Patent application number | Description | Published |
20090265772 | Secure Key Distribution to Internet Clients - A server may bridge between a wide area network, such as the Internet, and a local area network and may process authentication requests from clients on the wide area network. The server may filter the requests to enable specific types of requests to pass, and may forward the requests to a credential server within the local area network and pass any responses back to the client. The server may be configured with some or all of a set of domain services objects, but such objects may be stored in a read only format. The server may further contain a minimum of or no sensitive data such that, if compromised, an attacker may gain little advantage. The client may request evidence of authentication available to devices within the local area network and may use the evidence of authentication to access services made available to the wide area network. | 10-22-2009 |
20120072716 | MULTITENANT-AWARE PROTECTION SERVICE - Implementing a data protection service. One method includes receiving a request to provision a first tenant among a plurality of tenants managed by a single data protection service. A tenant is defined as an entity among a plurality of entities. A single data protection service provides data protection services to all tenants in the plurality of tenants. A first encryption key used to decrypt the first tenant's data at the data store is stored. The first encryption key is specific to the first tenant and thus cannot be used to decrypt other tenants' data at the data store from among the plurality of tenants. Rather each tenant in the plurality of tenants is associated with an encryption key, not usable by other tenants, used at the data store to decrypt data on a tenant and corresponding key basis. | 03-22-2012 |
20130151419 | Merchant Verification of In-person Electronic Transactions - Validation data, such as an image selected by a merchant, is rendered on a mobile device of a customer to provide the merchant confirmation that payment for an item submitted through the mobile device of the customer was in fact received by the merchant. The merchant may establish an account on a network-accessible computing device (e.g., in the “cloud”) that includes the validation data. The customer authorizes payment to the merchant from the mobile device using the network connectivity of the mobile device. When the payment is received by the merchant, the network-accessible computing device sends the validation data to the customer's mobile device. The merchant may be confident that he or she has in fact received an electronic payment from the customer when the validation data is presented on the mobile device. Techniques to prevent reuse and copying of the validation data are also discussed. | 06-13-2013 |
20130198818 | Logout From Multiple Network Sites - Disclosed are various embodiments for logging out from multiple network sites using an authentication client that manages sessions for the network sites. Account data is maintained for multiple accounts of a user for multiple network sites. The account data includes a respective security credential for each of the accounts. An authentication client automatically authenticates with multiple authentication services corresponding to multiple network sites using multiple accounts in response to the user accessing each network site. A respective session is established for each network site. A logout is performed by ending each one of the sessions. | 08-01-2013 |
20130198821 | Account Management for Multiple Network Sites - Disclosed are various embodiments for account management for multiple network sites. Multiple accounts of a user are maintained for multiple network sites in a computing device. A secured resource of a network site is to be accessed by the computing device. A new account is created, or an existing account is upgraded, in response to determining that the accounts are not capable of accessing the secured resource. A set of information about the user is provided to the network site to create, or upgrade, the account. | 08-01-2013 |
20130198822 | Authentication Management Services - Disclosed are various embodiments for authentication management services, where authentication services of network sites may support authentication management clients associated with different authentication management services. An authentication request is obtained by way of an authentication protocol from an authentication management client executed in a client computing device. The authentication request specifies a security credential associated with a user account. The user account at the client computing device is authenticated for access to at least one secured resource of a network site in response to the authentication request and in response to the authentication management client being supported. | 08-01-2013 |
20130198823 | Presenting Managed Security Credentials to Network Sites - Disclosed are various embodiments for providing managed security credentials to network sites for authentication. Multiple accounts of a user are maintained for multiple network sites. A secured resource of a network site is to be accessed by a computing device. One of the accounts is identified according to a domain name of the network site. The account is associated with a different network site having a different domain name from the domain name. The computing device is automatically authenticated with the network site using a security credential associated with the account. | 08-01-2013 |
