Patent application number | Description | Published |
20100241668 | Local Computer Account Management at Domain Level - A domain level database containing domain user permission settings may contain local device permission settings for domain users. For each of the local devices attached to the domain, a client service may periodically query the domain database and receive local permission settings for individual domain users. The local permission settings may affect access and availability of certain local resources and actions to the domain users. The client service may update a locally maintained database that may be used by a local security management system to permit or deny access to local resources and local actions to individual users when those users are logged onto the local device. | 09-23-2010 |
20100242037 | Software Deployment over a Network - Devices in a network environment may have a local client application that may periodically update software components on a local device and may configure user access and other parameters to the software component for individual users. The client application may operate by querying a domain server and may receive a description of available software components. After identifying a component to install, the client application may download the component from a data store and install the component, then configure individual user access to the component. | 09-23-2010 |
20110099616 | Authenticating Using Cloud Authentication - An authentication mechanism in a local area network may use a cloud authentication mechanism to allow or deny authentication requests. A user may gain access within a local area network by entering a cloud identification and password, which may be verified by a cloud authentication mechanism. If the authentication is successful from the cloud authentication mechanism, the user identification and password are stored locally for subsequent authentication requests. In some embodiments, the cloud password may be periodically flushed so that subsequent requests may be passed to the cloud authentication mechanism. The authentication mechanism may be used in both domain and workgroup local area networks, and may operate in parallel with other users who may have local area network or client credentials which may not be authenticated from the cloud. | 04-28-2011 |
20120271945 | Obtaining Server Address when Domain Name System Proxy Solution Fails - The subject disclosure is directed towards establishing communication between a client computer and a network resource on a computer network when DNS resolution has failed because of a DNS proxy solution. A user may request that the client use a tool as an alternative to DNS resolution. The client may monitor the network for a broadcast from the network resource, which contains information needed for the client to access the network resource. The network resource may broadcast the information from time to time, or it may broadcast it in response to a specific request from the client. | 10-25-2012 |
20130042315 | Client-Client-Server Authentication - Described is a technology by which machines of a (typically small) network have associated public key-based certificates for use in authentication with a server and validation of other machines in the network. This provides an inexpensive and straightforward mechanism to control, manage and maintain client machines, as well as to allow valid client machines to securely communicate with one another and recognize machines that are not valid on the network. Certificates are maintained on the server and checked for validity as needed. | 02-14-2013 |
20140181948 | Authenticating Using Cloud Authentication - An authentication mechanism in a local area network may use a cloud authentication mechanism to allow or deny authentication requests. A user may gain access within a local area network by entering a cloud identification and password, which may be verified by a cloud authentication mechanism. If the authentication is successful from the cloud authentication mechanism, the user identification and password are stored locally for subsequent authentication requests. In some embodiments, the cloud password may be periodically flushed so that subsequent requests may be passed to the cloud authentication mechanism. The authentication mechanism may be used in both domain and workgroup local area networks, and may operate in parallel with other users who may have local area network or client credentials which may not be authenticated from the cloud. | 06-26-2014 |
Patent application number | Description | Published |
20090327711 | AUTHENTICATION OF BINARIES IN MEMORY WITH PROXY CODE EXECUTION - Presented is an anti-tampering method that validates and protects specific sections of a binary file. In one embodiment, this method permits a proxy engine to execute (via emulation by a virtual machine) the protected code on behalf of the binary in kernel mode upon successful completion of an integrity check. The integrity check can optionally check only the specific parts of code that the developer wishes to validate. The integrity check can cross binary boundaries. Moreover, the integrity check can be done on a hard drive or in memory. Furthermore, since the encrypted code is executed by the proxy engine in kernel mode, hackers are further deterred from modifying the code. Additionally, a method of creating a protected binary file is described herein. | 12-31-2009 |
20100107213 | Access Control State Determination Based on Security Policy and Secondary Access Control State - In accordance with one or more aspects, a current security policy for accessing a device or volume of a computing device is identified. A secondary access control state for the device or volume is also identified. An access state for the device is determined based on both the current security policy and the secondary access control state. | 04-29-2010 |
20100211802 | Storage Volume Protection Supporting Legacy Systems - A storage volume is encrypted using a particular encryption technique, the storage volume including an access application and one or more cover files. The access application can be executed by a computing device having an operating system lacking support for the particular encryption technique, and allows the computing device to access data on the storage volume encrypted using the particular encryption technique. | 08-19-2010 |
20120284494 | DYNAMICALLY REDIRECTING BOOT TO ANOTHER OPERATING SYSTEM - Various embodiments provide an ability to automatically boot a computing device with an operating system stored on a portable storage device when the portable storage device is detected to be present. The computing device can be configured to dynamically boot from the portable storage device when the portable storage device is detected, and revert to a programmed boot order in its associated boot module when the portable storage device is not detected. In some embodiments, the operating system is fully encapsulated on the portable storage device, such as the operating system being completely separate from an operating system initially booting the computing device. | 11-08-2012 |
