Patents by Inventor David Fusari
David Fusari has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10757182Abstract: The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed thereon. This example can also include a URI manager configured to receive a context-defining URI, the URI manager can be configured to run a sub-set of the applications specified by the context-defining URI and to set a common context for the sub-set of the applications as specified by the context-defining URI.Type: GrantFiled: December 18, 2015Date of Patent: August 25, 2020Assignee: Microsoft Technology Licensing, LLCInventors: George E. Hartz, David Fusari
-
Publication number: 20190073403Abstract: A method, a system, and a computer program product for querying data are disclosed. A query to a database is received. The data in the database is arranged using a master terminology data model. The master terminology data model contains a mapping of one or more terminology structures. Data responsive to the query is generated.Type: ApplicationFiled: March 13, 2017Publication date: March 7, 2019Inventors: David Fusari, Matvey B. Palchuk, Asad Saad Basir, Joshua Owen Graff, Steve Kundrot, Merryl J. Gross
-
Publication number: 20160314280Abstract: A system, a method, and a computer program product for identifying candidates for a clinical study are disclosed. A subject matter query for a study is received. Based on the received subject matter query, a group of potential candidates for participating in the study is ascertained. The subject matter query is received at a federated data repository system storing heterogeneous data. The federated data repository system translates the subject matter query and based on the translated subject matter query, the group of potential candidates is ascertained.Type: ApplicationFiled: December 9, 2014Publication date: October 27, 2016Applicant: TriNetX, Inc.Inventors: David Fusari, Laura Brass
-
Publication number: 20160285852Abstract: A virtual machine project manager creates a generic, i.e., not user-specific, virtual machine image file. Copies of this image file may be distributed to one or more users, each of whom may then use an automated procedure to generate a user-specific virtual machine image file and, thus, a user-specific virtual machine on his/her remote host computer. The generic virtual machine image file may be distributed on computer-readable media, such as a DVD disks, or the file may be stored on a server and downloaded (such as via the Internet) by the users. Each user also receives or downloads a token, which contains a small amount of user-specific information that is used by the automated procedure to provision the generic virtual machine image file for the particular user. A virtual machine accesses a security token connected to a host computer to automatically authenticate or re-authenticate a user, such as when a virtual private network connection is restarted.Type: ApplicationFiled: June 10, 2016Publication date: September 29, 2016Inventors: Rob Seliger, George Hartz, Eric Fontana, David Fusari
-
Patent number: 9392078Abstract: A virtual machine project manager creates a generic, i.e., not user-specific, virtual machine image file. Copies of this image file may be distributed to one or more users, each of whom may then use an automated procedure to generate a user-specific virtual machine image file and, thus, a user-specific virtual machine on his/her remote host computer. The generic virtual machine image file may be distributed on computer-readable media, such as a DVD disks, or the file may be stored on a server and downloaded (such as via the Internet) by the users. Each user also receives or downloads a token, which contains a small amount of user-specific information that is used by the automated procedure to provision the generic virtual machine image file for the particular user. A virtual machine accesses a security token connected to a host computer to automatically authenticate or re-authenticate a user, such as when a virtual private network connection is restarted.Type: GrantFiled: March 21, 2007Date of Patent: July 12, 2016Assignee: Microsoft Technology Licensing, LLCInventors: Rob Seliger, George Hartz, Eric Fontana, David Fusari
-
Publication number: 20160105497Abstract: The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed thereon. This example can also include a URI manager configured to receive a context-defining URI, the URI manager can be configured to run a sub-set of the applications specified by the context-defining URI and to set a common context for the sub-set of the applications as specified by the context-defining URI.Type: ApplicationFiled: December 18, 2015Publication date: April 14, 2016Applicant: Microsoft Technology Licensing, LLCInventors: George E. HARTZ, David FUSARI
-
Patent number: 9256462Abstract: The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed thereon. This example can also include a URI manager configured to receive a context-defining URI, the URI manager can be configured to run a sub-set of the applications specified by the context-defining URI and to set a common context for the sub-set of the applications as specified by the context-defining URI.Type: GrantFiled: February 17, 2012Date of Patent: February 9, 2016Assignee: Microsoft Technology Licensing, LLCInventors: George E. Hartz, David Fusari
-
Patent number: 9213513Abstract: A virtual printer driver or proxy printer driver executed by a virtual machine communicates with a real printer driver executed by a host computer to enable application programs executed by the virtual machine to print data on printers that are accessible by the host computer.Type: GrantFiled: March 21, 2007Date of Patent: December 15, 2015Assignee: Microsoft Technology Licensing, LLCInventors: George Hartz, Eric Fontana, David Fusari
-
Patent number: 8528066Abstract: Some embodiments relate to processing a web page requested by a web browser. The requested web page is received, and additional code is inserted into the web page that alters and/or augments the functionality of the web page. The web page is then forwarded to the web browser that requested it. The browser executes the code inserted into the web page, thereby augmenting the functionality of the web page.Type: GrantFiled: August 25, 2009Date of Patent: September 3, 2013Assignee: Microsoft CorporationInventors: David Fusari, George Hartz
-
Publication number: 20130219413Abstract: The present discussion relates to contextually interacting with applications. One example can include a computer that has a set of applications installed thereon. This example can also include a URI manager configured to receive a context-defining URI, the URI manager can be configured to run a sub-set of the applications specified by the context-defining URI and to set a common context for the sub-set of the applications as specified by the context-defining URI.Type: ApplicationFiled: February 17, 2012Publication date: August 22, 2013Applicant: MICROSOFT CORPORATIONInventors: George E. Hartz, David Fusari
