Patent application number | Description | Published |
20090319562 | CANVAS APPROACH FOR ANALYTICS - The claimed subject matter relates to an architecture that can construct a map for summarizing analyses with respect to data included in a database. In addition, the architecture can display the map in a special canvas area. Generally, the map is a hub-and-spoke-style map in which a hub is associated with an entity (e.g., a related set of records) included in a database. Likewise, the spokes are typically representative of operations (e.g., filter, join, transform) that act upon the hub/entity from which it extends. The map can aid with open-ended analysis on complex databases by recording and ordering competing hypotheses and can also further collaborative efforts with respect to analysis. | 12-24-2009 |
20100138773 | MANIPULATING THUMBNAILS OF WINDOWS - A dynamic thumbnail corresponding to an application window is displayed that is capable of being modified based on modifications in the application window. The modifications of the dynamic thumbnail may be accomplished in real-time. In some embodiments, a dynamic thumbnail is displayed in response to a user hovering a cursor over a taskbar button for a corresponding application window. In some embodiments, modifications to the dynamic thumbnail are reflected in the corresponding application window. | 06-03-2010 |
20120144281 | AUTOMATED TASK COMPLETION BY FLOWING CONTEXT - Providing context to a target minimizes the amount of information that a user must input. Context transfer pages receive context and reformat for the target. Selection of links to such pages provide context which is then reformatted and provided to the target to pre-populate information for the user. A return link can be specified to enable the target to return further context upon user interaction completion. The return link can specify further context transfer pages which can use the returned context to direct the performance of convenience actions, including invoking other applications on the user's computing device and entering information into them. The context transfer pages can themselves collect information from the user to provide appropriate interfaces without requiring resource investment from the target. | 06-07-2012 |
20150046934 | IDENTIFYING SOFTWARE APPLICATION EVENTS - In one embodiment, a method includes receiving, by a server computing device, a notification which includes: information associated with the identity of the user associated with the user-initiated event or with the identity of the client computing device; a variable, pre-determined string of symbols for the user-initiated event associated with the notification; a variable number describing a value of an attribute associated with the user-initiated event; and a variable parameter describing an attribute of the user at or near the time of the event or an attribute of the variable number. The method includes correlating, by the server computing device, the user-initiated events with a user; and determining, by the computing device, a description of the user-initiated event associated with the notification based at least in part on the string of symbols. | 02-12-2015 |
20150088663 | Targeting Advertisements To Customized Groups Of Users Of An Online System - An online system enables developers of third-party applications to specify online system users to receive advertisements. The online system generates and sends a user-specific identifier for online system users that use a third-party application when an advertiser associated with the third-party application requests a user-specific identifier from the online system. For example, the online system retrieves user identifying information associated with a client device identifier provided by an advertiser and generates a user identifier by encrypting the retrieved user identifying information. The advertiser may include one or more user-specific identifiers in an advertisement request sent to an online system to present an advertisement in the advertisement request to online system users corresponding to the user-specific identifiers. The online system determines whether to present the advertisement to users based in part on whether users correspond to user-specific identifiers included in the advertisement request. | 03-26-2015 |
Patent application number | Description | Published |
20090128560 | RENDERING OF DATA SETS COMPRISING MULTIPLE-RESOLUTION SAMPLES - A data set may be represented by samples of multiple resolutions, such as an image represented by pixels of various resolutions. When such multiple-resolution samples are potentially overlapping, it may be inefficient to render both a lower-resolution sample and also the plurality of higher-resolution samples that overlap the lower-resolution sample. Conversely, it may be more efficient to determine, before rendering a sample representing a particular data unit, whether the sample is overlapped by available higher-resolution samples that represent the same data unit. Techniques are disclosed for making this determination in an efficient manner, and for acting upon the determination to achieve improved efficiency in the rendering of the data set. | 05-21-2009 |
20090282475 | Media Streams from Containers Processed by Hosted Code - Described is a technology by which code, such as an untrusted web application hosted in a browser, provides content through an interface for playback by an application environment, such as an application environment running in a browser plug-in. Content may be in the form of elementary video, audio and/or script streams. The content is in a container that is unpackaged by the application code, whereby the content may be packaged in any format that the application understands, and/or or come from any source from which the application can download the container. An application environment component such as a platform-level media element receives information from an application that informs the application environment that the application is to provide media stream data for playback. The application environment requests media stream data (e.g., samples) from the application, receives them as processed by the application, and provides the requested media stream data for playback. | 11-12-2009 |
