Follow us on Twitter
twitter icon@FreshPatents


Operating System patents

      

This page is updated frequently with new Operating System-related patent applications.




 Tamper prevention for electronic subscriber identity module (esim) type parameters patent thumbnailnew patent Tamper prevention for electronic subscriber identity module (esim) type parameters
Disclosed herein are various techniques for preventing or at least partially securing parameters—e.g., type parameters—of electronic subscriber identity modules (esims) stored within an embedded universal integrated circuit card (euicc) from being inappropriately modified by mobile network operators (mnos). One embodiment sets forth a technique that involves modifying file access properties of the type parameters of esims to make the type parameters readable, but not updatable by the mnos.
Apple Inc.


 Systems for enabling subscriber monitoring of telecommunications network usage and service plans patent thumbnailnew patent Systems for enabling subscriber monitoring of telecommunications network usage and service plans
Methods, servers and systems for directly accessing and modifying charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment.
Openet Telecom Ltd.


 Policy setting for content sharing of a plurality of remotely connected computing devices in physical or virtualized space patent thumbnailnew patent Policy setting for content sharing of a plurality of remotely connected computing devices in physical or virtualized space
An information handling system includes a method for executing instructions for a content sharing system executing role-based policy settings for a plurality of remotely connected computing devices operatively connected to share content, detecting pre-paired wireless connectivity of remotely connected computing devices to a system hosting the content sharing system, implementing role-based policy settings to partially limit content sharing system operation based on a device role classification for the at least one of the plurality of remotely connected computing devices, auto-initiating navigation accessibility to the pre-paired remotely connected computing device via the content sharing system, and displaying a content sharing system desktop comprising a plurality of device environment-representative windows representing at least two of the plurality of remotely connected computing devices that devices function via different operating systems.. .
Dell Products, Lp


 Electronic  controlling the same patent thumbnailnew patent Electronic controlling the same
Provided are an electronic apparatus in which a normal operating system (os) and a secure os are installed and a method for controlling the electronic apparatus. The method for controlling the electronic apparatus includes searching for at least one external terminal in which a secure os is installed, selecting a first terminal from among the at least one external terminal in which a secure os is installed, in response to a first terminal being selected from the retrieved at least one external terminal, performing communication connection with the first terminal, searching for at least one terminal in which only a normal os is installed, from among at least one external terminal that is capable of being communication-connected to the first terminal, and performing communication with a second terminal of the at least one terminal in which only the normal os is installed, through the first terminal..
Samsung Electronics Co., Ltd.


 Trusted and confidential remote tpm initialization patent thumbnailnew patent Trusted and confidential remote tpm initialization
Techniques are provided to allow remote initialization of a trusted platform module. The results may be trusted and confidential even if the target device has malicious operating system or other software running..
Microsoft Technology Licensing, Llc


 Providing centralized message notification patent thumbnailnew patent Providing centralized message notification
Providing centralized message notification for user interface is described. A method includes receiving a plurality of message notifications.
Red Hat, Inc.


 An access  an application program based on an intelligent terminal device patent thumbnailnew patent An access an application program based on an intelligent terminal device
The present invention provides an access method and apparatus for an application program based on an intelligent terminal device. The method comprises: after it is monitored that an installed application program performs a first access or an access that has ever been once denied of a behavior permission granted by an intelligent terminal device operating system, reading an application program authorization permission list preset for the application program by a user, wherein the behavior permission granted by the intelligent terminal device operating system is a behavior permission granted during the installation of the application program, and the application program authorization permission list comprises one or more behavior permission selectively authorized by the user for the application program; judging whether the behavior permission of the first access or the access that has ever been once denied matches any behavior permission authorized in the application program authorization permission list; and determining that the behavior permission of the first access or the access that has ever been once denied does not match any behavior permission authorized in the application program authorization permission list, denying to perform the first access of the behavior permission granted by the intelligent terminal device operating system by the application program.
Beijing Qihoo Technology Company Limited


 Apparatus and  preventing access by malware to locally backed up data patent thumbnailnew patent Apparatus and preventing access by malware to locally backed up data
A method for providing malware protection in connection with processing circuitry including hardware resources and software resources managed by a primary operating system may include providing a trusted operating system to control access to a portion of a local storage area of the hardware resources. In this context, only the trusted operating system is configured to enable writing to the portion of the local storage area.
The Johns Hopkins University