20130198824 | Recovery of Managed Security Credentials - Disclosed are various embodiments for recovery and other management functions relating to security credentials which may be centrally managed. Account data, which includes multiple security credentials for multiple network sites for a user, is stored by a service in an encrypted form. A request for the account data is obtained from a client. The request specifies a security credential for accessing the account data. The account data is sent to the client in response to determining that the client corresponds to a preauthorized client and in response to determining that the security credential for accessing the account data is valid. | 08-01-2013 |
20150033302 | LOGOUT FROM MULTIPLE NETWORK SITES - Disclosed are various embodiments for logging out from multiple network sites using an authentication client that manages sessions for the network sites. Account data is maintained for multiple accounts of a user for multiple network sites. The account data includes a respective security credential for each of the accounts. An authentication client automatically authenticates with multiple authentication services corresponding to multiple network sites using multiple accounts in response to the user accessing each network site. A respective session is established for each network site. A logout is performed by ending each one of the sessions. | 01-29-2015 |
Patent application number | Description | Published |
20130033498 | REDUCING FONT INSTRUCTIONS - One or more techniques and/or systems are disclosed for reducing font execution instructions for a font, and thereby a file size for the font. The font execution instructions can be scanned (e.g., by examining tables) to identify one or more common instruction sets in the font execution instructions. A function can be defined for a common instruction set, and the instances or appearances of the common instruction set in the font execution instructions can be replaced with a call to the function. Because the call is generally smaller (e.g., comprises fewer lines of code) than the common instruction set it replaces, the number of execution instructions for the font is reduced. | 02-07-2013 |
20130050234 | IMAGE RENDERING FILTER CREATION - One or more techniques and/or systems are disclosed for creating an image rendering filter that can be used to produce a desired view of an image. Monitor characteristics can be identified for a monitor that is displaying the image, and viewing characteristics of a viewer intending to view the image can also be identified. The monitor characteristics and the viewing characteristics can be used to create the image rendering filter, which may be applied to the input image the monitor, resulting in an “ideal” image for the particular viewer viewing the image on the particular monitor. | 02-28-2013 |
20130057554 | CONSOLIDATING GLYPHS OF A FONT - One or more techniques and/or systems are disclosed for consolidating one or more glyphs of a font. A common contour, comprising a glyph contour that occurs more than once in one or more glyphs of the font, can be identified. A common simple glyph can be created for the identified common contour. A reference to the common simple glyph can replace one or more occurrences of the common contour in the one or more glyphs of the font. Given that the common simple glyph is generally smaller than the common contour, an amount of font related data for the font can be reduced, thus reducing overhead associated with storing and/or presenting the font. | 03-07-2013 |
20130222407 | GLYPH RENDERING - Among other things, one or more techniques and/or systems are disclosed for rendering a glyph. Rendering data for the glyph can be received, such as size, shape, color, etc., along with first sub-pixel position for initially rendering the glyph on a display. A first rendering quality can be identified for the first sub-pixel position and second rendering quality can be identified for a second sub-pixel position, which may comprise an alternate rendering position. A sub-pixel position shift can be selected for the glyph based at least upon a comparison of the first and second rendering qualities. The sub-pixel position shift can comprise a difference between the first sub-pixel position and the second sub-pixel position, where the second rendering quality is selected/preferable over the first rendering quality. The glyph can be rendered by applying the selected sub-pixel position shift. | 08-29-2013 |
20140362104 | LAYERED Z-ORDER AND HINTED COLOR FONTS WITH DYNAMIC PALETTES - Technologies are generally provided for a set of data structures and font design techniques residing in a font file that enables the rich use of color that can be scaled for many devices with many resolutions and displayed on many types of colored backgrounds. Glyphs in a font may be ordered to provide z-ordering of layered color data. Multiple palettes may be provided within a font to handle multiple scenarios, including varying backgrounds. Furthermore, operating system text color choice may be integrated with the font designer's choice of colors, and the colored elements in a glyph may be hinted to improve the display of color on many different devices. A fall back to a non-colored glyph may also be provided when color is not supported on a platform or application. | 12-11-2014 |
