Patents by Inventor Helen J. Wang
Helen J. Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10762195Abstract: Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween.Type: GrantFiled: June 9, 2018Date of Patent: September 1, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Helen J. Wang, Xiaofeng Fan, Collin Edward Jackson, Jonathan Ryan Howell, Zhenbin Xu
-
Publication number: 20180293375Abstract: Systems and methodologies for accessing resources associated with a Web-based application in accordance with one or more embodiments disclosed herein may include a browser that obtains at least first resources from a first domain and second resources from a second domain and a resource management component that facilitates controlled communication between the first resources and the second resources and prevents the first resources and the second resources from accessing other resources that the first resources and the second resources are not permitted to access. The resource management component may be further operable to contain restricted services in a sandbox containment structure and/or to isolate access-controlled resources in a service instance. In addition, the resource management component may be operable to facilitate the flexible display of resources from disparate domains and/or controlled communication therebetween.Type: ApplicationFiled: June 9, 2018Publication date: October 11, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Helen J. Wang, Xiaofeng Fan, Collin Edward Jackson, Jonathan Ryan Howell, Zhenbin Xu
-
Publication number: 20180197149Abstract: This disclosure is directed to fully automated schedule recommendation methods and systems that generate one or more predicted schedules of activities. The activities can be events, classes, courses, camps, workshops, private lessons, tutoring sessions, or any organized activities, lessons or schedules items offered by enrichment provider. The schedule recommendation methods and systems use machine learning techniques to computationally predict activities that satisfy user constraints and aggregates predicted schedules over time to propose full schedules of predicted activities that are most appropriate for the user and satisfies the multiple user constraints. The schedule recommendation methods and systems enable the user to select individual predicted activities, register the user with the enrichment providers that offer the selected activities, and pay the enrichment providers for the selected activities when the user checks out.Type: ApplicationFiled: January 8, 2018Publication date: July 12, 2018Applicant: 6Crickets, Inc.Inventors: Helen J. Wang, Kristina Toutanova, Adam Costello
-
Publication number: 20170249597Abstract: This disclosure is directed to systems and methods that enable users to schedule activities offered by multiple different enrichment providers. The systems and methods allow enrichment providers a place to market and offer activities to users, sifts through numerous activities offered by the enrichment providers to determine the activities that satisfy user criteria, such as date ranges, age, interest, and location. The user may also view the identified activities and create schedules of activities for one or more students, simultaneously register with the enrichment providers that offer the selected activities, and pay for selected activities.Type: ApplicationFiled: February 27, 2017Publication date: August 31, 2017Applicant: 6Crickets, Inc.Inventor: Helen J. Wang
-
Patent number: 9524344Abstract: A user interface may be utilized to allow a user to control display properties of online ad content on a hosting webpage (e.g., hosting ads from one domain on a webpage from a different domain). This may be accomplished by creating a cross-domain frame in the hosting webpage, which can contain the ad content. An instantiation of a user interface may be created on the hosting webpage that has an ability to control display properties of the cross-domain frame, thereby controlling display properties of the ad content in the cross-domain frame. Further, a task manager may be utilized as part of the user interface to facilitate a host of the hosting webpage to manage ad content.Type: GrantFiled: June 26, 2008Date of Patent: December 20, 2016Assignee: MICROSOFT CORPORATIONInventors: Xiaofeng Fan, Helen J. Wang, John D. Dunagan, Mansoor A. Malik, Rajesh S. Batheja
-
Patent number: 9106650Abstract: An access system is described herein which allows an application module to access a user-owned resource based on an indication of a user's intent to interact with the user-owned resource. For example, the application module can provide an application user interface which embeds a gadget associated with a particular user-owned resource. The access system can interpret the user's interaction with the gadget as conferring implicit permission to the application module to access the user-owned resource associated with the gadget. In addition, or alternatively, the user may make a telltale gesture in the course of interacting with the application module. The access system can interpret this gesture as conferring implicit permission to the application module to access a user-owned resource that is associated with the gesture.Type: GrantFiled: November 9, 2011Date of Patent: August 11, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan J. Parno, Helen J. Wang
-
Publication number: 20130205385Abstract: An access system is described herein which allows an application to access a system-level and/or application-specific user-owned resource based on a user's interaction with an intent-based access mechanism. For example, the intent-based access mechanism may correspond to a gadget that is embedded in an application user interface provided by the application, and/or logic for detecting a permission-granting input sequence. The access system accommodates different types of intent-based access mechanisms. One type is a scheduled intent-based access mechanism. Another type provides access to two or more user-owned resources. Further, the access system includes a mechanism for determining whether the application is permitted to use an intent-based access mechanism.Type: ApplicationFiled: February 8, 2012Publication date: August 8, 2013Applicant: Microsoft CorporationInventors: Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan J. Parno, Helen J. Wang
