Patents by Inventor Joseph Andrew Bono
Joseph Andrew Bono has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9288210Abstract: Techniques are described to provide revocable object access. In an implementation, a user may provide content and an object (e.g., a picture) to be published with the content. The object is uploaded to a storage location, and a uniform resource locator (URL) that includes a token is generated for the object. The token is registered in an access control list (ACL), and token permission settings in the ACL are utilized to control access to the object. The URL may be embedded in the content. When a viewer requests the content, the object may be retrieved from the storage location using the URL. The user may revoke access to the object by changing the token permission settings in the ACL.Type: GrantFiled: January 26, 2009Date of Patent: March 15, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Joseph Andrew Bono, Jeffrey E. Steinbok, Brian M. Perrin, Rebecca L. Pezely, Eileen S. Hash, Gyorgy K. Schadt, David A. Citron, Jonathan A. Bockelman, Daniel W. Crevier, Michael F. Matsel, Amy J. Beauford, Shabbir A. Shahpurwala
-
Patent number: 9230238Abstract: Techniques are described to share items from a favorites list. In an implementation, a list entry for a favorites list may be associated with content from a third party source by a first user. The favorites list may be presented in a webpage to display the list entry and the associated content to another user. A control operable to share the list entry with the other user may be exposed with the list entry. Responsive to operation of the control, the content and/or related data may be obtained from the third party source and data may be stored to associate the list entry including the obtained content with the other user. In at least some embodiments, the control is operable by a single-click to cause the sharing of the list entry.Type: GrantFiled: March 10, 2009Date of Patent: January 5, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Eric J. Zappa, Abdul Haadi Mohammed, Wendy Wenjing Wang, Jeffrey E. Steinbok, Joseph Andrew Bono
-
Patent number: 8863244Abstract: Communication abuse prevention techniques are described. In an implementation, a reputation level for a communication is determined based on relation information for a sender and an intended recipient of the communication. A challenge is invoked that is to be completed by the sender before the communication is sent. The challenge is selected based on the reputation level for the communication. The communication is caused to be available for access based on successful completion of the challenge. Access to the communication is inhibited in response to a subsequent determination of the reputation level that indicates that the reputation level for the communication has changed to a new reputation level prior to the communication being accessed by the intended recipient. The subsequent determination is based on additional information associated with the sender of the communication.Type: GrantFiled: May 31, 2012Date of Patent: October 14, 2014Assignee: Microsoft CorporationInventors: Joseph Andrew Bono, Thomas R. Bauman, Jeffrey E. Steinbok, Eileen S. Hash, Dan Wu
-
Patent number: 8424105Abstract: Aspects of the subject matter described herein relate to providing and restricting access to content. In aspects, information (e.g., a URL) that identifies content and a user is provided to a user. In conjunction with providing the information to a user, a data structure (e.g., an access control list) is updated to indicate that the user has access to the content. The user may use the information to access the content and/or may send this information to other users. The other users may use the information (e.g., by pasting it into a browser) to access the content and may be added to the data structure so that they may subsequently access the content without the use of the information. Access to the content via using the information may be subsequently revoked.Type: GrantFiled: June 10, 2011Date of Patent: April 16, 2013Assignee: Microsoft CorporationInventors: Jason Scott Flaks, Jordan L. K. Schwartz, Michael I. Torres, Joseph Andrew Bono
-
Publication number: 20120240202Abstract: Communication abuse prevention techniques are described. In an implementation, a reputation level for a communication is determined based on relation information for a sender and an intended recipient of the communication. A challenge is invoked that is to be completed by the sender before the communication is sent. The challenge is selected based on the reputation level for the communication. The communication is caused to be available for access based on successful completion of the challenge. Access to the communication is inhibited in response to a subsequent determination of the reputation level that indicates that the reputation level for the communication has changed to a new reputation level prior to the communication being accessed by the intended recipient.Type: ApplicationFiled: May 31, 2012Publication date: September 20, 2012Applicant: Microsoft CorporationInventors: Joseph Andrew Bono, Thomas R. Bauman, Jeffrey E. Steinbok, Eileen S. Hash, Dan Wu