 Apparatus, system, and  protecting against keylogging malware and anti-phishing patent thumbnailnew patent Apparatus, system, and protecting against keylogging malware and anti-phishing
An apparatus, system, and method is disclosed for protecting against key logger malware. The protection includes protection form grabbing keylogger malware.
Trusted Knight Corporation


 Method and  securing user operation of and access to a computer system patent thumbnailnew patent Method and securing user operation of and access to a computer system
The present invention provides methods and apparatuses for computer system security. According to certain aspects, embodiments of the invention comprise a portable storage device that, when attached, “unlocks” a computer system, such as a desktop, laptop, tablet computer running a conventional operating system such as windows, thereby creating added security.

new patent

Method and preventing and investigating software piracy

An apparatus, method, and system for curtailing and investigating software piracy is provided. The method includes spawning user applications on a computer without use of a file on the file system.

new patent

Hybrid remote direct memory access

According to an embodiment of the invention there may be provided a method for hybrid remote direct memory access (rdma), the method may include: (i) receiving, by a first computer, a packet that was sent over a network from a second computer; wherein the packet may include data and metadata; (ii) determining, in response to the metadata, whether the data should be (a) directly written to a first application memory of the first computer by a first hardware accelerator of the first computer; or (b) indirectly written to the first application memory; (iii) indirectly writing the data to the first application memory if it determined that the data should be indirectly written to the first application memory; (iv) if it determined that the data should be directly written to the first application memory then: (iv.a) directly writing, by the first hardware accelerator the data to the first application memory without writing the data to any buffer of the operating system; and (iv.b) informing a first rdma software module, by the first hardware accelerator, that the data was directly written to the first application memory; and (v) notifying, by the first rdma software module, a second computer about a completion of an rdma transaction during which the data was directly written to the first application memory.. .
Amazon Technologies, Inc.

new patent

Firmware dump collection from primary system dump device adapter

A method of firmware dump collection from a primary dump adapter is provided. The method includes identifying a primary system dump device and a secondary system dump device.
International Business Machines Corporation

new patent

Firmware dump collection from primary system dump device adapter

A method of firmware dump collection from a primary dump adapter is provided. The method includes identifying a primary system dump device and a secondary system dump device.
International Business Machines Corporation

new patent

Method and system for real-time causality and root cause determination of transaction and infrastructure related events provided by multiple, heterogeneous agents

A method is disclosed that estimates causal relationships between events based on heterogeneous monitoring data. The monitoring data consists in transaction tracing data, describing the execution performance of individual transactions, resource utilization measurements of infrastructure entities like processes or operating systems and network utilization measurement data.
Dynatrace Llc

new patent

Method for maintaining file system of computer system

A method for maintaining a file system of a computer system is disclosed. An operating system is loaded to the computer system when the computer system is booted, such that the file system of the computer system is monitored in real time after the computer system is booted.
Synology Incorporated

new patent

Managing functions on an ios-based mobile device using ancs notifications

Systems, methods, and devices for managing predetermined functions on a mobile device within a moving vehicle, the mobile device having an operating system (os) that includes an event api installed therein that is configured for two-way communication with an external control device, the control device being installed within the vehicle and further configured to communicate with a software application installed and running in memory resident on the mobile device. In response to initiation of a predetermined function on the mobile device, a notification message is transmitted by the event api to the control device.
Obdedge, Llc

new patent

System and controlling resource revocation in a multi-guest computer system

At least one guest system, for example, a virtual machine, is connected to a host system, which includes a system resource such as system machine memory. Each guest system includes a guest operating system (os).
Vmware, Inc.

new patent

Presenting hypervisor data for a virtual machine with associated operating system data

The disclosed embodiments relate to a system for presenting data for virtual machines. During operation, the system obtains hypervisor data for a set of virtual machines, wherein the hypervisor data was received from one or more hypervisors while the set of virtual machines was running on the hypervisors.
Splunk Inc.

new patent

Simulation desktop establishment method and related apparatus

A simulation desktop establishment method includes: acquiring, by a terminal, system parameter of a current operating system; and establishing, by the terminal, a simulation desktop by using preset configuration data according to the system parameter, where content of simulation desktop parameters of the established simulation desktop is the same as content of the system parameter. It can be seen that, required system parameter are directly acquired from an operating system, and a simulation desktop corresponding to the operating system is established by using preset configuration data according to the system parameter, so that the established simulation desktop is basically the same as the operating system in appearance, interface, and the like, which can give a user a strong sense of identification..
Huawei Technologies Co., Ltd.

