Patent application number | Description | Published |
20120151258 | SYSTEM RESET - Some embodiments of the invention provide techniques whereby a user may perform a system reset (e.g., to address system performance and/or reliability degradation, such as which may be caused by unused applications that unnecessarily consume system resources, an attempted un-install of an application that left remnants of the application behind, and/or other causes). In some embodiments, performing a system reset replaces a first instance of an operating system on the system with a new instance of the operating system, and removes any applications installed on the system, without disturbing the user's data. | 06-14-2012 |
20120158661 | CONTEXT-SPECIFIC ROLLBACK - Some embodiments of the invention provide components and/or techniques that may assist in choosing a snapshot to which to roll back to address a system malfunction. For example, some embodiments of the invention may record various metrics describing the system's performance, reliability and/or functionality at the points at which various snapshots are taken, along any of numerous dimensions. When a user later indicates a desire to restore the system to a previous point, these metrics may be analyzed to choose a snapshot to which to roll back. | 06-21-2012 |
20120158665 | SYSTEM RESET AND SYSTEM RESTORE - Some embodiments of the invention provide techniques for performing system reset and/or system restore operations. Some embodiments store a record of any changes performed to a data file stored on a virtual hard disk using differencing virtual disks that are captured over time. To restore the file to the state in which it existed at any particular point in time, embodiments of the invention may allow for rolling back the system to a differencing virtual disk captured at or before that time and setting aside blocks of the differencing virtual disk chain captured after that point. To perform a system reset, the system may be rolled back to the parent virtual hard disk, by setting aside all of the blocks of the differencing virtual disk chain. Some embodiments of the invention provide for separating information on the system into a plurality of entities, and maintaining a separate set of differencing virtual disks for each entity. For example, some embodiments may create an entity may be created for each of the operating system, applications and user data, and maintain differencing virtual disks for each over time. | 06-21-2012 |
20130067178 | MEMORY DUMP WITH EXPANDED DATA AND USER PRIVACY PROTECTION - A system and method for generating a triage dump of useful memory data from a computer that encounters an error while executing one or more software programs. The computer system may identify data values within the triage dump that are characteristic of personal data. To protect the privacy of the software user the personal data may be poisoned by overwriting the data values with overwrite values. The overwrite values used to poison the data values may be predetermined, based on the data values themselves, or chosen at random. The triage dump may be sent to an external server to associated with the developer of the one or more software programs for analysis. When overwrite values are dynamically selected, the specific overwrite values used may be sent to the server in connection with a triage dump. | 03-14-2013 |
20130067285 | MEMORY DUMP WITH EXPANDED DATA AND USER PRIVACY PROTECTION - A system and method for generating a triage dump of useful memory data from a computer that encounters an error while executing one or more software programs. The computer system may identify data values within the triage dump that are characteristic of personal data. To protect the privacy of the software user the personal data may be poisoned by overwriting the data values with overwrite values. The overwrite values used to poison the data values may be predetermined, based on the data values themselves, or chosen at random. The triage dump may be sent to an external server to associated with the developer of the one or more software programs for analysis. When overwrite values are dynamically selected, the specific overwrite values used may be sent to the server in connection with a triage dump. | 03-14-2013 |
20130160126 | MALWARE REMEDIATION SYSTEM AND METHOD FOR MODERN APPLICATIONS - A system is described for remediating a malicious modern application installed on an end user device. In an embodiment, the system includes an antimalware program executing on the end user device that can detect and attempt to remediate the malicious modern application, an operating system executing on the end user device that is configured to interact with the antimalware program for the purpose of facilitating the establishment of a connection between the end user device and an application support system in response to determining that the antimalware program has detected and attempted to remediate the malicious modern application, and the application support system that can perform remediation operations beyond those that can be performed by the antimalware program. | 06-20-2013 |
20130290949 | SYSTEM RESET - Some embodiments of the invention provide techniques whereby a user may perform a system reset (e.g., to address system performance and/or reliability degradation, such as which may be caused by unused applications that unnecessarily consume system resources, an attempted un-install of an application that left remnants of the application behind, and/or other causes). In some embodiments, performing a system reset replaces a first instance of an operating system on the system with a new instance of the operating system, and removes any applications installed on the system, without disturbing the user's data. | 10-31-2013 |
20140351640 | SYSTEM RESET - Some embodiments of the invention provide techniques whereby a user may perform a system reset (e.g., to address system performance and/or reliability degradation, such as which may be caused by unused applications that unnecessarily consume system resources, an attempted un-install of an application that left remnants of the application behind, and/or other causes). In some embodiments, performing a system reset replaces a first instance of an operating system on the system with a new instance of the operating system, and removes any applications installed on the system, without disturbing the user's data. | 11-27-2014 |