Patent application number | Description | Published |
20130282752 | Application-Specific File Type Generation and Use - Techniques are described for facilitating file access control of a storage service. In response to a third-party application requesting access to a user's file, the service extracts an application-specific ID from a file type associated with the retrieved file; and grants access to the requested file in response to a determination that an application-specific ID for the third-party application matches an application-specific ID extracted from the file. This Abstract is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. | 10-24-2013 |
20130346450 | SYSTEM AND METHOD FOR DETECTING AND INTEGRATING WITH NATIVE APPLICATIONS ENABLED FOR WEB-BASED STORAGE - A cloud storage system provides remote access to a file associated with the cloud storage system. In response to a request to access the file, the cloud storage system identifies applications available to the request generator and capable of accessing the file, which may include both online web-based applications and applications installed on a device with which the user is accessing the file. The cloud storage system determines an application type of an identified application, and provides file access to the identified application based on the application type. | 12-26-2013 |
20130346453 | SYSTEM AND METHOD FOR END-TO-END EXPOSURE OF EXPORTED REPRESENTATIONS OF NATIVE DATA TYPES TO THIRD-PARTY APPLICATIONS - Systems and methods are disclosed herein for exporting a file to an application. A processor receives a request from a user for access to a file stored on a web-based storage system. The request includes a designation of an application to open the file, and the file is associated with a native format. The processor determines that the application is not configured to import the file in the native format and determines whether the file can be converted to an importable format that can be imported by the application. The processor converts the file from the native format to the importable format and exports the converted file in the importable format to the application, which opens the converted file. | 12-26-2013 |
20130347070 | SYSTEM AND METHOD FOR EMBEDDING FIRST PARTY WIDGETS IN THIRD-PARTY APPLICATIONS - Methods and systems provide embeddable user interface widgets to third-party applications so that the widgets can be securely embedded in, and securely used from within, the third-party applications. An embeddable widget may be authorized to access a first-party cloud storage system from a third-party application based on the cloud storage system authenticating a request received from the widget. The authentication may be based on an application identifier, an origin identifier, and/or one or more document identifiers received from the third-party application through the embedded widget. The disclosed methods and systems may significantly mitigate security concerns caused by embedding software in third-party sites, such as clickjacking. | 12-26-2013 |
20140280596 | REAL-TIME COLLABORATION FOR BINARY DATA FILES - A document collaboration system allows applications to collaborate on a binary data file even if the binary data file is not in a collaborative document format. In response to a request from an application to access a binary data file, the document collaboration system gives the application access to a document model corresponding to the binary data file and the application. If the document model does not already exist, it may be created by generating an empty document model, transmitting the binary data file to the application, and allowing the application to fill in the empty document model based on the binary data file. The document model may be provided to and modified by its related application through an application programming interface (API), and changes to the document model may be applied to the binary data file. | 09-18-2014 |
Patent application number | Description | Published |
20090286163 | ELECTROLYTE MIXTURES USEFUL FOR LI-ION BATTERIES - The present invention provides for the preparation of ionic liquid-lithium salt-low molecular weight liquid polymer mixtures. The mixture is useful as an electrolytic solution. Thus, the mixture is suitable as an electrolyte in batteries and supercapacitors as well as an active material for solid state light-emitting devices or polymer light-emitting displays or an electro deposition of alkali metals such as lithium, sodium, or potassium in the field of research or industry. The present invention further provides for a method making the mixture. Additionally, the present invention provides for a lithium battery comprising the mixture and a method of making the lithium battery. | 11-19-2009 |
20130141045 | ELECTRICALLY RECHARGEABLE, DUAL CHEMISTRY, BATTERY SYSTEM FOR USE IN PLUG-IN OR HYBRID ELECTRIC VEHICLES - An apparatus, method and system are disclosed, relating to a dual-chemistry battery subsystem having different battery chemistries and performance properties, and relating to an algorithm of charging and discharging the battery subsystem. For an EV application, the battery subsystem is a tailored solution that combines two different battery configurations, a first battery configuration and a second battery configuration, to satisfy the unique needs of different driving modes and performance profiles of an EV, such as a typical workday commute versus an occasional extended range trip on the weekend. The present disclosure provides intelligent control and heuristics to maximize useful energy on a wide variety of battery applications. | 06-06-2013 |
