Patent application number | Description | Published |
20120272336 | Transcoding Content Based On Verification of Ownership of the Content - A computer-implemented method includes generating data indicative of one or more times in which to sample content of a first resource and content of a second resource; receiving, from a client device, content of the first resource sampled at the one or more times; comparing the sampled content from the first resource to content sampled from the second resource at the one or more times; determining, based on comparing, that the first resource includes a same resource as the second resource; verifying, based on determining, ownership of the second resource; generating, based on a verifying, a user key specifying ownership of the second resource; and transmitting the user key to the client device. | 10-25-2012 |
20120291102 | PERMISSION-BASED ADMINISTRATIVE CONTROLS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing permission-based administrative controls. In one aspect, a method includes receiving an administrator-defined pairing that identifies a permission and one or more applications, and receiving a request from a requesting application to perform one or more operations that are associated with the permission. The method also includes determining whether the requesting application is identified in the pairing, and selectively allowing the requesting application to perform the operations based on determining whether the requesting application is identified in the pairing. | 11-15-2012 |
20120291103 | PERMISSION-BASED ADMINISTRATIVE CONTROLS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing permission-based administrative controls. In one aspect, a method includes receiving an administrator-defined pairing that identifies a permission and one or more applications, and receiving a request from a requesting application to perform one or more operations that are associated with the permission. The method also includes determining whether the requesting application is identified in the pairing, and selectively allowing the requesting application to perform the operations based on determining whether the requesting application is identified in the pairing. | 11-15-2012 |
20130014212 | PERMISSION-BASED ADMINISTRATIVE CONTROLS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for implementing permission-based administrative controls. In one aspect, a method includes receiving an administrator-defined pairing that identifies a permission and one or more applications, and receiving a request from a requesting application to perform one or more operations that are associated with the permission. The method also includes determining whether the requesting application is identified in the pairing, and selectively allowing the requesting application to perform the operations based on determining whether the requesting application is identified in the pairing. | 01-10-2013 |
20130091542 | APPLICATION MARKETPLACE ADMINISTRATIVE CONTROLS - The subject matter of this specification can be embodied in, among other things, a method that includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users. One or more of the applications that are associated with the restricted permission are identified by the servers associated with the application marketplace, and access by the particular user to the applications that are associated with the restricted permission is restricted by the servers associated with the application marketplace. | 04-11-2013 |
20130111020 | Monitoring Application Program Resource Consumption | 05-02-2013 |
20140172911 | Computer Application Promotion - A computer-implemented process includes providing a request to access content associated with a website; receiving web page information associated with the website, and data for displaying a notification that indicates availability of a native computer application that is associated with the website; providing a request to access information associated with the native computer application; receiving information associated with the native computer application that describes interactions between a plurality of users of an application marketplace and a component of the application marketplace that provides and receives information related to the native computer application; and displaying the descriptive information for viewing by a user, including displaying information that indicates the interactions between the plurality of users and the component of the application marketplace. | 06-19-2014 |
20140189832 | Transcoding Content Based on Verification of Ownership of the Content - A computer-implemented method includes generating data indicative of one or more times in which to sample content of a first resource and content of a second resource; receiving, from a client device, content of the first resource sampled at the one or more times; comparing the sampled content from the first resource to content sampled from the second resource at the one or more times; determining, based on comparing, that the first resource includes a same resource as the second resource; verifying, based on determining, ownership of the second resource; generating, based on a verifying, a user key specifying ownership of the second resource; and transmitting the user key to the client device. | 07-03-2014 |
20140366160 | Application Marketplace Administrative Controls - The subject matter of this specification can be embodied in, among other things, a method that includes receiving, by one or more servers associated with an application marketplace, a policy that includes data that identifies one or more users, and a restricted permission. A request is received, by the servers associated with the application marketplace, to access one or more applications that are distributed through the application marketplace, wherein the request includes data that identifies a particular one of the users. One or more of the applications that are associated with the restricted permission are identified by the servers associated with the application marketplace, and access by the particular user to the applications that are associated with the restricted permission is restricted by the servers associated with the application marketplace. | 12-11-2014 |
20140372248 | CROSS-REFERENCING COMMENTS - Methods, systems, and apparatuses, including computer programs encoded on a computer storage medium, for cross-referencing comments. In one aspect, a method includes, identifying unstructured text in a document associated with a first product or provider, in the unstructured text, identifying, by the one or more computers, a reference to a second product or provider different from the first product or provider, determining a relationship between the first product or provider and the second product or provider based on content of the unstructured text, and providing an indication of the relationship for display on a document associated with the first product or provider or the second product or provider. | 12-18-2014 |