Patents by Inventor David Fusari

David Fusari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10757182
    Abstract: The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed thereon. This example can also include a URI manager configured to receive a context-defining URI, the URI manager can be configured to run a sub-set of the applications specified by the context-defining URI and to set a common context for the sub-set of the applications as specified by the context-defining URI.
    Type: Grant
    Filed: December 18, 2015
    Date of Patent: August 25, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: George E. Hartz, David Fusari
  • Publication number: 20190073403
    Abstract: A method, a system, and a computer program product for querying data are disclosed. A query to a database is received. The data in the database is arranged using a master terminology data model. The master terminology data model contains a mapping of one or more terminology structures. Data responsive to the query is generated.
    Type: Application
    Filed: March 13, 2017
    Publication date: March 7, 2019
    Inventors: David Fusari, Matvey B. Palchuk, Asad Saad Basir, Joshua Owen Graff, Steve Kundrot, Merryl J. Gross
  • Publication number: 20160314280
    Abstract: A system, a method, and a computer program product for identifying candidates for a clinical study are disclosed. A subject matter query for a study is received. Based on the received subject matter query, a group of potential candidates for participating in the study is ascertained. The subject matter query is received at a federated data repository system storing heterogeneous data. The federated data repository system translates the subject matter query and based on the translated subject matter query, the group of potential candidates is ascertained.
    Type: Application
    Filed: December 9, 2014
    Publication date: October 27, 2016
    Applicant: TriNetX, Inc.
    Inventors: David Fusari, Laura Brass
  • Publication number: 20160285852
    Abstract: A virtual machine project manager creates a generic, i.e., not user-specific, virtual machine image file. Copies of this image file may be distributed to one or more users, each of whom may then use an automated procedure to generate a user-specific virtual machine image file and, thus, a user-specific virtual machine on his/her remote host computer. The generic virtual machine image file may be distributed on computer-readable media, such as a DVD disks, or the file may be stored on a server and downloaded (such as via the Internet) by the users. Each user also receives or downloads a token, which contains a small amount of user-specific information that is used by the automated procedure to provision the generic virtual machine image file for the particular user. A virtual machine accesses a security token connected to a host computer to automatically authenticate or re-authenticate a user, such as when a virtual private network connection is restarted.
    Type: Application
    Filed: June 10, 2016
    Publication date: September 29, 2016
    Inventors: Rob Seliger, George Hartz, Eric Fontana, David Fusari
  • Patent number: 9392078
    Abstract: A virtual machine project manager creates a generic, i.e., not user-specific, virtual machine image file. Copies of this image file may be distributed to one or more users, each of whom may then use an automated procedure to generate a user-specific virtual machine image file and, thus, a user-specific virtual machine on his/her remote host computer. The generic virtual machine image file may be distributed on computer-readable media, such as a DVD disks, or the file may be stored on a server and downloaded (such as via the Internet) by the users. Each user also receives or downloads a token, which contains a small amount of user-specific information that is used by the automated procedure to provision the generic virtual machine image file for the particular user. A virtual machine accesses a security token connected to a host computer to automatically authenticate or re-authenticate a user, such as when a virtual private network connection is restarted.
    Type: Grant
    Filed: March 21, 2007
    Date of Patent: July 12, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Rob Seliger, George Hartz, Eric Fontana, David Fusari
  • Publication number: 20160105497
    Abstract: The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed thereon. This example can also include a URI manager configured to receive a context-defining URI, the URI manager can be configured to run a sub-set of the applications specified by the context-defining URI and to set a common context for the sub-set of the applications as specified by the context-defining URI.
    Type: Application
    Filed: December 18, 2015
    Publication date: April 14, 2016
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: George E. HARTZ, David FUSARI
  • Patent number: 9256462
    Abstract: The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed thereon. This example can also include a URI manager configured to receive a context-defining URI, the URI manager can be configured to run a sub-set of the applications specified by the context-defining URI and to set a common context for the sub-set of the applications as specified by the context-defining URI.
    Type: Grant
    Filed: February 17, 2012
    Date of Patent: February 9, 2016
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: George E. Hartz, David Fusari
  • Patent number: 9213513
    Abstract: A virtual printer driver or proxy printer driver executed by a virtual machine communicates with a real printer driver executed by a host computer to enable application programs executed by the virtual machine to print data on printers that are accessible by the host computer.
    Type: Grant
    Filed: March 21, 2007
    Date of Patent: December 15, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: George Hartz, Eric Fontana, David Fusari
  • Patent number: 8528066
    Abstract: Some embodiments relate to processing a web page requested by a web browser. The requested web page is received, and additional code is inserted into the web page that alters and/or augments the functionality of the web page. The web page is then forwarded to the web browser that requested it. The browser executes the code inserted into the web page, thereby augmenting the functionality of the web page.
    Type: Grant
    Filed: August 25, 2009
    Date of Patent: September 3, 2013
    Assignee: Microsoft Corporation
    Inventors: David Fusari, George Hartz
  • Publication number: 20130219413
    Abstract: The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed thereon. This example can also include a URI manager configured to receive a context-defining URI, the URI manager can be configured to run a sub-set of the applications specified by the context-defining URI and to set a common context for the sub-set of the applications as specified by the context-defining URI.