new patent

System, providing a toggleable remoting mode for computer operating systems

Software can also be used via a remote application window, remote desktop window, or remote graphical windowing user session window. The present invention describes how software (application, desktop, or graphical windowing user session) can know whether or not it is running in local or remote mode, and control its handling of functionalities accordingly.

new patent

Field replaceable unit authentication system

A field replaceable unit authentication system provides for a field replaceable unit device to be positioned in a chassis. A trusted platform module is included in the field replaceable unit device.
Dell Products L.p.

new patent

Dynamic library replacement

Provided are techniques for an operating system (os) to be modified on a running system such that running programs, including system services, so not have to be stopped and restarted for the modification to take effect. The techniques include detecting, by a processing thread, when the processing thread has entered a shared library; in response to the detecting, setting a thread flag corresponding to the thread in an operating system (os); detecting an os flag, set by the os, indicating that the os is updating the shared library; in response to detecting the os flag, suspending processing by the processing thread and transferring control from the thread to the os; resuming processing by the processing thread in response to detecting that the os has completed the updating; and executing the shared library in response to the resuming..
International Business Machines Corporation

new patent

Power management data package provision method and apparatus

Apparatuses, methods and storage medium associated with provision of power management data packages are disclosed herein. In embodiments, an apparatus may include one or more processors, memory to store a power management data package having a first plurality of descriptions of always present fixed platform devices and a second plurality of descriptions of potentially present variable platform devices; and firmware coupled with the one or more processors and memory to provide basic input/output services to an operating system operated by the one or more processors, wherein the operating system has an operational requirement for the power management data package.

new patent

Installing software where operating system prerequisities are unmet

A method for installing a computer program is provided, which includes: determining at a beginning of an installation procedure of the computer program whether an operating system being executed on the computer systems supports a prerequisite component for installing and executing the computer program by using operating system support information corresponding to the computer program. Based on determining that the prerequisite component is not supported by the operating system, performing: setting up a container comprising the prerequisite component using operating system level virtualization, installing the computer program in the container, and providing information on how to access the computer program being executed on the container..
International Business Machines Corporation

new patent

Altering sampling rate to thwart attacks that involve analyzing hardware sensor output

A hardware sensor and a hardware user-input component are integrated in a portable electronic device. The hardware sensor is operable to produce hardware sensor output indicative of orientation or motion or both of the device within its environment.
Blackberry Limited

Cloud server

A method for authenticating the identity of a handset user in a cloud-computing environment is provided. The method includes: obtaining, a login account and a password from the user; judging whether the login account and the password are correct; if the login account or the password is incorrect, refusing the user to access an operating system of the handset; if the login account and the password are correct, sending the login account and the password to a cloud server, wherein the login account and the password correspond to a face sample image library of the user stored on the cloud server; acquiring an input face image of the user; sending the input face image to the cloud server; authenticating, by the cloud server, the identity of the user according to the login account, the password and the input face image..

Switching between restricted-access websites on mobile user devices

A system stores first information, provided by a first user input via a mobile operating system, which enables access to a first restricted access website. The system stores a first screenshot and first data associated with the first restricted access website in response to a first user request, via the mobile operating system, to switch to a second restricted access website.
Salesforce.com, Inc.

Systems and methods for processing video streams

Embodiments of a method and system described herein enable capture of video data streams from multiple, different video data source devices and the processing of the video data streams. The video data streams are merged such that various data protocols can all be processed with the same worker processors on different types of operating systems, which are typically distributed..
Placemeter Inc.

Systems and methods for implementing security

Systems and method are provided in accordance with one or more processes that run within an operating system, in which a first process of the one or more processes is an agent that encodes instructions for obtaining an authentication token uniquely associated with the agent. The agent collects security information about a first computer system running the one or more processes according to one or more commands received from a remote security system.
Cloudpassage, Inc.

Method to configure network bonds as a port on an integration bridge for a virtualized multilayer switch

Techniques are disclosed for configuring a physical computing system (e.g., in a cloud computing network) to connect a network bond with a virtual multilayer switch. An operating system process executing in the physical computing system receives a selection of one or more network interfaces.
International Business Machines Corporation

Method to configure network bonds as a port on an integration bridge for a virtualized multilayer switch

Techniques are disclosed for configuring a physical computing system (e.g., in a cloud computing network) to connect a network bond with a virtual multilayer switch. An operating system process executing in the physical computing system receives a selection of one or more network interfaces.
International Business Machines Corporation

L-v-c operating system and unmanned aerial vehicle training/testing method using the same

Provided is a l-v-c (live-virtual-constructive) operating system for providing a l-v-c-based unmanned aerial vehicle (uav) training/testing environment, including: a synthetic environment control unit that exchanges information with a live environment, a virtual environment, and a constructive environment and allows a uav of the live environment or the virtual environment to interwork with the live environment, the virtual environment, and the constructive environment.. .
Industry-university Cooperation Foundation Korea Aerospace University

Robust, adaptive and efficient object detection, classification and tracking

Embodiments of a method and system described herein enable capture of video data streams from multiple, different video data source devices and the processing of the video data streams. The video data streams are merged such that various data protocols can all be processed with the same worker processors on different types of operating systems, which are typically distributed.
Placemeter Inc.

