1
Ryan S Menezes, Taroon Mandhana, Shankar Seal, Dhiraj P Gandhi, Aaron Wesley Cunningham: Registration and network access control. Microsoft Technology Licensing, Tim Churna, Kate Drakos, Micky Minhas, August 18, 2015: US09112861 (2 worldwide citation)

In embodiments of registration and network access control, an initially unconfigured network interface device can be registered and configured as an interface to a public network for a client device. In another embodiment, a network interface device can receive a network access request from a client ...


2
Steven Andrew Welch, Takahiro Shigemitsu, Timothy Allen Wright, Mark D Vance, Steven E Wittenberg: Input testing tool. MICROSOFT TECHNOLOGY LICENSING, Tim Churna, Kate Drakos, Micky Minhas, April 19, 2016: US09317147 (1 worldwide citation)

Various embodiments provide an input test tool that promotes precision testing, flexibility and repeatability over a wide variety of functionality tests that are utilized in both touch and near-touch input scenarios. The input test tool enables a variety of degrees of motion, including both linear a ...


3
Steve Pronovost, Maxwell Abernethy, Rudolph Balaz, Ameet Chitre: Memory management techniques. Microsoft Corporation, Tim Churna, Raghu Chinagudabha, Micky Minhas, December 30, 2014: US08924677 (1 worldwide citation)

Memory management techniques that permit an executing process to store content in memory and later retrieve that content from the memory, but that also permit a memory manager to discard that content to address memory pressure. A process executing on a computing device may notify a memory manager of ...


4
Leonardo E Blanco, Reiner Fink: Shared compositional resources. Microsoft Technology Licensing, Tim Churna, Dan Choi, Micky Minhas, January 10, 2017: US09542906

Shared compositional resources are described. In one or more implementations, a global composition system may be configured to perform rendering for a plurality of processes, e.g., applications. For example, the global composition system may be configured to expose one or more application programmin ...


5
Reed L Townsend, Mudit Agrawal, Andrey Borissov Batchvarov, Fei Su: Soft keyboard interface. Microsoft Technology Licensing, Tim Churna, Judy Yee, Micky Minhas, February 16, 2016: US09262076

User experience of the performance of a computing device is improved through an operating system that processes inputs from a soft keyboard to provide information that can be used to accurately determine keys a user intended to strike while typing. For each detected tap, the operating system provide ...


6
Nazia Zaman, Paul J Reid: Magnifier panning interface for natural input devices. Microsoft Technology Licensing, Tim Churna, Judy Yee, Micky Minhas, June 21, 2016: US09372590

A magnifier movement system is described herein that provides a more user-friendly experience for users of natural input devices when moving the magnifier and interacting with magnified user interface elements. The system receives an indication that a user has touched the screen with a natural input ...


7
Mark Novak, Paul J Leach, Yi Zeng, Saurav Sinha, K Michiko Short, Gopinathan Kannan: Distributed computer systems with time-dependent credentials. Microsoft Corporation, Tim Churna, Sade Fashokun, Micky Minhas, May 12, 2015: US09032492

A distributed system in which time-dependent credentials are supplied by controllers that operate according to different local times. Errors that might arise from the controllers generating inconsistent credentials because of time skew are avoided by identifying credentials generated during transiti ...


8
Ling Tony Chen, Jonathan E Lange, Greg M Zaverucha: Return oriented programming (ROP) attack protection. Microsoft Technology Licensing, Tim Churna, Dan Choi, Micky Minhas, May 9, 2017: US09646154

Return oriented programming (ROP) attack prevention techniques are described. In one or more examples, a method is described of protecting against return oriented programming attacks. The method includes initiating a compute signature hardware instruction of a computing device to compute a signature ...


9
Ronnie Donnel Yates Jr, Albert Sing Ho, Thomas Wayne Miller Jr, Paul L Bleisch: Executing unsigned content and securing access in a closed system. Microsoft Corporation, Tim Churna, Micky Minhas, October 28, 2014: US08875271

Mechanisms are disclosed that allow for execution of unsigned content and the securing of resources in a closed system when such unsigned content is executing on the system. For example, an access layer is used between an operating system layer of the closed system and the actual unsigned content. T ...


10
Karanbir Singh, Yashar Bahman, Octavian T Ureche, John Michael Sheehan: Shared session techniques. MICROSOFT TECHNOLOGY LICENSING, Tim Churna, Dan Choi, Micky Minhas, November 15, 2016: US09495522

Data sharing session techniques are described. In one or more implementations, a first user login session is initiated as running in a context of a first user profile of a first user with an operating system of a computing device. A request is received by the operating system to run the first user l ...



Click the thumbnails below to visualize the patent trend.