-
Patent number: 8255987Abstract: Communication abuse prevention techniques are described. In an implementation, a reputation level for a communication is determined based on relation information for a sender and an intended recipient of the communication. A challenge is invoked that is to be completed by the sender before the communication is sent. The challenge is selected based on the reputation level for the communication.Type: GrantFiled: January 15, 2009Date of Patent: August 28, 2012Assignee: Microsoft CorporationInventors: Joseph Andrew Bono, Thomas R. Bauman, Jeffrey E. Steinbok, Eileen S. Hash, Dan Wu
-
Patent number: 8195601Abstract: A visitor to a profile page is invited to modify a user profile associated with the profile page. If the visitor elects to provide a suggested modification to the profile page, a message is transmitted to the user that owns the profile page requesting authorization to perform the suggested modification. In response to the message, the user can accept the suggested modification to the user profile, decline the suggested modification to the user profile, or edit the suggested modification to the user profile. If the user accepts or edits the suggested modification to the user profile, the user profile is modified accordingly. In this manner, a visitor to a profile page can assist in the creation of a user profile.Type: GrantFiled: September 26, 2008Date of Patent: June 5, 2012Assignee: Microsoft CorporationInventors: David W. Law, Jeffrey Craig Kunins, Eric Zappa, Brian M. Perrin, Archana M. Gadkari, Dan Wu, Joseph Andrew Bono, Jeffrey Earl Steinbok
-
Publication number: 20110247083Abstract: Aspects of the subject matter described herein relate to providing and restricting access to content. In aspects, information (e.g., a URL) that identifies content and a user is provided to a user. In conjunction with providing the information to a user, a data structure (e.g., an access control list) is updated to indicate that the user has access to the content. The user may use the information to access the content and/or may send this information to other users. The other users may use the information (e.g., by pasting it into a browser) to access the content and may be added to the data structure so that they may subsequently access the content without the use of the information. Access to the content via using the information may be subsequently revoked.Type: ApplicationFiled: June 10, 2011Publication date: October 6, 2011Applicant: Microsoft CorporationInventors: Jason Scott Flaks, Jordan L.K. Schwartz, Michael I. Torres, Joseph Andrew Bono
-
Patent number: 7984512Abstract: Aspects of the subject matter described herein relate to providing and restricting access to content. In aspects, information (e.g., a URL) that identifies content and a user is provided to a user. In conjunction with providing the information to a user, a data structure (e.g., an access control list) is updated to indicate that the user has access to the content. The user may use the information to access the content and/or may send this information to other users. The other users may use the information (e.g., by pasting it into a browser) to access the content and may be added to the data structure so that they may subsequently access the content without the use of the information. Access to the content via using the information may be subsequently revoked.Type: GrantFiled: June 14, 2007Date of Patent: July 19, 2011Assignee: Microsoft CorporationInventors: Jason Scott Flaks, Jordan L. K. Schwartz, Michael I Torres, Joseph Andrew Bono
-
Publication number: 20110004922Abstract: Customized content sharing techniques are described. In an implementation, an input is accepted that describes a particular type of content. The input is provided via selection of one or more privacy settings for a user of a social network service. The input is also used to control which other users of the social network service are permitted to communicate content to the user.Type: ApplicationFiled: July 1, 2009Publication date: January 6, 2011Applicant: Microsoft CorporationInventors: Joseph Andrew Bono, Omar H. Shahine, Paul A. Elliott, Ann M. Hudspeth, Tyler J. Schnoebelen
-
Publication number: 20100299276Abstract: Tools and techniques related to invitations with pre-populated profile information are provided. These tools may receive requests to create invitations for invitee users to join social networks, populate these invitations with profile information on behalf of at least one inviter user, and send these invitations to the invitee users.Type: ApplicationFiled: May 22, 2009Publication date: November 25, 2010Applicant: Microsoft CorporationInventors: Omar Shahine, Joseph Andrew Bono, Paul Alan Elliott, Ann Marie Hudspeth, Michelle Marise Aleong