-
Patent number: 8326449Abstract: Systems and methods augment a virtual machine (computer) hosting environment from within a virtual machine. A communication channel between the virtual machine and the player is used to send instructions to the player to load and execute requested software modules. Requests to load and execute the modules may originate in the corporate network and may be issued by the corporate network administrator. If a requested module is not stored on the host computer, the virtual machine may upload the module, via the communication channel, to the player. The uploaded module may, for example: (a) install a required upgrade in the host operating system; (b) execute virus checking software on the host computer; or (c) install a corporate network-provided secure printing module that enables software being executed by the host computer to print on devices connected to the host computer.Type: GrantFiled: April 4, 2008Date of Patent: December 4, 2012Assignee: Microsoft CorporationInventors: George Hartz, Chad Nale, David Fusari
-
Patent number: 7984064Abstract: Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information.Type: GrantFiled: March 4, 2011Date of Patent: July 19, 2011Assignee: Sentillion, Inc.Inventor: David Fusari
-
Publication number: 20110154486Abstract: Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information.Type: ApplicationFiled: March 4, 2011Publication date: June 23, 2011Applicant: Sentillion, Inc.Inventor: David Fusari
-
Patent number: 7966381Abstract: Methods and apparatus related to context management in a networked environment are provided. According to one aspect, a technique is provided for facilitating communication between a client and a context management (CM) server, comprising establishing a network connection between the client and the CM server to enable communication, and maintaining the connection for the period of time during which the context is maintained. According to another aspect, a requested change in at least one aspect of a context is facilitated by publishing a change decision from the context management server to the participant applications. In another aspect, a technique is employed to verify that a remote application is emulated on the same client as at least one other application in a context by receiving from the client and the remote application server information that uniquely identifies the client.Type: GrantFiled: August 13, 2009Date of Patent: June 21, 2011Assignee: Sentillion, Inc.Inventor: David Fusari
-
Patent number: 7925664Abstract: Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one 10 computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information.Type: GrantFiled: December 22, 2009Date of Patent: April 12, 2011Assignee: Sentillion, Inc.Inventor: David Fusari
-
Publication number: 20110055912Abstract: Some embodiments relate to processing a web page requested by a web browser. The requested web page is received, and additional code is inserted into the web page that alters and/or augments the functionality of the web page. The web page is then forwarded to the web browser that requested it. The browser executes the code inserted into the web page, thereby augmenting the functionality of the web page.Type: ApplicationFiled: August 25, 2009Publication date: March 3, 2011Applicant: Sentillion, Inc.Inventors: David Fusari, George Hartz
-
Patent number: 7818353Abstract: A method and apparatus for use in a computer system comprising at least two software applications sharing context, wherein a context change may be requested by a user of at least one of the at least two software applications. In response to the user requesting a change from a first context to a second context, at least one business rule is applied to at least a portion of the first context and/or to at least a portion of the second context to obtain at least one result from the application of the business rule. In response to the at least one result, at least one act is performed selected from the group consisting of: denying the request to change from the first context to the second context; requesting the user to provide information relating to the requested change; and requesting the user to affirm information relating to the requested change.Type: GrantFiled: October 27, 2009Date of Patent: October 19, 2010Assignee: Sentillion, Inc.Inventors: David Fusari, Robert Seliger
-
Publication number: 20100146046Abstract: Methods and apparatus related to context management in a networked environment are provided. According to one aspect, technique is employed to verify that a remote application is emulated on the same client as at least one other application in a context by receiving from the client and the remote application server information that uniquely identifies the client.Type: ApplicationFiled: February 9, 2010Publication date: June 10, 2010Applicant: Sentillion, Inc.Inventor: David Fusari
-
Publication number: 20100114960Abstract: A method and apparatus for use in a computer system comprising at least two software applications sharing context, wherein a context change may be requested by a user of at least one of the at least two software applications. In response to the user requesting a change from a first context to a second context, at least one business rule is applied to at least a portion of the first context and/or to at least a portion of the second context to obtain at least one result from the application of the business rule. In response to the at least one result, at least one act is performed selected from the group consisting of: denying the request to change from the first context to the second context; requesting the user to provide information relating to the requested change; and requesting the user to affirm information relating to the requested change.Type: ApplicationFiled: October 27, 2009Publication date: May 6, 2010Inventors: David Fusari, Robert Seliger
-
Publication number: 20100100956Abstract: Methods and apparatus for controlling user access to a computing environment are provided. In one embodiment, a method performed by a user is provided for gaining access to at least one computing device. The method comprises gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user's identity to the at least one computing device; presenting to the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and gaining access to the at least one 10 computing device at a subsequent time by presenting the physical device to the at least one computing device without providing the credential information.Type: ApplicationFiled: December 22, 2009Publication date: April 22, 2010Applicant: Sentillion, Inc.Inventor: David Fusari