20140244601 | GRANULAR PARTIAL RECALL OF DEDUPLICATED FILES - The subject disclosure is directed towards partially recalling file ranges of deduplicated files based on tracking dirty (write modified) ranges (user writes) in a way that eliminates or minimizes reading and writing already-optimized adjacent data. The granularity of the ranges does not depend on any file-system granularity for tracking ranges. In one aspect, lazy flushing of tracking data that preserves data-integrity and crash-consistency is provided. In one aspect, also described is supporting granular partial recall on an open file while a data deduplication system is optimizing that file. | 08-28-2014 |
Patent application number | Description | Published |
20110078509 | INFERENCE OF CONTRACT USING DECLARATIVE PROGRAM DEFINITION - A declarative program definition. The definition is analyzed to produce an application contract that describes semantics for sending and receiving application messages during the successful execution of operations by the program. In addition, this analysis may also generate local behaviors associated with the local execution of the program. Alternatively or in addition, the analysis may infer secondary contracts regarding the sending and receiving of application messages, even though the full details of the secondary contracts are not present in the declarative program definition. For instance, the secondary contracts might include error contracts or consistency contracts. | 03-31-2011 |
20130147845 | Photo Selection for Mobile Devices - In one embodiments, a server receives a request for delivery an image to a mobile device, adjust the image based on the mobile device's display capabilities, and transmit the adjusted image to the mobile device. | 06-13-2013 |
20140344406 | PHOTO SELECTION FOR MOBILE DEVICES - In one embodiment, a computing device receives from a mobile device a request for one or more images. The computing device adjusts one or more of the images based at least in part on one or more display capabilities of the mobile device, and one or more tagged regions within one or more of the images. The computing device sends to the mobile device one or more of the images as adjusted. | 11-20-2014 |
20150205858 | Client-Side Search Templates for Online Social Networks - In one embodiment, a method includes receiving an unstructured text query from a first user of an online social network; and accessing, from a data store of the mobile client system, a set of nodes of a social graph of the online social network. The social graph includes a number of nodes and edges connecting the nodes. The nodes include a first node corresponding to the first user and a number of second nodes that each correspond to a concept or a second user associated with the online social network. The method also includes accessing, from the data store of the mobile client system, a set of grammar templates. Each grammar template includes one or more non-terminal tokens and one or more query tokens. The query tokens include references to zero or more second nodes and one or more edges and each grammar template is based on a natural-language string. | 07-23-2015 |
20150227619 | Query Construction on Online Social Networks - In one embodiment, a method includes accessing a set of nodes of a social graph of an online social network. The social graph includes a number of nodes and a number of edges connecting the nodes. Each of the edges between two of the nodes representing a single degree of separation between them. The nodes include a first node that corresponds to the first user and a number of nodes that each correspond to a concept or a second user associated with the online social network. The method also includes accessing one or more grammar tokens. Each grammar token includes references to zero or more nodes and one or more edges. Each grammar token corresponds to a particular type of completion token. Each grammar token may be based on a natural-language string. The method also includes receiving from the first user a selection of one or more of the grammar tokens and one or more of the completion tokens. | 08-13-2015 |
Patent application number | Description | Published |
20130198855 | DYNAMIC SELECTION OF AUTHORIZATION PROCESSES - Systems, methods, and software are disclosed herein for licensing applications using a preferred authorization process dynamically identified based on conditions associated with an initiation of an application. Authorization is then attempted using the preferred authorization process. In some examples, the preferred authorization process is selected from at least a keyless authorization process and a key-based authorization process. | 08-01-2013 |
20130198856 | USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information. | 08-01-2013 |
20140068783 | DYNAMIC SELECTION OF AUTHORIZATION PROCESSES - Systems, methods, and software are disclosed herein for licensing applications using a preferred authorization process dynamically identified based on conditions associated with an initiation of an application. Authorization is then attempted using the preferred authorization process. In some examples, the preferred authorization process is selected from at least a keyless authorization process and a key-based authorization process. | 03-06-2014 |
20140259148 | APPLICATION FORENSICS - Disclosed herein are systems, methods, and software for facilitating application forensics. In least one implementation, the identity of a user associated with an attempt to access an application program that resides in a development environment is determined. Information is generated with which to encode the identity of the user in a various views of the application program rendered in a runtime environment. A reply to the attempt is communicated that includes the information and at least a portion of the application program. | 09-11-2014 |
20150186625 | USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information. | 07-02-2015 |
20150193605 | USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information. | 07-09-2015 |
20150193606 | USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information. | 07-09-2015 |
20150193607 | USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information. | 07-09-2015 |
20150193897 | USER BASED LICENSING FOR APPLICATIONS - A method, system, and computer-readable storage media for providing user based licensing of an application are provided herein. The method includes receiving user log-in information from a computing device at a licensing service in response to an input by a user and providing a license for an application to the computing device, wherein the license includes device specific information associated with the user. The method also includes activating the application on the computing device using the device specific information. | 07-09-2015 |
20150286806 | USER-SPECIFIC APPLICATION ACTIVATION FOR REMOTE SESSIONS - Disclosed herein are systems, methods, and software to enhance licensing in multi-user computing environments. In an implementation, for each user of a plurality of users engaged with an application installed in a multi-user computing environment, a user-specific license state is maintained for the user with respect to the application. In addition, for each of the plurality of users engaged with the application installed in the multi-user computing environment, the application is delivered in accordance with the user-specific license state for the user. | 10-08-2015 |