Patent application number | Description | Published |
20090313628 | DYNAMICALLY BATCHING REMOTE OBJECT MODEL COMMANDS - A client-server architecture provides mechanisms to assist in minimizing round trips between a client and server. The architecture exposes an object model for client use that is structured similarly to the server based object model. The client batches commands and then determines when to execute the batched commands on the server. Proxy objects act as proxies for objects and serve as a way to suggest additional data retrieval operations for objects which have not been retrieved. Conditional logic and exceptions may be handled on the server without requiring additional roundtrips between the client and server. | 12-17-2009 |
20100192193 | SECURITY RESTRICTION TECHNIQUES FOR BROWSER-BASED APPLICATIONS - Various technologies and techniques are disclosed for restricting security levels that can be used with browser-based applications. When a request is received from an external application to retrieve data for use in a client browser, an intersection is performed on a permission set of a user of the client browser and of the external application to determine a new permission set to use for retrieving the requested data. Techniques for restricting operations of an external application that is being run in a client browser are also described. A session token is returned to a client browser after validating access can be granted to the client browser. Validation is performed to confirm access can be granted to an external application. A request for data is received from the external application, with the request for data containing the session token. The requested data is retrieved and returned to the external application. | 07-29-2010 |
20100199357 | SECURE HOSTING FOR UNTRUSTED CODE - Various technologies and techniques are disclosed for increasing security in execution environments. A system is described for handling DLL calls made from untrusted code. An execution environment instantiates a lower trust process when a high trust process determines a need to call untrusted code. When the untrusted code calls a method in an original DLL, the execution environment loads a shim DLL into the lower trust process. The shim DLL has a clone of the method from the original DLL. A method for increasing security when processing calls from untrusted code is described. A shim DLL is created from an original DLL, and is deployed so an execution environment will load the shim DLL instead of the original DLL. When an execution environment receives a call from a caller DLL to the original DLL, the call is routed through the shim DLL. A pluggable validation system is also described. | 08-05-2010 |
20100268793 | Method and System for Semantically Labeling Strings and Providing Actions Based on Semantically Labeled Strings - Abstract of the Disclosure A method for recognizing strings and annotating, or labeling, the strings with a type label. After the strings are annotated with a type label, application pro gram modules may use the type label to provide users with a choice of actions. If the user's computer does not have any actions associated with a type label, the user may be provided with the option to surf to a download Uniform Resource Locator (URL) and download action plug-ins for that type label. One or more recognizer plug-ins perform the recognition of particular strings in an electronic document. The recognize r plug-ins may be packaged with an application program module or they may be written by third parties to recognize particular strings that are of interest. One or more action plug-ins provide possible actions to be presented to the user based upon the type label associated with the string. | 10-21-2010 |
20130096813 | LOCATION ENHANCED MEETINGS AND COLLABORATION - A location enhanced meeting service (“LEM Service”) may provide a geographical based map indicating meeting locations for a selected day. The user can view locations of meetings for a scheduled day, along with travel times. Conditions impacting travel time may be provided to the user along with updated estimated travel times and suggested alternative routes. The scale of the map may be based on the geographical diversity of the attendees. A user can view a location enhanced meeting map for particular meeting, and obtain directions to the meeting. The user can also request to view attendee's locations to the meeting on the map prior to the meeting. If an attendee is expected to be late, the user may establish a voice conference with that attendee. If a user is expected to be late to a meeting, the user may provide a notification to the other attendees of the meeting. | 04-18-2013 |