Patents by Inventor Thomas van Os

Thomas van Os has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240144626
    Abstract: An avatar editing environment is disclosed that allows users to create custom avatars for use in online games and other applications. Starting with a blank face the user can add, rescale and position different elements (e.g., eyes, nose, mouth) on the blank face. The user can also change the shape of the avatar's face, the avatar's skin color and the color of all the elements. In some implementations, touch input and gestures can be used to manually edit the avatar. Various controls can be used to create the avatar, such as controls for resizing, rotating, positioning, etc. The user can choose between manual and automatic avatar creation. The avatar editing environment can be part of a framework that is available to applications. One or more elements of the avatar can be animated.
    Type: Application
    Filed: January 8, 2024
    Publication date: May 2, 2024
    Inventors: Marcel VAN OS, Thomas GOOSSENS, Laurent BAUMANN, Michael Dale LAMPELL, Alexandre CARLHIAN
  • Publication number: 20240095334
    Abstract: The present disclosure generally relates to displaying a user interface for sharing an account associated with a first user identity with a second user identity. The user interface includes a first sharing option and a second sharing option. One or more inputs corresponding to a request to share the account are detected. If the one or more inputs include a selection of the first sharing option, a request to invite the second user identity to become a joint owner of the account is transmitted. If the one or more inputs include a selection of the second sharing option, a request to invite the second user identity to become a participant of the account without becoming a joint owner of the account is transmitted.
    Type: Application
    Filed: November 27, 2023
    Publication date: March 21, 2024
    Inventors: Mischa MCLACHLAN, Jennifer BAILEY, Steven EASTCOTT, Corey FUGMAN, Haya Iris VILLANUEVA GAVIOLA, Richard HEARD, Brian JETT, Katie MCINDOE, Thomas John MILLER, Ashish Chandrakant NAGRE, Rachel REDDY, Akila SURESH, Marcel VAN OS, Vinay VENKATESH, Nicole Marie WEAVER
  • Publication number: 20230259382
    Abstract: A computer-implemented method of monitoring programmatic containers performed through executing an agent processor is disclosed. The method comprises transmitting, by a processor, one or more deployment configurations from a monitoring server related to an application hosted in a container to a backend device, the processor receiving, from the backend device, a plurality of monitoring configurations for the application, the processor merging the plurality of monitoring configurations for the application into a merged monitoring configuration for the application, the processor providing the merged monitoring configuration for the application to the monitoring server, and the processor periodically receiving, from the monitoring server, telemetry data that characterizes one or more instances of the application.
    Type: Application
    Filed: February 16, 2022
    Publication date: August 17, 2023
    Inventor: Thomas Van Os
  • Publication number: 20090119504
    Abstract: Systems and methods are provided for enabling optimization of communications within a networked computing environment requiring secure, authenticated client-server communication connections. Optimization is performed by a pair of intermediary network devices installed in a path of communications between the client and the server. A secure, authenticated communication connection between the client and server is split-terminated at a pair of intermediary network devices by intercepting a request from the client for a client-server connection, authenticating the client at the intermediaries, establishing a first secure, authenticated connection to the client, authenticating the client or an intermediary to the server, and establishing a second secure, authenticate connection to the server. Depending on the operative authentication protocol (e.g., NTLM, Kerberos), an intermediary may interface with a domain controller, key distribution center or other entity.
    Type: Application
    Filed: January 13, 2009
    Publication date: May 7, 2009
    Applicant: Riverbed Technology, Inc.
    Inventors: Thomas van Os, Puneet Mehra, Nitin Gupta, Kartik Subbana, Charles Huang