1
Ryan Burkhardt, Tom G Yaryan, Seetharaman Harikrishnnan, Donald J McNamara, David J D Souza, Seung Yup Chai, Sanjay Shenoy: Componentized operating system. Microsoft Corporation, Lee & Hayes PLLC, December 26, 2006: US07155713 (22 worldwide citation)

A componentized operating system is separated into multiple different components. In certain embodiments, a bill of materials (BOM) identifies at least one component that is installed (or is to be installed) for an operating system image on a computer. Each component includes one or more files and h ...


2
Ryan Burkhardt, Tom G Yaryan, Seetharaman Harikrishnnan, Donald J McNamara, David J D&apos Souza, Nicholas R Legget, David Scott Johnson, Seung Yup Chai: Automatic computer program customization based on a user information store. Microsoft Corporation, Lee & Hayes PLLC, November 23, 2004: US06823508 (15 worldwide citation)

Software programs, such as an operating system or other application programs, are automatically customized to a specific user(s) based on data corresponding to the specific user(s) that is maintained in a user information store. In one embodiment, the information store is a unified store that is acc ...


3
Ryan Burkhardt, Tom G Yaryan, Seetharaman Harikrishnnan, Donald J McNamara, David J D Souza, Nicholas R Legget, David Scott Johnson, Seung Yup Chai: Automatic computer program customization based on a user information store. Microsoft Corporation, Lee & Hayes PLLC, September 29, 2009: US07596785 (11 worldwide citation)

Software programs, such as an operating system or other application programs, are automatically customized to a specific user(s) based on data corresponding to the specific user(s) that is maintained in a user information store. In one embodiment, the information store is a unified store that is acc ...


4
Quentin S Miller, Donald J McNamara: Time-to-disconnect enforcement when communicating with wireless devices that have transient network addresses. Microsoft Corporation, Workman Nydegger, May 27, 2008: US07379971 (8 worldwide citation)

A wireless device constructs a message that includes a representation of a time-to-disconnect, and then transmits the message over a carrier network to a receiving computing system. The time-to-disconnect indicates a time beyond which the receiving computing system should not send a response to the ...


5
Quentin S Miller, Donald J McNamara: Transport agnostic authentication of wireless devices. Microsoft Corporation, Workman Nydegger, November 22, 2005: US06968177 (7 worldwide citation)

A wireless device and a receiving computing system communicate over a carrier network. The wireless device submits a request for service to the receiving computing system, which then returns an authentication key. The authentication key is routed using the telephone number stated in the request for ...


6
Quentin S Miller, Donald J McNamara: Transport agnostic authentication of wireless devices. Microsoft Corporation, Workman Nydegger, December 9, 2008: US07463879 (5 worldwide citation)

A wireless device and a receiving computing system communicate over a carrier network. The wireless device submits a request for service to the receiving computing system, which then returns an authentication key. The authentication key is routed using the telephone number stated in the request for ...


7
Quentin S Miller, Donald J McNamara, Avner Sander: Atomic message division. Microsoft Corporation, Workman Nydegger, February 26, 2008: US07337239

Synchronizing a client and server version of a hierarchical data structure having several atomically-editable components. At synchronization time, the server identifies all of the changes that need to occur to the client version in order to properly synchronize the client version of the hierarchical ...


8
Quentin S Miller, Donald J McNamara: Time-to-disconnect enforcement when communicating with wireless devices that have transient network addresses. Rick D Nydegger, Workman Nydegger & Seeley, May 20, 2004: US20040098487-A1

A wireless device constructs a message that includes a representation of a time-to-disconnect, and then transmits the message over a carrier network to a receiving computing system. The time-to-disconnect indicates a time beyond which the receiving computing system should not send a response to the ...


9
Quentin S Miller, Donald J McNamara, Avner Sander: Atomic message division. Rick D Nydegger, Workman Nydegger & Seeley, May 27, 2004: US20040103141-A1

Synchronizing a client and server version of a hierarchical data structure having several atomically-editable components. At synchronization time, the server identifies all of the changes that need to occur to the client version in order to properly synchronize the client version of the hierarchical ...


10
Quentin S Miller, Donald J McNamara: Transport agnostic authentication of wireless devices. Rick D Nydegger, Workman Nydegger & Seeley, October 14, 2004: US20040203599-A1

A wireless device and a receiving computing system communicate over a carrier network. The wireless device submits a request for service to the receiving computing system, which then returns an authentication key. The authentication key is routed using the telephone number stated in the request for ...



Click the thumbnails below to visualize the patent trend.