Patents by Inventor Eric Flo
Eric Flo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7937431Abstract: A system and method for generating aggregated content views in a computing network are provided. A host computing device obtains a request for an aggregated view of content corresponding to a set of criteria. The host computing device queries itself and each computing device in a defined network for locally stored content matching the set of criteria. The query results are merged and displayed to a user at the host computing device as an aggregated list view.Type: GrantFiled: January 17, 2008Date of Patent: May 3, 2011Assignee: Microsoft CorporationInventors: Sterling Reasor, John Brezak, Eric Flo, Mohammed Samji
-
Patent number: 7640324Abstract: Computers on a local computer network, such as a home network or a small business network, are formed into a secured network group that provides common user access control and enables resource sharing among the computers in the group. A computer on the local network discovers whether there are secured network groups existing on the local network. If one secured network group is found, the computer indicates to a second computer in the group its desire to join the group, and establishes trust with that computer, such as by entering a proper user name and password, or a secret identification number. Once the trust is established, the first computer joins the group. Within the secured network group, user accounts and user profiles are replicated to each of the computers in the group. The establishment of trust and the replication of user accounts and profiles among the computers in the group enable the implementation of security policies and user access control in a group-wide manner.Type: GrantFiled: April 15, 2003Date of Patent: December 29, 2009Assignee: Microsoft CorporationInventors: Andrew P. Sinclair, John E. Brezak, Jr., Eric Flo, Chris Guzak, Sean O. Lyndersay, Sterling Reasor, Richard B. Ward
-
Patent number: 7620679Abstract: A system and method for generating aggregated content views in a computing network are provided. A host computing device obtains a request for an aggregated view of content corresponding to a set of criteria. The host computing device queries itself and each computing device in a defined network for locally stored content matching the set of criteria. The query results are merged and displayed to a user at the host computing device as an aggregated list view.Type: GrantFiled: October 23, 2003Date of Patent: November 17, 2009Assignee: Microsoft CorporationInventors: Sterling Reasor, John Brezak, Eric Flo, Mohammed Samji
-
Patent number: 7577659Abstract: A credential is translated with one of different credential provider modules each translating a corresponding different type of credential into a common protocol. The translated credential is communicated through an API to a logon UI module to an operating system (OS) of a local machine. An OS logon module is called by the logon UI module to authenticate the translated credential against a credential database. A user identified by the translated credential is logged on to access the local machine when the authentication is successful. The credential can also be used with a selection received from the logon UI module via a corresponding one of different pre-log access provider (PLAP) modules that each communicate with the API. The API establishes a network session with an access service specified by the selected PLAP module when the credential is authenticated with the credential database.Type: GrantFiled: October 24, 2003Date of Patent: August 18, 2009Assignee: Microsoft CorporationInventors: Klaus U. Schutz, Stefan Richards, Eric C. Perlin, Cristian Ilac, Sterling M. Reasor, Eric Flo, John Stephens, Benjamin A. Hutz
-
Publication number: 20080133547Abstract: A system and method for generating aggregated content views in a computing network are provided. A host computing device obtains a request for an aggregated view of content corresponding to a set of criteria. The host computing device queries itself and each computing device in a defined network for locally stored content matching the set of criteria. The query results are merged and displayed to a user at the host computing device as an aggregated list view.Type: ApplicationFiled: January 17, 2008Publication date: June 5, 2008Applicant: MICROSOFT CORPORATIONInventors: Sterling Reasor, John Brezak, Eric Flo, Mohammed Samji
-
Publication number: 20080120693Abstract: This invention is directed to provide a method for enabling an administrator to monitor and selectively limit the computer functions available to a user. The method is carried out on a personal computer by an administrator, and administrator decisions can be enforced on other personal computers in a local network. The invention enables an administrator to restrict a user's logon hours, logon duration, access to computer functions, and access to applications based on content rating. In addition, the administrator may temporarily restrict or extend normally allowed access privileges. The invention also allows for the monitoring, auditing, and reporting of a user's computer function usage to an administrator.Type: ApplicationFiled: January 24, 2008Publication date: May 22, 2008Applicant: MICROSOFT CORPORATIONInventors: CRAIG BEILINSON, RAYMOND CHEN, RAMKUMAR RAMASUBRAMANIAN, DENNIS DAVIS, CHRISTOPHER EVANS, ERIC FLO, STERLING REASOR
-
Publication number: 20060242427Abstract: Systems and/or methods are described that enable a credential interface. These systems and/or methods may build a credential user interface enabling a user to choose between multiple credentials and submit an authenticator for a chosen credential. These systems and/or methods may also gather information about arbitrary credentials and build a user interface for submission of authenticators for these arbitrary credentials.Type: ApplicationFiled: April 22, 2005Publication date: October 26, 2006Applicant: Microsoft CorporationInventors: David Ruzyski, James Hong, Brian McNeil, Chris Guzak, Brian Wentz, Klaus Schutz, Stefan Richards, Eric Perlin, Cristian Ilac, Sterling Reasor, Eric Flo, John Stephens, Benjamin Hutz
-
Publication number: 20060167858Abstract: A method and system for implementing policy by accumulating policies for a policy recipient from policy objects associated with a hierarchically organized structure of containers, such as directory containers (sites, domains and organizational units) that includes the policy recipient. Based on administrator input, policy settings for the policy recipient may be accumulated into a specific order by inheriting policy from higher containers, which may enforce their policy settings over those of lower containers. Policy that is not enforced may be blocked at a container. The result is an accumulated set of group policy objects that are ordered by relative strength to resolve any policy conflicts. Policy may be applied to a policy recipient by calling extensions, such as an extension that layers the policy settings into the registry or an extension that uses policy information from the objects according to the ordering thereof. Linking of group policy objects to one or more containers (e.g.Type: ApplicationFiled: September 26, 2005Publication date: July 27, 2006Applicant: Microsoft CorporationInventors: Michael Dennis, Michele Freed, Daniel Plastina, Eric Flo, David Kays, Robert Corrington