20090322755 | DECLARATIVE APPROACH FOR VISUZLIATION - The claimed subject matter relates to an architecture that can support a declarative model-based approach to designing, constructing, and rendering visualizations. By complying with a declarative descriptor, components can be readily customized by way of modifications to the model—declaratively specifying suitable features, behaviors, appearances and so forth. The descriptors that conform to the model can also facilitate connecting to various data sources and performing data transformation operations. Moreover, the descriptors that conform to the model can declaratively specify relationships based upon a scene layout. Accordingly, the architecture can further describe the scene layout and provide features based upon the layout. | 12-31-2009 |
20110016477 | PRE-CALCULATION AND CACHING OF DEPENDENCIES - Dependencies among components may be pre-calculated, validated and cached. The cached dependencies may then be used in an execution environment to inject dependencies into the component. In one example, components for a web application are submitted to the operator of the application. Dependencies among the components may be pre-calculated, and the pre-calculated dependencies may be stored in a catalog. When a client accesses the web application, the components may be downloaded to the client along with the catalog. The client may provide a virtual machine or other execution environment under which the components execute. The execution environment may provide a dependency injection feature that connects components together at runtime based on the pre-calculated dependencies in the catalog. | 01-20-2011 |
20110311136 | CROSS-DOMAIN BROWSER PRE-FETCHING THROUGH DATA TRANSCODING - Browser application programs may be prevented from performing cross-domain retrieval of anything other than image files. To enable browsers to pre-fetch resources utilizable by code executing in a browser-based programmatic environment, without having to wait for the environment, and the code, to be instantiated and make the cross-domain request themselves, the cross-domain resources can be transcoded into image files. Once retrieved, these “image” files can be retained locally in a browser cache and provided to the code executing in the browser-based programmatic environment from there much more quickly. Then the code can decode the “image” and extract the original resource file, which the code can then utilize. The transcoding of resources into image files can be performed by first determining the height and width of an image file that will result in the least amount of wasted space when the resource is transcoded into it. | 12-22-2011 |
Patent application number | Description | Published |
20100082649 | AUTOMATIC SEARCH SUGGESTIONS FROM SERVER-SIDE USER HISTORY - Suggested search queries are provided to a user as search assistance while a user is entering a search query but before the user submits a completed search query for a search to be performed. The suggested search queries are selected and ordered based on the user's personal search history stored server-side as well as other information available to the search engine. When a query portion is received while a user is entering a search query, previously submitted search queries are selected from the user's search history as suggested search queries. The suggested search queries are selected and/or ranked based on the user's search history and/or other information available to the search engine. | 04-01-2010 |
20100153427 | PROVIDING RECENT HISTORY WITH SEARCH RESULTS - A system, method, and medium are provided for presenting a user-interface to a user during a search session that includes information about the user's search history during that search session. A search session is instantiated, and search queries, search results, user selections of search results, and other information is recorded. Search results pages provided to the user in response to queries include a session tracker module that displays interactive information associated with recent search queries issued by the user during the same session, such that the user can quickly recall previously issued queries and corresponding search results. | 06-17-2010 |
20100153428 | HISTORY ANSWER FOR RE-FINDING SEARCH RESULTS - A system, method, and medium are provided for providing a personalized answer to a user-defined search query by utilizing the user's search history. A search session is instantiated, and search queries, search results, user selections of search results, and other information is recorded. A search query is received and analyzed to determine whether the query reflects user intent to re-find a search result that the user previously was presented in response to a previously issued search query. Search results pages provided to the user in response to queries include a personalized history answer that represents a previously viewed search result that the user may be attempting to re-find. | 06-17-2010 |
20130006914 | EXPOSING SEARCH HISTORY BY CATEGORY - Computer-storage media, methods, and systems for mapping a previously submitted query to category(s) and for rendering the category(s) in visual association with the query are provided. Generally, the query is assigned the category(s) by employing one or more categorization processes. One categorization process involves selecting entity(s) that capture a topic inherent to the query, identifying the category(s) that encompass the subject matter of the entity(s), respectively, and generating a mapping between the identified category(s) and the query. Here, the entity(s) operate as a semantic representation of the query. Another categorization process involves inferring a logical description underlying the query, and identifying specific and general category(s) that are semantically related to the inferred logical description. Upon detecting an indication to view past queries, any combination of the specific category, the general category, and the query mapped thereto is presented concurrently to the user. | 01-03-2013 |
