Patents by Inventor Oliver Szimmetat
Oliver Szimmetat has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240256701Abstract: The network system implements a security and compliance service to ensure that a context classification of a data storage container is appropriate for individual data objects contained within it. If the data storage container is inappropriate for the data object, the network system performs remedial actions to avoid risk or harm from misclassification or potential exposure of the data object.Type: ApplicationFiled: January 24, 2024Publication date: August 1, 2024Inventors: Oliver Szimmetat, Nabanita De, Kaibo Ma
-
Patent number: 9881348Abstract: Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound.Type: GrantFiled: December 6, 2013Date of Patent: January 30, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Aidan T. Hughes, Alexander V. Baxter, Mark Kenworthy, Alexander Frank, Oliver Szimmetat
-
Publication number: 20140229912Abstract: Systems, methods, and software are disclosed for facilitating micro documentation environments. In at least one implementation, a micro documentation environment includes subject entities within a micro blogging environment. At least one subject entity corresponds to at least one software component within a software development environment. The micro documentation environment also includes other entities within the micro blogging environment. At least one other entity follows the one subject entity corresponding to the software component. The micro documentation environment also includes micro posts, at least one of which is generated on behalf of the one subject entity and comprises documentation information related to the one software component.Type: ApplicationFiled: February 8, 2013Publication date: August 14, 2014Applicant: MICROSOFT CORPORATIONInventors: Andre Wilson Brotto Furtado, Bryan C. Wintermute, Roberto Sonnino, Sebastian Rodriguez Bojorge, Sven Oliver Szimmetat, Tamás Sorosy
-
Publication number: 20140095394Abstract: Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound.Type: ApplicationFiled: December 6, 2013Publication date: April 3, 2014Applicant: Microsoft CorporationInventors: Aidan T. HUGHES, Alexander V. BAXTER, Mark KENWORTHY, Alexander FRANK, Oliver SZIMMETAT
-
Patent number: 8620818Abstract: Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound.Type: GrantFiled: June 25, 2007Date of Patent: December 31, 2013Assignee: Microsoft CorporationInventors: Aidan T. Hughes, Alexander V. Baxter, Mark Kenworthy, Alexander Frank, Oliver Szimmetat
-
Patent number: 8499288Abstract: A target shim injected into a target process detects activity in a user interface and sets a target-busy status. A source shim injected into a source process detects the input being sent toward the target process to drive automated testing. The source shim determines that the target-busy status is set, and prevents the source process from sending the input until the status is clear. The target shim clears the status after confirming that a screen capture, accessibility test, localizability test, or other user interlace analysis operation has completed. Multiple source shims and/or multiple target shims may be present. Copies of a single automation shim component may be tailored for use as source shims or as target shims. Security processes and operating system processes may be listed to prevent interference from automation shims. User interface analysis module(s) may be loaded and/or unloaded “hot” while the target process is running.Type: GrantFiled: May 19, 2010Date of Patent: July 30, 2013Assignee: Microsoft CorporationInventors: Timothy C. Franklin, Oliver Szimmetat, Irina Catana, Beena Nair
-
Publication number: 20130110866Abstract: An information system is provided that uses information derived from real time data sources to identify a potential current relationship between two or more users or entities, including individuals, organizations, and groups of individuals, based on the similarity between the real data sources, and entities associated with the real time data. Given the potential for a relationship, a connection between the users can be initiated.Type: ApplicationFiled: October 28, 2011Publication date: May 2, 2013Applicant: MICROSOFT CORPORATIONInventors: Andre Furtado, Tamas Sorosy, Oliver Szimmetat, David Abzarian, Garett Nell
-
Publication number: 20110289481Abstract: A target shim injected into a target process detects activity in a user interface and sets a target-busy status. A source shim injected into a source process detects the input being sent toward the target process to drive automated testing. The source shim determines that the target-busy status is set, and prevents the source process from sending the input until the status is clear. The target shim clears the status after confirming that a screen capture, accessibility test, localizability test, or other user interlace analysis operation has completed. Multiple source shims and/or multiple target shims may be present. Copies of a single automation shim component may be tailored for use as source shims or as target shims. Security processes and operating system processes may be listed to prevent interference from automation shims. User interface analysis module(s) may be loaded and/or unloaded “hot” while the target process is running.Type: ApplicationFiled: May 19, 2010Publication date: November 24, 2011Applicant: MICROSOFT CORPORATIONInventors: Timothy C. Franklin, Oliver Szimmetat, Irina Catana, Beena Nair
-
Publication number: 20110010351Abstract: Systems, methods, and computer storage media having computer-executable instructions embodied thereon that verify localized product versions are provided. Resources are extracted from a localized file of a product version associated with a target language type. The resources are compared with target content of the target language type. In one embodiment, the target content is stored in a localization database. Upon the comparison of the resources with the target content, it is recognized whether the resources match the target content.Type: ApplicationFiled: July 9, 2009Publication date: January 13, 2011Applicant: MICROSOFT CORPORATIONInventors: SVEN OLIVER SZIMMETAT, RONEN BOAZI, CHUNYAN (CATHY) ZHAO, TIMOTHY CHRISTOPHER FRANKLIN
-
Publication number: 20100138833Abstract: User interfaces called by a target application can be quickly and efficiently identified and stored for future resource coverage analysis. User interfaces of the target application that are accessed by users executing the target application on their computing device can be automatically tracked during execution of the target application. Information gathered on user interfaces of a target application and accessed user interfaces of the target application can be employed to generate one or more reports. Generated reports on user interface usage can be used to, e.g., identify the application resources to localize, prioritize the application resources to localize, discern application resource trends for, e.g., maintenance and upgrade activities, detect unused application resources, and select appropriate application resources for test scenarios.Type: ApplicationFiled: December 1, 2008Publication date: June 3, 2010Applicant: Microsoft CorporationInventors: Timothy C. Franklin, Poon Rojanasoonthon, Brian Wang, Oliver Szimmetat
-
Publication number: 20080319779Abstract: Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound.Type: ApplicationFiled: June 25, 2007Publication date: December 25, 2008Applicant: Microsoft CorporationInventors: Aidan T. Hughes, Alexander V. Baxter, Mark Kenworthy, Alexander Frank, Oliver Szimmetat