Patent application number | Description | Published |
20090002374 | ERROR METRICS FOR CHARACTERS - Generating an error from an error metric quantifying differences between reference objects representing characters and representations of the reference objects. One embodiment includes a method which includes accessing a reference object representing a character. One or more reference object characteristics are quantified. The reference object characteristics are related to character structural and color information of at least a portion of the reference object to generate a reference object metric. A representation object of the reference object is accessed. One or more representation object characteristics are quantified to create a representation object metric. The representation object characteristics are related to character structural and color information of a portion of the representation object of the reference object corresponding to the portion of the reference object. An error is calculated based on a difference between the reference object metric and the representation object metric. The error is output to a user. | 01-01-2009 |
20090003711 | OPTIMIZING CHARACTER RENDERING - Optimizing objects output to a user. One method includes accessing a reference object of a character representing an idealized output. A different representation of the reference object is accessed. The reference object is compared to the representation of the reference object to generate an error metric. An optimization is applied to the representation of the reference object. The optimization is directed to causing the representation of the reference object to more closely approximate the reference object. Comparing objects and applying optimizations is repeated until an acceptable representation of the reference object is achieved. The acceptable representation of the reference object is displayed. | 01-01-2009 |
20090009529 | ADAPTIVE CONTEXTUAL FILTERING - Selectively applying graphical filtering to a portion of an object. One method described herein includes a method including accessing an object to be rendered. At least one characteristic of a portion of the object is determined. A filter is selected that has been pre-specified for the at least one determined characteristic. The filter is applied to the portion of the object, while not applying the filter to at least one other portion of the object. | 01-08-2009 |
20110018894 | ADAPTIVE CONTEXTUAL FILTERING BASED ON OBSERVER COLORBLINDNESS CHARACTERISTICS - Selectively applying graphical filtering to characters can include the identification of observer characteristics and characteristics associated with different portions of the character. Corresponding filters can then be identified and selectively applied to the characters and, in some instances, without applying the filter to the entire character. | 01-27-2011 |
20110018900 | ADAPTIVE CONTEXTUAL FILTERING BASED ON TYPOGRAPHICAL CHARACTERISTICS - Selectively applying graphical filtering to a portion of an object can include accessing an object to be rendered and identifying at least one characteristic of a portion of the object. A corresponding filter is then selectively applied to the at least one determined characteristic and, in some instances, without applying the filter to at least one other portion of the object. | 01-27-2011 |
20110096086 | ERROR METRICS FOR CHARACTERS - Generating an error from an error metric quantifying differences between reference objects representing characters and representations of the reference objects. One embodiment includes a method which includes accessing a reference object representing a character. One or more reference object characteristics are quantified. The reference object characteristics are related to character structural and color information of at least a portion of the reference object to generate a reference object metric. A representation object of the reference object is accessed. One or more representation object characteristics are quantified to create a representation object metric. The representation object characteristics are related to character structural and color information of a portion of the representation object of the reference object corresponding to the portion of the reference object. An error is calculated based on a difference between the reference object metric and the representation object metric. The error is output to a user. | 04-28-2011 |
20120320065 | RENDERING STROKE PAIRS FOR GRAPHICAL OBJECTS - The principles of the present invention relate to rendering stroke pairs. A graphical object includes at least a first stroke and a second similarly oriented second stroke collectively representing a stroke pair. A calculated distance between the first stroke and the second stroke is constrained (e.g., to a center line between the strokes) to mitigate the possibility of rounding errors causing the represented stroke pair to be inappropriately rendered. After the stroke pair is constrained, controls points of the individual strokes can be adjusted so that the individual strokes are appropriately rendered at their respective constrained locations. The adjusted stroke pair is constrained between external reference points for appropriate rendering relative to other graphical objects. The graphical object, including the adjusted constrained stroke pair, is rendered at an output device. | 12-20-2012 |