Patent application number | Description | Published |
20090177790 | CONFIGURATION OF A PEER GROUP - Embodiments of the present invention relate to systems and methods for configuring computing devices to join a peer group. A peer group may be created on a subnetwork by a computing device. When a new computing device enters the subnetwork, it may join the peer group and be given access to the shared resources on the peer group and associated computing devices, using a communications layer and an authorization layer. Allowing a new computing device to join a peer group includes inviting the new device to join and then challenging the device for a passkey of the peer group. After joining the peer group, the computing device will be able to access and share resources with the peer group and other computing devices associated with the peer group. | 07-09-2009 |
20090178122 | ASSOCIATING COMPUTING DEVICES WITH COMMON CREDENTIALS - Method and computer storage media for sharing resources between a plurality of computing devices associated with a common non-enterprise network. A common set of credentials is stored on at least two or more of a plurality of computing devices that reside behind a routing device and are associated through a common non-enterprise network. Upon storing the common set of credentials, each of the two or more of a plurality of computing devices create a local account that contains, at least, the common set of credentials. The common set of credentials allow for the sharing, among the two or more of the plurality of computing devices, of resource that reside on or are associated with the computing devices. | 07-09-2009 |
20120158891 | TECHNIQUES FOR UNIVERSAL REPRESENTATION OF DIGITAL CONTENT - A universal content representation system (“UCRS”) implements techniques for universally representing digital content such as files, device information, and applications across a group of electronic devices that includes at least a source electronic device and a remote electronic device. Proxy content items, which correspond with items of content (“source content items”) stored on the source electronic device, are data stores for the corresponding source content items, and visually represent the corresponding source content items on the remote electronic device, whether the source electronic device is online or offline. A user of the remote electronic devices uses the proxy content items to search for and view source content items prior to requesting full access to the source content items. From time-to-time, source content items and proxy content items are synchronized with each other. | 06-21-2012 |
20120192275 | REPUTATION CHECKING OF EXECUTABLE PROGRAMS - The reputation of an executable computer program is checked when a user input to a computing device initiates a program launch, thus triggering a check of a local cache of reputation information. If the local cache confirms that the program is safe, it is permitted to launch, typically without notifying the user that a reputation check has been made. If the local cache cannot confirm the safety of the program, a reputation check is made by accessing a reputation service in the cloud. If the reputation service identifies the program as safe, it returns an indication to the computing device and the program is permitted to be launched, again without notifying the user that a reputation check has been made. If the reputation service identifies the program as unsafe or potentially unsafe, or does not recognize it at all, a warning is displayed to the user. | 07-26-2012 |
20130298214 | ASSOCIATING COMPUTING DEVICES WITH COMMON CREDENTIALS - Method and computer storage media for sharing resources between a plurality of computing devices associated with a common non-enterprise network. A common set of credentials is stored on at least two or more of a plurality of computing devices that reside behind a routing device and are associated through a common non-enterprise network. Upon storing the common set of credentials, each of the two or more of a plurality of computing devices create a local account that contains, at least, the common set of credentials. The common set of credentials allow for the sharing, among the two or more of the plurality of computing devices, of resource that reside on or are associated with the computing devices. | 11-07-2013 |
20140358887 | APPLICATION CONTENT SEARCH MANAGEMENT - A search service accesses application content accessible via one or more enumerated applications. The search service ranks the accessed application content in combination with non-application content to produce a combined ranking. Responsive to a search query, the search service provides one or more search results based on the combined ranking. | 12-04-2014 |
20140358909 | SEARCH RESULT CONTEXTS FOR APPLICATION LAUNCH - A search service executes on one or more computing systems and searches at least one index associated with content accessible through an application based on the at least one portion of the search query to provide search results associated with the application. A search results interface returns one or more search results from the search. At least one of the search results is associated with an application identifier identifying the application. The search service ranks the search results associated with the application with other search results from at least one other search of other content based on the search query. | 12-04-2014 |
20140358916 | PERSONALIZED PRIORITIZATION OF INTEGRATED SEARCH RESULTS - A search management system receives at a computing system one or more search results from a search operation based on a search query. The search operation performed a first search on content in a database accessible through an application, a second search on local to the computing system content, and a third search on Web content. At least one of the search results from the first search is associated with an application identifier identifying the application. A search results integrator ranks the search results from the first search, the second search, and the third search in aggregation according to historical search behavior collected about a user and presents the ranked search results from the first search, the second search, and the third search in an integrated view. | 12-04-2014 |
20140358970 | CONTEXT-BASED ACTIONS FROM A SOURCE APPLICATION - An action framework system provides context-based actions in association with a source application. The source application detects selection of a content element presented by the source application. The content element is associated with an application identifier identifying a target application and an action identifier identifying an operation to be executed by the target application on the content element. The target application identified by the application identifier is executed to perform the operation identified by the action identifier on the content element, responsive to detection of the selection of the content element. In one implementation, the source application is a search feature providing different contexts of search results (e.g., from a local file system search, a local application content search, a Web search, a remote application content search). | 12-04-2014 |
20140359598 | APPLICATION INSTALLATION FROM SEARCH RESULTS - A search management system receives at a computing device one or more search results from a search operation based on a search query. The search operation was performed a search on content in a datastore accessible through an application. At least one of the search results is associated with an application identifier identifying the application. A contextual application installer determines whether the application identified by the application identifier is already installed for execution by the computing device and installs the application on the computing device, if the application is not already installed on the computing device. As part of the installing operation, the contextual application installer presents a prompt identifying the application and installs the application on the computing device if an instruction to install the application is received responsive to presentation of the prompt. | 12-04-2014 |