Patents by Inventor Joshua Pollock
Joshua Pollock has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10515208Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: GrantFiled: March 7, 2018Date of Patent: December 24, 2019Assignee: Microsoft Technology Licensing, LLCInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C. LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Publication number: 20180196940Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: ApplicationFiled: March 7, 2018Publication date: July 12, 2018Inventors: Vikas MALHOTRA, Benjamin E. CANNING, Daniel B. JUMP, David C. LeBLANC, Benjamen E. ROSS, James CAMPBELL, Brian CARVER, Joshua POLLOCK
-
Patent number: 9946871Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: GrantFiled: February 23, 2017Date of Patent: April 17, 2018Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Publication number: 20170228536Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: ApplicationFiled: February 23, 2017Publication date: August 10, 2017Inventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Patent number: 9613228Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: GrantFiled: March 18, 2015Date of Patent: April 4, 2017Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Publication number: 20150347771Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: ApplicationFiled: March 18, 2015Publication date: December 3, 2015Inventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C. LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Patent number: 9003517Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: GrantFiled: October 28, 2009Date of Patent: April 7, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C. LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Publication number: 20110099609Abstract: Architecture that provides a secure environment in which data (e.g., code, instructions, files, images, etc.) can be opened and run by a client application. Once opened the data can be viewed (in a “protected view”) by the user without incurring risk to other client processing and systems. Accordingly, the architecture mitigates malicious attacks by enabling users to preview untrusted and potentially harmful data (e.g., files) in a low risk manner. Files opened in the protected view are isolated from accessing key resources on the client computer and provides the user a safer way to read files that can contain dangerous content. The protected view also provides a seamless user experience. The user is unaware that the client is operating on data in a different mode and allows for the reduction of security prompts.Type: ApplicationFiled: October 28, 2009Publication date: April 28, 2011Applicant: Microsoft CorporationInventors: Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, David C. LeBlanc, Benjamen E. Ross, James Campbell, Brian Carver, Joshua Pollock
-
Publication number: 20070245229Abstract: A software-based mechanism for taking multimedia notes while using a mobile computing device is provided. The interface is stream-based so as to enable complete control with a text or numeric keypad, a directional pad, and command button. A note document containing textual data and objects representing other data types may be closed and revisited after it has been created. It may be either read or edited in a single session. Changes may be manually or automatically saved to the note document for ease of user experience.Type: ApplicationFiled: April 17, 2006Publication date: October 18, 2007Applicant: Microsoft CorporationInventors: David Siedzik, Erin Riley, Joshua Pollock, Nithya Ramkumar, Santos Cordon, Sathia Thirumal, Shaheeda Nizar, William Lewis, Joel Downer
-
Publication number: 20060242184Abstract: A relationship data structure associated with a source resource enables methods to discover and describe relationships between the source resource and a plurality of target resources. The relationships are stored in a format independent of the encoding of the source resource. Each relationship between the source resource and the plurality of target resources is stored in a content-neutral format, and the relationship data structure stores, a location of each target resource, a type of relationship with each target resource and an identifier to uniquely identify each relationship between the source resource and each target resource. Accordingly, the relationship data structure allows a decoder to directly discover the relationships between the source resource and the plurality of target resources without decoding the source resource or target resources.Type: ApplicationFiled: April 22, 2005Publication date: October 26, 2006Applicant: Microsoft CorporationInventors: Andrey Shur, Bruce MacKenzie, Charles Walker, David Ornstein, Jerry Dunietz, Joshua Pollock, Sarjana Sheth, Isaac Nichols
-
Publication number: 20060136356Abstract: Systems and methods for changing items of a computer file can include a storage medium, and an application programmed to create a file including a first item and a second item, the application storing the file on the storage medium, and the first item including padding. The system can also include an input/output module associated with the application, the input/output module being programmed to use at least a portion of the padding of the first item to accommodate a change in a size of the first item. A method can include providing a file including at least a first item and a second item, the first item including padding, changing the first item, and using at least a portion of the padding of the first item to accommodate a change in a size of the first item.Type: ApplicationFiled: December 20, 2004Publication date: June 22, 2006Applicant: Microsoft CorporationInventors: Li Hua, Daniel Jump, Isaac Nichols, David Ornstein, Joshua Pollock, Ravishankar Shanmugam
-
Publication number: 20060136500Abstract: Systems and methods for changing items of a computer file, such as an archive file, can include an application programmed to create a file including a first item and a second item, the application storing the file on a storage medium. Systems can also include an input/output module associated with the application, the input/output module retiring the first item upon a change to the first item resulting in an increase or a decrease in a size of the first item. Upon retiring the first item, the input/output module can write a third item at an end of the file, the third item including the change to the first item. Methods can include retiring the first item upon a change to the first item, and writing a third item after the second item, the third item including the change to the first item.Type: ApplicationFiled: December 20, 2004Publication date: June 22, 2006Applicant: Microsoft CorporationInventors: Li Hua, Daniel Jump, Isaac Nichols, Joshua Pollock, Ravishankar Shanmugam
-
Publication number: 20050210371Abstract: A table version of a document is generated by computing a table layout of the document and generating the table version based on the table layout. Computing the table layout can include recording the positions of each object in the document, dividing the document into sections, and grouping the sections based on their object content. Generating the table version of the document from the table layout can include creating table code that represents information in the table layout of the document. The table version of the document can be used to export the document to one or more computers in a distributed network while maintaining the visual fidelity and text content of the original document.Type: ApplicationFiled: March 27, 2003Publication date: September 22, 2005Inventors: Joshua Pollock, Peirong Liu, Hannah Zhou, David Siedzik