-
Publication number: 20100235788Abstract: Techniques are described to share items from a favorites list. In an implementation, a list entry for a favorites list may be associated with content from a third party source by a first user. The favorites list may be presented in a webpage to display the list entry and the associated content to another user. A control operable to share the list entry with the other user may be exposed with the list entry. Responsive to operation of the control, the content and/or related data may be obtained from the third party source and data may be stored to associate the list entry including the obtained content with the other user. In at least some embodiments, the control is operable by a single-click to cause the sharing of the list entry.Type: ApplicationFiled: March 10, 2009Publication date: September 16, 2010Applicant: MICROSOFT CORPORATIONInventors: Eric J. Zappa, Abdul Haadi Mohammed, Wendy Wenjing Wang, Jeffrey E. Steinbok, Joseph Andrew Bono
-
Publication number: 20100192211Abstract: Techniques are described to provide revocable object access. In an implementation, a user may provide content and an object (e.g., a picture) to be published with the content. The object is uploaded to a storage location, and a uniform resource locator (URL) that includes a token is generated for the object. The token is registered in an access control list (ACL), and token permission settings in the ACL are utilized to control access to the object. The URL may be embedded in the content. When a viewer requests the content, the object may be retrieved from the storage location using the URL. The user may revoke access to the object by changing the token permission settings in the ACL.Type: ApplicationFiled: January 26, 2009Publication date: July 29, 2010Applicant: Microsoft CorporationInventors: Joseph Andrew Bono, Jeffrey E. Steinbok, Brian M. Perrin, Rebecca L. Pezely, Eileen S. Hash, Gyorgy K. Schadt, David A. Citron, Jonathan A. Bockelman, Daniel W. Crevier, Michael F. Matsel, Amy J. Beauford, Shabbir A. Shahpurwala
-
Publication number: 20100180333Abstract: Communication abuse prevention techniques are described. In an implementation, a reputation level for a communication is determined based on relation information for a sender and an intended recipient of the communication. A challenged is invoked that is to be completed by the sender before the communication is sent. The challenge is selected based on the reputation level for the communication.Type: ApplicationFiled: January 15, 2009Publication date: July 15, 2010Applicant: Microsoft CorporationInventors: Joseph Andrew Bono, Thomas R. Bauman, Jeffrey E. Steinbok, Eileen S. Hash, Dan Wu
-
Publication number: 20100082683Abstract: A visitor to a profile page is invited to modify a user profile associated with the profile page. If the visitor elects to provide a suggested modification to the profile page, a message is transmitted to the user that owns the profile page requesting authorization to perform the suggested modification. In response to the message, the user can accept the suggested modification to the user profile, decline the suggested modification to the user profile, or edit the suggested modification to the user profile. If the user accepts or edits the suggested modification to the user profile, the user profile is modified accordingly. In this manner, a visitor to a profile page can assist in the creation of a user profile.Type: ApplicationFiled: September 26, 2008Publication date: April 1, 2010Applicant: MICROSOFT CORPORATIONInventors: David W. Law, Jeffrey Craig Kunins, Eric Zappa, Brian M. Perrin, Archana M. Gadkari, Dan Wu, Joseph Andrew Bono, Jeffrey Earl Steinbok
-
Publication number: 20080313703Abstract: Aspects of the subject matter described herein relate to providing and restricting access to content. In aspects, information (e.g., a URL) that identifies content and a user is provided to a user. In conjunction with providing the information to a user, a data structure (e.g., an access control list) is updated to indicate that the user has access to the content. The user may use the information to access the content and/or may send this information to other users. The other users may use the information (e.g., by pasting it into a browser) to access the content and may be added to the data structure so that they may subsequently access the content without the use of the information. Access to the content via using the information may be subsequently revoked.Type: ApplicationFiled: June 14, 2007Publication date: December 18, 2008Applicant: MICROSOFT CORPORATIONInventors: Jason Scott Flaks, Jordan L.K. Schwartz, Michael I. Torres, Joseph Andrew Bono