20140172892 | QUERYLESS SEARCH BASED ON CONTEXT - Computer-readable media, computer systems, and computing devices for initiating a queryless search is provided. In this regard, a search can be initiated without a user inputting a query. In one embodiment, the method includes recognizing a search indication provided by a user to indicate a desire to view one or more search results related to content being presented. Such a search indication can be performed without accessing a web page associated with a search engine. In accordance with the search indication, contextual information related to the content being presented can be automatically captured. Thereafter, the captured contextual information is provided to initiate a search for information corresponding with the contextual information. Search results corresponding with the contextual information are received and presented. | 06-19-2014 |
Patent application number | Description | Published |
20100293600 | Social Authentication for Account Recovery - A backup account recovery authentication of last resort using social authentication is described. The account holder requests trustees who have been previously identified to obtain an account recovery code. The account recovery system sends a communication to the trustee for information to verify the trustee as one of the previously identified trustees. The account recovery system then may transmit a link and code with instructions for the trustee to return the link. The account recovery system then transmits a situational query to the trustee to provide additional security. Finally, if all the communications have been completed for the required level of security, the account recovery code is transmitted to the trustee. The trustee sends the account recovery code to the account holder for access to an account. | 11-18-2010 |
20100293608 | EVIDENCE-BASED DYNAMIC SCORING TO LIMIT GUESSES IN KNOWLEDGE-BASED AUTHENTICATION - Techniques to provide evidence-based dynamic scoring to limit guesses in knowledge based authentication are disclosed herein. In some aspects, an authenticator may receive an input from a user in response to a presentation of a personal question that enables user access to a restricted resource. The authenticator may determine that the input is not equivalent to a stored value, and thus is an incorrect input. The authenticator may then determine whether the input is similar to a previous input received from the user. A score may be assigned to the input. When the input is determined to be similar to the previous input, the score may be reduced. Another request for an input may be transmitted by the authenticator when a sum of the score and any previous scores of the session is less than a threshold. | 11-18-2010 |
20110154244 | Creating Awareness of Accesses to Privacy-Sensitive Devices - Techniques for providing intuitive feedback to a user regarding which applications have access to a data stream captured by a privacy-sensitive device, such as a camera, a microphone, a location sensor, an accelerometer or the like. These techniques apprise the user of when an application is receiving potentially privacy-sensitive data and the identity of the application receiving the data. In some instances, this feedback comprises a graphical icon that visually represents the data stream being received and that dynamically alters with the received data stream. For instance, if an application receives a data stream from a camera of a computing device of the user, the described techniques may display an image of the video feed captured by the camera and being received by the application. This graphical icon intuitively alerts the user of the data stream that the application receives. | 06-23-2011 |
20110258483 | Data Layout for Recovery and Durability - A Metadata server described herein is configured to generate a metadata table optimized for data durability and recovery. In generating the metadata table, the metadata server associates each possible combination of servers with one of the indices of the table, thereby ensuring that each server participates in recovery in the event of a server failure. In addition, the metadata server may also associate one or more additional servers with each index to provide added data durability. Upon generating the metadata table, the metadata server provides the metadata table to clients or servers. Alternatively, the metadata server may provide rules and parameters to clients to enable those clients to identify servers storing data items. The clients may use these parameters and an index as inputs to the rules to determine the identities of servers storing or designated to store data items corresponding to the index. | 10-20-2011 |
20110296258 | ERROR CORRECTING POINTERS FOR NON-VOLATILE STORAGE - Architecture that implements error correcting pointers (ECPs) with a memory row, which point to the address of failed memory cells, each of which is paired with a replacement cell to be substituted for the failed cell. If two error correcting pointers in the array point to the same cell, a precedence rule dictates the array entry with the higher index (the entry created later) takes precedence. To count the number of error correcting pointers in use, a null pointer address can be employed to indicate that a pointer is inactive, an activation bit can be added, and/or a counter, that represents the number of error correcting pointers that are active. Mechanisms are provided for wear-leveling within the error correction structure, or for pairing this scheme with single-error correcting bits for instances where transient failures may occur. The architecture also employs pointers to correct errors in volatile and non-volatile memories. | 12-01-2011 |