-
Publication number: 20130117840Abstract: An access system is described herein which allows an application module to access a user-owned resource based on an indication of a user's intent to interact with the user-owned resource. For example, the application module can provide an application user interface which embeds a gadget associated with a particular user-owned resource. The access system can interpret the user's interaction with the gadget as conferring implicit permission to the application module to access the user-owned resource associated with the gadget. In addition, or alternatively, the user may make a telltale gesture in the course of interacting with the application module. The access system can interpret this gesture as conferring implicit permission to the application module to access a user-owned resource that is associated with the gesture.Type: ApplicationFiled: November 9, 2011Publication date: May 9, 2013Applicant: MICROSOFT CORPORATIONInventors: Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan J. Parno, Helen J. Wang
-
Patent number: 8024815Abstract: In an embodiment of isolation environment-based information access, programs—including operating systems and applications—running on a computing-based device can be isolated in an environment such as a virtual machine. Information including commands and/or data transmitted between the computing-based device and the program(s) being run, as well as information associated with the program(s) and the computing-based device, is accessed without being detected by the program(s). In one implementation, the information includes state information as well as commands and/or data—including sensitive information, such as usernames and passwords. In another implementation, the information can be used to secretly access the program(s).Type: GrantFiled: September 15, 2006Date of Patent: September 20, 2011Assignee: Microsoft CorporationInventors: Jacob R. Lorch, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Samuel King
-
Publication number: 20090327869Abstract: Online ad hosting (e.g., hosting ads from one domain on a webpage from a different domain) is accomplished using an insulator cross-domain frame (e.g., an inline frame (IFrame)), into which a third party may load content, source code to detect events associated with the third party content (e.g., detecting if ad content wishes to expand), and a communicator same-domain IFrame for sending requests to the host webpage associated with detected events. That is, a cross-domain IFrame may be created in a host webpage, which can isolate an ad from the host webpage. A communicator frame may be utilized to communicate text messages between the contents of the cross-domain frame and the host webpage. Further, an API can be used to apply parameters, restrictions and allowable events to the third party content in the insulator IFrame.Type: ApplicationFiled: June 27, 2008Publication date: December 31, 2009Applicant: MICROSOFT CORPORATIONInventors: Xiaofeng Fan, John D. Dunagan, Helen J. Wang
-
Publication number: 20090300496Abstract: A user interface may be utilized to allow a user to control display properties of online ad content on a hosting webpage (e.g., hosting ads from one domain on a webpage from a different domain). This may be accomplished by creating a cross-domain frame in the hosting webpage, which can contain the ad content. An instantiation of a user interface may be created on the hosting webpage that has an ability to control display properties of the cross-domain frame, thereby controlling display properties of the ad content in the cross-domain frame. Further, a task manager may be utilized as part of the user interface to facilitate a host of the hosting webpage to manage ad content.Type: ApplicationFiled: June 26, 2008Publication date: December 3, 2009Applicant: MICROSOFT CORPORATIONInventors: Xiaofeng Fan, Helen J. Wang, John D. Dunagan, Mansoor A. Malik, Rajesh S. Batheja
-
Publication number: 20090299862Abstract: Online ad hosting (e.g., hosting ads from one domain on a webpage from a different domain) is accomplished using a cross-domain frame (e.g., an inline frame (IFrame)), a secure inter-frame communications channel, and a source code interface (e.g., a set of application program interfaces (APIs)). That is, a cross-domain IFrame may be created in a host webpage, which can isolate an ad from the host webpage. An inter-frame communications channel may be utilized to communicate between the contents of the cross-domain frame and the host webpage. Further, a source code interface may be used to communicate a host's preferences for an ad's parameters and restrictions.Type: ApplicationFiled: June 26, 2008Publication date: December 3, 2009Applicant: MICROSOFT CORPORATIONInventors: Xiaofeng Fan, Helen J. Wang, John D. Dunagan, Mansoor A. Malik, Rajesh S. Batheja
-
Publication number: 20080127355Abstract: In an embodiment of isolation environment-based information access, programs—including operating systems and applications—running on a computing-based device can be isolated in an environment such as a virtual machine. Information including commands and/or data transmitted between the computing-based device and the program(s) being run, as well as information associated with the program(s) and the computing-based device, is accessed without being detected by the program(s). In one implementation, the information includes state information as well as commands and/or data—including sensitive information, such as usernames and passwords. In another implementation, the information can be used to secretly access the program(s).Type: ApplicationFiled: September 15, 2006Publication date: May 29, 2008Applicant: Microsoft CorporationInventors: Jacob R. Lorch, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Samuel King