Manifold system and synthesis of a manifold system from input models

The present invention relates to a manifold system comprising: at least one manifold frame comprising an initial manifold configuration model, and a set of manifold planes, wherein each manifold plane comprises of a set of manifold elements, said manifold element is a concrete specialization of an abstract dimensioned entity supporting manifold operations such as configuration, projection, forming and transforming, etc, wherein such specializations comprises of compute elements, cognitive elements, transitive elements, processors, and/or transducer elements, or composite of these elements or composite of planes of these elements, etc, and variably progresses from manifold frame to frame in manifold time units through manifold system operations such as forming, transforming, projecting, computing, learning and transducing, etc in a real, virtual or a combination of real and virtual operating environment such as desktop operating system, distributed operating system, embedded operating system, field programmable gate array system, virtual system, and/or combination of real and virtual systems thereby performing useful work or duty. The present invention also relates a method of realizing a manifold system from input models..
Sankhya Technologies Private Limited

System and selectively routing cached objects

A monitoring application and method for using a monitoring application are disclosed. The monitoring application is configured to manage file system objects in a memory device layer (including copying of the file system objects) and is configured to manage one or more data structures to enable the management of the file system objects to be transparent to the application layer and/or the operating system layer..
Sandisk Technologies Llc

System and method to redirect uasp mass storage devices to an unsupported operating system in a vdi environment

In certain information handling system environments, universal serial bus (usb) attached small computer interface (scsi) protocol (uasp) devices may be connected to a client and redirected to a server or other information handling system. Some operating systems (os) of a server may not support uasp.
Dell Productss L.p.

System and method to support usb devices in an unsupported operating system in vdi environments

In certain information handling system environments, universal serial bus (usb) devices may be connected to a client and redirected to a server or other information handling system. Some operating systems (os) of a server may not be upgraded such that the os does not support certain usb devices based on more recently published usb versions, such as usb 3.0.
Dell Products L.p.

Systems and methods for detecting memory faults in real-time via smi tests

Defective memory may cause expensive and unnecessary replacements of the memory especially for higher density dynamic random access memory that has ever shrinking topologies. Running memory stress tests in the background for a period of time at set intervals while the operating system is idle may detect and identify memory problems in real-time without requiring a re-boot of the information handling system.
Dell Products L.p.

Data dump for a memory in a data processing system

As the file system of an operating system program might be damaged by a crash, the file system is usually used neither for the selection of data to be dumped from a memory nor for the analysis of the dumped data, and all data contained in one or several areas of the memory are dumped. In order to preserve the integrity of the file system and enable its use after the crash, the memory is divided into a primary and a secondary memory section during a memory setup, file system data are transferred from the primary memory section to the secondary memory section widely out of the control of the operating system program, and a read access of a dump program is directed to the secondary memory section in order to select file system data to be dumped after the crash using error data..
International Business Machines Corporation

Systems and methods involving features of hardware virtualization, hypervisor, pages of interest, and/or other features

Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer security and/or memory access. According to some illustrative implementations, innovations herein may utilize and/or involve a separation kernel hypervisor which may include the use of a guest operating system virtual machine protection domain, a virtualization assistance layer, and/or a detection mechanism (which may be proximate in temporal and/or spatial locality to malicious code, but isolated from it), inter alia, for detection and/or notification of, and action by a monitoring guest upon access by a monitored guest to predetermined physical memory locations..
Lynx Software Technologies, Inc.

Capturing and deploying an operation system in a computer environment

Techniques for capturing and deploying the operating system of a computing device are disclosed. An example method includes creating a file that contains settings of an operating system of a source computer and storing the file in storage on the source computer.
Hewlett-packard Development Company, L.p.



Operating System topics:
  • Operating System
  • Control Unit
  • Distributed


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Operating System for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Operating System with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.4482

    file did exist - 3449

    0 - 1 - 65