Patents by Inventor Ron Karim

Ron Karim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 6973480
    Abstract: A server-centric approach is disclosed for enabling a browser to handle content types that it cannot inherently process. Rather than executing plug-ins on a client, pluglets are executed on one or more servers. A pluglet can perform any function that a plug-in can perform. Because a pluglet resides and executes on a server, the shortcomings of the plug-in approach are overcome. Specifically, a client no longer needs to have large amounts of storage and processing resources since pluglets do not run on clients. Also, a user no longer needs to install plug-ins on a client. In addition, maintenance of the overall system is greatly simplified. To replace, add, or remove functionality, all that needs to be done is to replace, add, or remove pluglets from a relatively small number of servers. It is no longer necessary to maintain plug-ins on a relatively large number of clients.
    Type: Grant
    Filed: September 26, 2002
    Date of Patent: December 6, 2005
    Assignee: Sun Microsystems, Inc.
    Inventor: Ron Karim
  • Publication number: 20040221002
    Abstract: A server-centric approach is disclosed for enabling a browser to handle content types that it cannot inherently process. Rather than executing plug-ins on a client, pluglets are executed on one or more servers. A pluglet can perform any function that a plug-in can perform. Because a pluglet resides and executes on a server, the shortcomings of the plug-in approach are overcome. Specifically, a client no longer needs to have large amounts of storage and processing resources since pluglets do not run on clients. Also, a user no longer needs to install plug-ins on a client. In addition, maintenance of the overall system is greatly simplified. To replace, add, or remove functionality, all that needs to be done is to replace, add, or remove pluglets from a relatively small number of servers. It is no longer necessary to maintain plug-ins on a relatively large number of clients.
    Type: Application
    Filed: September 26, 2002
    Publication date: November 4, 2004
    Inventor: Ron Karim
  • Patent number: 6654892
    Abstract: Methods and apparatus for enabling document access across a firewall are disclosed. A method of accessing a document across a firewall includes obtaining a document access request on the first side of the firewall, where the document access request specifies a document control command and an associated file name. The document access request is then packaged in at least one client e-mail. The client e-mail is then sent across the firewall to the second side of the firewall. One or more acknowledgement e-mails are then received across the firewall from the second side of the firewall, where the acknowledgement e-mails specify a status of the executed document control command. In addition, a method of providing access to a document across a firewall includes receiving a client e-mail across the firewall from the first side of the firewall, where the client e-mail includes a document access request specifying a document control command and an associated file name.
    Type: Grant
    Filed: June 8, 1999
    Date of Patent: November 25, 2003
    Assignee: Sun Microsystems, Inc.
    Inventor: Ron Karim
  • Publication number: 20030140156
    Abstract: Methods, systems, and articles of manufacture consistent with the present invention broadcast World Wide Web content to permit efficient data retrieval by a large number of users. A data request is initially received from a client data processing device. It is first determined whether the requested data is transmitted via a continuous broadcast loop. The continuous broadcast loop comprises one or more data point continuously transmitted in order from a start data point to an end data point. The requested data is retrieved by opening a connection to the continuous broadcast loop, reading the requested data from the broadcast loop, and transmitting the requested data to the client data processing device.
    Type: Application
    Filed: January 18, 2002
    Publication date: July 24, 2003
    Applicant: Sun Microsystems, Inc.
    Inventor: Ron Karim
  • Publication number: 20020188649
    Abstract: An untrusted program is initially executed in a limited environment comprising mock resources. After execution, a diagnostic is run on the limited environment to determine whether the untrusted program exhibited any undesirable behavior (e.g. whether the untrusted program deleted, modified, renamed, etc. the mock resources). If undesirable behavior is detected, corrective action may be taken. Corrective action may include providing a warning to a user not to run the untrusted program in an unrestricted environment, and deleting the untrusted program. By prescreening an untrusted program in a limited and safe environment in this manner, it is possible to detect malignant programs and to prevent them from doing any real damage to a system.
    Type: Application
    Filed: June 12, 2001
    Publication date: December 12, 2002
    Inventor: Ron Karim