-
Publication number: 20060059359Abstract: A system and method for controlling access to a computer provides for loose security within a local network while retaining strong security against external access to the network. In one embodiment, a user has access to trusted nodes in a secured group within an unmanaged network, without being required to choose, enter and remember a login password. To establish such a secure blank password or one-click logon account for the user on a computer, a strong random password is generated and stored, and the account is designated as a blank password account. If the device is part of a secured network group, the strong random password is replicated to the other trusted nodes. When a user with a blank password account wishes to log in to a computer, the stored strong random password is retrieved and the user is authenticated.Type: ApplicationFiled: September 15, 2004Publication date: March 16, 2006Applicant: Microsoft CorporationInventors: Sterling Reasor, Ramesh Chinta, Paul Leach, John Brezak, Eric Flo
-
Publication number: 20050188313Abstract: In an implementation of user interface transition, a user interface logon page is displayed with selectable logon controls that each have a corresponding user-identifiable indicator. A transition from the user interface logon page to a user interface desktop page is initiated in response to a selectable logon control being selected. The transition displays the user-identifiable indicator corresponding to the selectable logon control uninterrupted throughout the transition, and the user-identifiable indicator corresponding to the selectable logon control is displayed on the user interface desktop page.Type: ApplicationFiled: February 20, 2004Publication date: August 25, 2005Inventors: David Matthews, Kanwal VedBrat, Hillel Cooperman, Sterling Reasor, Charles Cummins, J. Hally, Mark Ligameri, Timothy McKee, Giampiero Sierra, Timothy Noonan, Eric Flo, Charles Stabb
-
Publication number: 20050188314Abstract: In an implementation of user interface start page, the start page includes a user-identifiable indicator associated with a user of a computing system to indicate that the user is logged-on to the computing system. The user interface start page also includes user-selectable controls from one or more regions of a user interface desktop page which is displayed after a transition from the user interface start page to the user interface desktop page. Each of the user-selectable controls on the user interface start page initiate a display of information associated with the user when selected.Type: ApplicationFiled: February 20, 2004Publication date: August 25, 2005Applicant: Microsoft CorporationInventors: David Matthews, Kanwal VedBrat, Hillel Cooperman, Sterling Reasor, Charles Cummins, J. Hally, Mark Ligameri, Timothy McKee, Giampiero Sierra, Timothy Noonan, Eric Flo, Charles Stabb
-
Publication number: 20050188317Abstract: In an implementation of initiate multiple applications, a user interface includes a user-selectable control to initiate that multiple applications start together at approximately a same time. The user interface includes user-selectable configurations to designate a multiple application start-up configuration.Type: ApplicationFiled: February 20, 2004Publication date: August 25, 2005Inventors: David Matthews, Kanwal VedBrat, Hillel Cooperman, Sterling Reasor, Charles Cummins, J. Hally, Mark Ligameri, Timothy McKee, Giampiero Sierra, Timothy Noonan, Eric Flo, Charles Stabb
-
Publication number: 20050091337Abstract: A system and method for generating aggregated content views in a computing network are provided. A host computing device obtains a request for an aggregated view of content corresponding to a set of criteria. The host computing device queries itself and each computing device in a defined network for locally stored content matching the set of criteria. The query results are merged and displayed to a user at the host computing device as an aggregated list view.Type: ApplicationFiled: October 23, 2003Publication date: April 28, 2005Inventors: Sterling Reasor, John Brezak, Eric Flo, Mohammed Samji
-
Publication number: 20050091213Abstract: A credential is translated with one of different credential provider modules each translating a corresponding different type of credential into a common protocol. The translated credential is communicated through an API to a logon UI module to an operating system (OS) of a local machine. An OS logon module is called by the logon UI module to authenticate the translated credential against a credential database. A user identified by the translated credential is logged on to access the local machine when the authentication is successful. The credential can also be used with a selection received from the logon UI module via a corresponding one of different pre-log access provider (PLAP) modules that each communicate with the API. The API establishes a network session with an access service specified by the selected PLAP module when the credential is authenticated with the credential database.Type: ApplicationFiled: October 24, 2003Publication date: April 28, 2005Inventors: Klaus Schutz, Stefan Richards, Eric Perlin, Cristian Ilac, Sterling Reasor, Eric Flo, John Stephens, Benjamin Hutz
-
Publication number: 20040210767Abstract: Computers on a local computer network, such as a home network or a small business network, are formed into a secured network group that provides common user access control and enables resource sharing among the computers in the group. A computer on the local network discovers whether there are secured network groups existing on the local network. If one secured network group is found, the computer indicates to a second computer in the group its desire to join the group, and establishes trust with that computer, such as by entering a proper user name and password, or a secret identification number. Once the trust is established, the first computer joins the group. Within the secured network group, user accounts and user profiles are replicated to each of the computers in the group. The establishment of trust and the replication of user accounts and profiles among the computers in the group enable the implementation of security policies and user access control in a group-wide manner.Type: ApplicationFiled: April 15, 2003Publication date: October 21, 2004Applicant: Microsoft CorporationInventors: Andrew P. Sinclair, John E. Brezak, Eric Flo, Chris Guzak, Sean O. Lyndersay, Sterling Reasor, Richard B. Ward