20130160110 | Device Locking with Hierarchical Activity Preservation - Techniques are described for device locking with activity preservation at a specified level within a multi-level hierarchy of device states. Such locking enables a user to share a device with another user while specifying a particular level of access to the device, such as access to a particular class of applications, a specific application, or a specific task within an application. Determination of the authorized activity may be based on a currently active application, or on the particular user gesture. The level of functionality made available may be based on the number of times a user gesture is repeated. Gestures may include a selection of a hardware or software control on the device, issuance of a voice command, and the like. | 06-20-2013 |
20130247224 | OWNER PRIVACY IN A SHARED MOBILE DEVICE - Systems and methods that regulate range of access to personal information of a mobile unit's owner. The access control component can designate granularity for access levels and/or a spectrum of access modes—(as opposed to a binary choice of full access or no access at all). Such access can be based on a spectrum and/or discrete trust relationship between the owner and user of the mobile unit. A profile definition component can exploit an owner's trust relationships to designate levels of security. The profile definition component can further define a profile based on a set of applications, such as entertainment mode, browser mode, and the like. | 09-19-2013 |
20140115701 | DEFENDING AGAINST CLICKJACKING ATTACKS - Described is a technology directed towards protecting against clickjacking attacks against interactive user interface elements in code that are described by the code author as sensitive to clickjacking attacks. Various defenses are described, including defenses to ensure target display integrity, pointer integrity, and temporal integrity. For example, a browser click on an element/web page may be determined to be invalid if target display integrity is compromised. Also described are defenses that act to increase the user's attention to what is actually being clicked, and defenses that disable or disallow functions and features used by attackers, such as when a sensitive element is being hovered over. | 04-24-2014 |
20140324722 | Social Authentication for Account Recovery - A backup account recovery authentication of last resort using social authentication is described. The account holder requests trustees who have been previously identified to obtain an account recovery code. The account recovery system sends a communication to the trustee for information to verify the trustee as one of the previously identified trustees. The account recovery system then may transmit a link and code with instructions for the trustee to return the link. The account recovery system then transmits a situational query to the trustee to provide additional security. Finally, if all the communications have been completed for the required level of security, the account recovery code is transmitted to the trustee. The trustee sends the account recovery code to the account holder for access to an account. | 10-30-2014 |
Patent application number | Description | Published |
20090282473 | OWNER PRIVACY IN A SHARED MOBILE DEVICE - Systems and methods that regulate range of access to personal information of a mobile unit's owner. The access control component can designate granularity for access levels and/or a spectrum of access modes—(as opposed to a binary choice of full access or no access at all). Such access can be based on a spectrum and/or discrete trust relationship between the owner and user of the mobile unit. A profile definition component can exploit an owner's trust relationships to designate levels of security. The profile definition component can further define a profile based on a set of applications, such as entertainment mode, browser mode, and the like. | 11-12-2009 |
20110296523 | ACCESS CONTROL MANAGEMENT MAPPING RESOURCE/ACTION PAIRS TO PRINCIPALS - The access control management technique described herein manages access control to one or more resources. Rather than mapping individuals or groups to permissions, the technique maps each permission (the right to perform an action on a resource) to the list of authorized principals (the users and groups authorized to perform the action on the resource). These lists are written in text form just as one would write the list of recipients (individuals and groups) of an email composition window. The technique also provides various operations to allow a user to manage the list of authorized principals and the authorizations assigned to a principal to access the resource/action pair. | 12-01-2011 |
20130212385 | UTILIZATION OF A PROTECTED MODULE TO PREVENT OFFLINE DICTIONARY ATTACKS - Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can be a hardware security module, a trusted platform module, or the like, is in communication with an authentication server. The protected module comprises a key that is restricted to the protected module. The key is employed in connection with authenticating the password on the protected module. | 08-15-2013 |
20130283337 | PREDICTING NEXT CHARACTERS IN PASSWORD GENERATION - A current prefix character string representing a prefix of a proposed password may be obtained from a user input device. A prediction of a most likely next character of the proposed password may be determined, based on applying a set of heuristics to the current prefix character string. A response indicating an impact on a security strength of the proposed password may be determined, based on a selection of the predicted most likely next character. | 10-24-2013 |