-
公开(公告)号:US09589069B2
公开(公告)日:2017-03-07
申请号:US15003266
申请日:2016-01-21
Applicant: Microsoft Technology Licensing, LLC
Inventor: Fan Yang , Aapo Kyrola , Xuetian Weng , Raymond Cheng , Ming Wu , Ji Hong , Lidong Zhou , Youshan Miao
CPC classification number: G06F17/30958 , G06F11/1451 , G06F17/30368 , G06F17/30516 , G06F17/30578 , G06F2201/84
Abstract: A continuous stream data (e.g., messages, tweets) is received by ingest nodes of a platform. The ingest nodes may analyze the data to create a transaction of graph updates, assign a sequence number to the transaction, and distribute the graph updates with the sequence number to graph nodes of the platform. The graph nodes may store graph updates from ingest nodes, and then the ingest nodes may report graph update progresses in a progress table. A snapshot may be taken based on the progress table, and then graph-mining computation may be implemented. Tolerate failures and decaying may be supported and incremental expansion may be allowed to cope with increasing update rates and computation needs.
Abstract translation: 通过平台的摄取节点接收连续流数据(例如,消息,推文)。 摄取节点可以分析数据以创建图更新的事务,为事务分配序列号,并将具有序列号的图更新分发到平台的图形节点。 图形节点可以存储来自摄取节点的图更新,然后,摄取节点可以在进度表中报告图更新进度。 可以基于进度表进行快照,然后可以实现图形挖掘计算。 可以支持容忍故障和衰减,并且可以允许增量扩展来应对增加的更新速率和计算需求。
-
公开(公告)号:US09858402B2
公开(公告)日:2018-01-02
申请号:US14832954
申请日:2015-08-21
Applicant: Microsoft Technology Licensing, LLC
Inventor: Guobin Shen , Fan Yang , Lidong Zhou
CPC classification number: G06F21/32 , H04L9/0866 , H04L9/32 , H04L9/3231 , H04L9/3271 , H04L63/0815 , H04L63/0861 , H04L2209/805 , H04L2463/082
Abstract: A multi-party security protocol that incorporates biometric-based authentication and withstands attacks against any single party (e.g., mobile phone, cloud, or the user). The protocol involves the function split between mobile and cloud and the mechanisms to chain-hold the secrets. A key generation mechanisms binds secrets to a specific device or URL (uniform resource locator) by adding salt to a master credential. An inline CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) handling mechanism uses the same sensor modality as the authentication process, which not only improves the usability, but also facilitates the authentication process. This architecture further enhances existing overall system security (e.g., handling untrusted or compromised cloud service, phone being lost, impersonation, etc.) and also improves the usability by automatically handling the CAPTCHA.
-
公开(公告)号:US10885593B2
公开(公告)日:2021-01-05
申请号:US14735022
申请日:2015-06-09
Applicant: Microsoft Technology Licensing, LLC
Inventor: Fan Yang , Craig Martell , Dan Shacham
Abstract: Hybrid classification system and method are described. The method commences when an input detector detects a raw input string that represents a value of a category in a member profile maintained by the on-line social network. The machine learning classifier derives a standardized value corresponding to the raw input string. The trigger module provides the raw input string to the correcting filter. The correcting filter determines a corrected standardized value corresponding to the raw input string based on the raw input string and a corrective rule. The label module then identifies the member profile as associate with the corrected standardized value.
-
公开(公告)号:US20220229701A1
公开(公告)日:2022-07-21
申请号:US17609700
申请日:2020-05-04
Applicant: Microsoft Technology Licensing, LLC
Inventor: Quanlu Zhang , Lidong Zhou , Mao Yang , Fan Yang , Hanyu Zhao , Zhenhua Han
IPC: G06F9/50
Abstract: According to implementations of the subject matter, a solution of dynamic management of computing resource is provided. In the solution, a first request for using a target number of computing resource in a set of computing resources is received, wherein at least one free computing resource of the set of computing resources is organized into at least one free resource group. When it is determined that a free matching resource group is absent from the first resource group and a free redundant resource group is present in at least one free resource group, the target number of computing resources are allocated for the first request by splitting the free redundant resource group, wherein the number of resources in the free redundant resource group is greater than the target number. Therefore, the dynamic allocation of computing resources is enabled.
-
公开(公告)号:US11144586B2
公开(公告)日:2021-10-12
申请号:US15269775
申请日:2016-09-19
Applicant: Microsoft Technology Licensing, LLC
Inventor: Guobin Shen , Songwu Lu , Fan Yang
IPC: G06F16/51 , G06F16/58 , G06F16/583 , G06K9/46 , H04L29/08
Abstract: Kinship between electronic files among personal networked devices may be ascertained between the files by determining an operational relationship between the files and with a similarity measurement.
-
公开(公告)号:US20170011032A1
公开(公告)日:2017-01-12
申请号:US15269775
申请日:2016-09-19
Applicant: Microsoft Technology Licensing, LLC
Inventor: Guobin Shen , Songwu Lu , Fan Yang
CPC classification number: G06F16/51 , G06F16/58 , G06F16/583 , G06F16/5838 , G06K9/4652 , H04L67/10
Abstract: Kinship between electronic files among personal networked devices may be ascertained between the files by determining an operational relationship between the files and with a similarity measurement.
Abstract translation: 可以通过确定文件之间的操作关系和相似性度量来确定个人网络设备之间的电子文件之间的亲属关系。
-
公开(公告)号:US20160140253A1
公开(公告)日:2016-05-19
申请号:US15003266
申请日:2016-01-21
Applicant: Microsoft Technology Licensing, LLC
Inventor: Fan Yang , Aapo Kyrola , Xuetian Weng , Raymond Cheng , Ming Wu , Ji Hong , Lidong Zhou , Youshan Miao
CPC classification number: G06F17/30958 , G06F11/1451 , G06F17/30368 , G06F17/30516 , G06F17/30578 , G06F2201/84
Abstract: A continuous stream data (e.g., messages, tweets) is received by ingest nodes of a platform. The ingest nodes may analyze the data to create a transaction of graph updates, assign a sequence number to the transaction, and distribute the graph updates with the sequence number to graph nodes of the platform. The graph nodes may store graph updates from ingest nodes, and then the ingest nodes may report graph update progresses in a progress table. A snapshot may be taken based on the progress table, and then graph-mining computation may be implemented. Tolerate failures and decaying may be supported and incremental expansion may be allowed to cope with increasing update rates and computation needs.
-
-
-
-
-
-