system and method for analyzing connections between a first enterprise and a second enterprise includes retrieving connection data related to connections between the first enterprise and the second enterprise from a plurality of data sources and utilizing a connection graph generating engine to generate a connection graph for the connections between the first enterprise and the second enterprise, where the connection graph is generated based on the retrieved connection data. The…

PASSING COMPLEX DATA OBJECTS IN LARGE LANGUAGE MODEL PROCESSES

Granted: March 27, 2025
Application Number: 20250103858
Examples are disclosed that relate to passing complex data objects as context variables between iterative prompts to AI models. One example provides a method, comprising receiving an input, constructing a prompt based upon the input, and inputting the prompt into an orchestrator. The method further comprises, based on the prompt, forming a context variable to reference complex data. The method further comprises providing modified input to a first AI plugin at a first orchestration stage,…

Detecting Computer-Generated Hallucinations using Progressive Scope-of-Analysis Enlargement

Granted: March 27, 2025
Application Number: 20250103800
A technique determines whether a target item is adequately supported by a source item, and therefore likely free of hallucinations. The technique operates by progressively expanding a scope of source content to be considered when determining whether an individual target part of the target item has support in the source item. For instance, the technique initially determines whether any individual source part in the source item supports the target part. If this stage fails to identify…

HYBRID ACCESS CONTROL RESOURCE MANAGEMENT

Granted: March 27, 2025
Application Number: 20250103734
Hybrid access control management systems for managing role-based access control resources and attribute-based access control resources are provided. One aspect provides a computing system for implementing hybrid access control management, the computing system comprising: processing circuitry coupled to memory that stores instructions, which, upon execution by the processing circuitry, cause the processing circuitry to: receive a request from a user account to access an access-controlled…

CACHE-EFFICIENT TOP-K AGGREGATION OVER HIGH CARDINALITY LARGE DATASETS

Granted: March 27, 2025
Application Number: 20250103591
A data processing system implements a cache-conscious aggregation framework for cache-efficient top-k aggregation over high cardinality large datasets. The framework leverages skew in the distribution of data in the datasets to minimize data movements within the local caches of the cores of the multicore processors of the data processing system. The framework performs representative sampling on the dataset and utilizes these samples to identify candidate groups in the dataset for the…

CODE REVIEW COMMENT GENERATION VIA INSTRUCTION PROMPTING WITH INTENT

Granted: March 27, 2025
Application Number: 20250103325
A code review is automatically generated by a large language model given a prompt that includes code changes made to a source code program, an associated intent, and an extended context. The intent represents an issue with the code changes from a code reviewer's perspective and is predicted from a neural classifier given the code changes in a code diff format. The neural classifier is a neural encoder transformer model pre-trained on various code review datasets and fine-tuned on code…

ADJUSTING TOUCH INPUT FORCE THRESHOLD

Granted: March 27, 2025
Application Number: 20250103158
Computing devices, touchpads, and related methods for adjusting a force threshold for touch input on a touchpad are disclosed. In one example, a computing device comprises a force sensing touchpad, a processor, and a memory storing instructions executable by the processor to receive a first contact on the touchpad. An area of touch of the first contact is determined, and an adjusted force threshold for touch input is determined based at least on the area of the touch. A second contact is…

TOUCHPAD FINGER FORCE WITH PALM

Granted: March 20, 2025
Application Number: 20250094000
Methods and computing devices for estimating a finger force exerted on a touchpad are disclosed. In one example, a method comprises calculating a plurality of forces produced by a palm at a plurality of capacitive force sensors of the touchpad, where at least one of the sensors is saturated. After calculating the forces produced by the palm, the method determines that the touchpad is being contacted by the palm and a finger. The method uses the forces produced by the palm to determine…

SYSTEMS AND METHODS FOR CENTRALIZED AND SCALABLEVAPOR MANAGEMENT SYSTEM IN IMMERSION COOLING

Granted: March 20, 2025
Application Number: 20250098115
A thermal management system includes a boiler tank and at least one heat-generating component positioned in the boiler tank. The boiler tank is in fluid communication with a vapor return line and a liquid return line. A condenser is in fluid communication with the vapor return line and the liquid return line. The condenser is positioned between vapor return line and the liquid return line in the fluid communication.

FULL MOTION VIDEO (FMV) ROUTING IN ONE-WAY TRANSFER SYSTEMS USING MODIFIED ELEMENTARY STREAMS

Granted: March 20, 2025
Application Number: 20250097520
Systems and methods relating to full motion video (FMV) routing in one-way transfer (OWT) systems are described herein. The present technology modifies or adds packetized elementary streams (PESs) of video streams, that are sent from the low-trust side of the OWT system, with a global unique identifier (GUID) that is used as an identifier to determine a particular destination on the high-trust side of the OWT system. The enriched video stream is then transmitted through an OWT system…

Two-Stage Suppression for Multi-Class, Multi-Object Detection and Tracking Systems

Granted: March 20, 2025
Application Number: 20250095319
The technology relates to methods and systems for performing two-stage suppression of bounding boxes generated during object detection techniques for digital images. The two-stage suppression includes a per-class suppression stage and a class-agnostic suppression stage. In an example method, preliminary bounding boxes are generated for multiple objects in a digital image. A first subset of bounding boxes is selected by performing a per-class suppression of the preliminary bounding boxes.…

Suggesting Resources using a Latency-Efficient Machine-Trained Ranking Model

Granted: March 20, 2025
Application Number: 20250094882
A technique suggests resources within a particular environment. The technique operates by receiving a query via a search interface presentation, and using a prefix tree data structure to retrieve candidate resource descriptors that match the query. The candidate resource descriptors are data items that describe different types of candidate resources. The technique further includes: generating feature information that describes the candidate resource descriptors; using a machine-trained…

Producing a Reduced-Size Model by Explanation Tuning

Granted: March 20, 2025
Application Number: 20250094827
A technique produces a reduced-size language model using explanation tuning. Explanation tuning composes a prompt that includes two parts: a system instruction and a client instruction. The client instruction expresses a query. The system instruction requests a language model to formulate responses to queries that describe final results and processes of producing the final results. The language model responds to the prompt by providing a language-model response that describes a final…

ALT TEXT VALIDATION SYSTEM

Granted: March 20, 2025
Application Number: 20250094720
Validation of alt text for images in web pages includes extracting image data from the web pages, the image data including source data and alt text data for a plurality of image elements in the web pages. Natural language descriptions of the image elements are generated by providing images defined by the source data to a computer vision component. Prompts are then generated for a semantic comparison model. The prompts include the natural language descriptions of image elements and the…