20140234702 | GRAPHENE OXIDE AS A SULFUR IMMOBILIZER IN HIGH PERFORMANCE LITHIUM/SULFUR CELLS - The loss of sulfur cathode material as a result of polysulfide dissolution causes significant capacity fading in rechargeable lithium/sulfur cells. Embodiments of the invention use a chemical approach to immobilize sulfur and lithium polysulfides via the reactive functional groups on graphene oxide. This approach obtains a uniform and thin (˜tens of nanometers) sulfur coating on graphene oxide sheets by a chemical reaction-deposition strategy and a subsequent low temperature thermal treatment process. Strong interaction between graphene oxide and sulfur or polysulfides demonstrate lithium/sulfur cells with a high reversible capacity of 950-1400 mAh g | 08-21-2014 |
Patent application number | Description | Published |
20110087690 | CLOUD BASED FILE STORAGE SERVICE - A server receives from a user's computer a request to store a file and a file hash value. The server determines whether a file with the same hash value is stored on the server. If so, the server grants access to the server's file copy. If not, the server requests the user to upload the file and stores it. The server grants access to the copy by sending the user a pointer to the copy's storage location and associating the user with the pointer in a database. The server can challenge the user's right to access the copy by requesting a file password or a portion of the file stored on the user's computer. The server can limit access to the server's copy to users who successfully respond to the challenge. | 04-14-2011 |
20110087776 | CLOUD BASED COMPUTER POWER MANAGEMENT - According to one general aspect, a method of providing data to a client device may include receiving a request from a client device for a multi-element document. The method may also include receiving, from the client device, an indicator related to the level of system resources of the client device. The method may include dynamically adjusting one or more of the elements included by the requested multi-element document based, at least in part, upon the received indicator. The method may further include transmitting the adjusted multi-element document to the client device. | 04-14-2011 |
20110087960 | Power Metering and Control in Cloud Based Computer - According to one general aspect, a method of regulating the system resource consumption of an apparatus may include monitoring one or more system resources of the apparatus. The method may also include receiving a request to display, via the apparatus, a requested multi-element document. The method may include retrieving by the apparatus, at least in part, the requested multi-element document. The method may include dynamically editing the requested multi-element document based, at least in part, upon the monitored system resources. The method may also include displaying the dynamically edited multi-element document. | 04-14-2011 |
20110088039 | Power Monitoring and Control in Cloud Based Computer - According to another general aspect, a method for displaying the system resource usage of a computer may include identifying the number of open tabs in one or more tabbed based browsers running on the computer. The method may include determining the system resource usage of each tab. The method may further include displaying the system resource usage of each tab in a system resource meter. | 04-14-2011 |
Patent application number | Description | Published |
20120303990 | POSTPONING SUSPEND - According to one general aspect, a method may include operating a computing device in a first power mode. The method may also include executing, by a processor of the computing device, at least one non-interactive task. The method may also include detecting, by a processor of the computing device, a request to place the computing device in a second power mode, wherein the second power mode consumes less system resources than the first power mode. The method may further include delaying the transition of the computing device to the second power mode until either the completion of the non-interactive task or an overriding triggering event. | 11-29-2012 |
20130198836 | Facial Recognition Streamlined Login - A system and method are disclosed for providing login credentials to a computer system using a biometric indicator. The system includes an image comparison module, a user interface, and an access control module. The image comparison module is configured to compare an image of a user, requesting login access to a client device, with images in a database to determine whether the image matches an image in the database. The user interface is configured to receive input from the image comparison module and to prompt the user for login credentials based on the input received from the comparison module. The access control module is configured to grant or deny login access to the user based on the user input that is entered in response to the prompting. | 08-01-2013 |
20150089262 | HEURISTICS BASED ON BACKOFF FOR POWER MODES - According to one general aspect, a method may include monitoring, by a computing device, a user's current behavior in regards to the computing device. The method may also include determining whether to place the computing device in a reduced power mode based upon the user's monitored current behavior and based on a history of user habits in regards to one or more computing devices. In various implementations, the method may further include, if it is determined to place the computing device in the reduced power mode, placing the computing device in the reduced power mode. | 03-26-2015 |