    Type: Application
    Filed: February 17, 2012
    Publication date: August 22, 2013
    Applicant: MICROSOFT CORPORATION
    Inventors: George E. Hartz, David Fusari
  • Patent number: 8326449
    Abstract: Systems and methods augment a virtual machine (computer) hosting environment from within a virtual machine. A communication channel between the virtual machine and the player is used to send instructions to the player to load and execute requested software modules. Requests to load and execute the modules may originate in the corporate network and may be issued by the corporate network administrator. If a requested module is not stored on the host computer, the virtual machine may upload the module, via the communication channel, to the player. The uploaded module may, for example: (a) install a required upgrade in the host operating system; (b) execute virus checking software on the host computer; or (c) install a corporate network-provided secure printing module that enables software being executed by the host computer to print on devices connected to the host computer.
    Type: Grant
    Filed: April 4, 2008
    Date of Patent: December 4, 2012
    Assignee: Microsoft Corporation
    Inventors: George Hartz, Chad Nale, David Fusari
  • Patent number: 7984064
    Abstract: Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information.
    Type: Grant
    Filed: March 4, 2011
    Date of Patent: July 19, 2011
    Assignee: Sentillion, Inc.
    Inventor: David Fusari
  • Publication number: 20110154486
    Abstract: Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information.
    Type: Application
    Filed: March 4, 2011
    Publication date: June 23, 2011
    Applicant: Sentillion, Inc.
    Inventor: David Fusari
  • Patent number: 7966381
    Abstract: Methods and apparatus related to context management in a networked environment are provided. According to one aspect, a technique is provided for facilitating communication between a client and a context management (CM) server, comprising establishing a network connection between the client and the CM server to enable communication, and maintaining the connection for the period of time during which the context is maintained. According to another aspect, a requested change in at least one aspect of a context is facilitated by publishing a change decision from the context management server to the participant applications. In another aspect, a technique is employed to verify that a remote application is emulated on the same client as at least one other application in a context by receiving from the client and the remote application server information that uniquely identifies the client.
    Type: Grant
    Filed: August 13, 2009
    Date of Patent: June 21, 2011
    Assignee: Sentillion, Inc.
    Inventor: David Fusari
  • Patent number: 7925664
    Abstract: Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one 10 computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information.
    Type: Grant
    Filed: December 22, 2009
    Date of Patent: April 12, 2011
    Assignee: Sentillion, Inc.
    Inventor: David Fusari
  • Publication number: 20110055912
    Abstract: Some embodiments relate to processing a web page requested by a web browser. The requested web page is received, and additional code is inserted into the web page that alters and/or augments the functionality of the web page. The web page is then forwarded to the web browser that requested it. The browser executes the code inserted into the web page, thereby augmenting the functionality of the web page.
    Type: Application
    Filed: August 25, 2009
    Publication date: March 3, 2011
    Applicant: Sentillion, Inc.
    Inventors: David Fusari, George Hartz
  • Patent number: 7818353
    Abstract: A method and apparatus for use in a computer system comprising at least two software applications sharing context, wherein a context change may be requested by a user of at least one of the at least two software applications. In response to the user requesting a change from a first context to a second context, at least one business rule is applied to at least a portion of the first context and/or to at least a portion of the second context to obtain at least one result from the application of the business rule. In response to the at least one result, at least one act is performed selected from the group consisting of: denying the request to change from the first context to the second context; requesting the user to provide information relating to the requested change; and requesting the user to affirm information relating to the requested change.
    Type: Grant
    Filed: October 27, 2009
    Date of Patent: October 19, 2010
    Assignee: Sentillion, Inc.
    Inventors: David Fusari, Robert Seliger
  • Publication number: 20100146046
    Abstract: Methods and apparatus related to context management in a networked environment are provided. According to one aspect, technique is employed to verify that a remote application is emulated on the same client as at least one other application in a context by receiving from the client and the remote application server information that uniquely identifies the client.
    Type: Application
    Filed: February 9, 2010
    Publication date: June 10, 2010
    Applicant: Sentillion, Inc.
    Inventor: David Fusari
  • Publication number: 20100114960
    Abstract: A method and apparatus for use in a computer system comprising at least two software applications sharing context, wherein a context change may be requested by a user of at least one of the at least two software applications. In response to the user requesting a change from a first context to a second context, at least one business rule is applied to at least a portion of the first context and/or to at least a portion of the second context to obtain at least one result from the application of the business rule. In response to the at least one result, at least one act is performed selected from the group consisting of: denying the request to change from the first context to the second context; requesting the user to provide information relating to the requested change; and requesting the user to affirm information relating to the requested change.
    Type: Application
    Filed: October 27, 2009
    Publication date: May 6, 2010
    Inventors: David Fusari, Robert Seliger
  • Publication number: 20100100956
    Abstract: Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one 10 computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information.
    Type: Application
    Filed: December 22, 2009
    Publication date: April 22, 2010
    Applicant: Sentillion, Inc.
    Inventor: David Fusari