Follow us on Twitter
twitter icon@FreshPatents


Operating Systems patents

      

This page is updated frequently with new Operating Systems-related patent applications.




 Systems for enabling subscriber monitoring of telecommunications network usage and service plans patent thumbnailnew patent Systems for enabling subscriber monitoring of telecommunications network usage and service plans
Methods, servers and systems for directly accessing and modifying charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment.
Openet Telecom Ltd.


 Policy setting for content sharing of a plurality of remotely connected computing devices in physical or virtualized space patent thumbnailnew patent Policy setting for content sharing of a plurality of remotely connected computing devices in physical or virtualized space
An information handling system includes a method for executing instructions for a content sharing system executing role-based policy settings for a plurality of remotely connected computing devices operatively connected to share content, detecting pre-paired wireless connectivity of remotely connected computing devices to a system hosting the content sharing system, implementing role-based policy settings to partially limit content sharing system operation based on a device role classification for the at least one of the plurality of remotely connected computing devices, auto-initiating navigation accessibility to the pre-paired remotely connected computing device via the content sharing system, and displaying a content sharing system desktop comprising a plurality of device environment-representative windows representing at least two of the plurality of remotely connected computing devices that devices function via different operating systems.. .
Dell Products, Lp


 Method and system for real-time causality and root cause determination of transaction and infrastructure related events provided by multiple, heterogeneous agents patent thumbnailnew patent Method and system for real-time causality and root cause determination of transaction and infrastructure related events provided by multiple, heterogeneous agents
A method is disclosed that estimates causal relationships between events based on heterogeneous monitoring data. The monitoring data consists in transaction tracing data, describing the execution performance of individual transactions, resource utilization measurements of infrastructure entities like processes or operating systems and network utilization measurement data.
Dynatrace Llc


 Presenting hypervisor data for a virtual machine  with associated operating system data patent thumbnailnew patent Presenting hypervisor data for a virtual machine with associated operating system data
The disclosed embodiments relate to a system for presenting data for virtual machines. During operation, the system obtains hypervisor data for a set of virtual machines, wherein the hypervisor data was received from one or more hypervisors while the set of virtual machines was running on the hypervisors.
Splunk Inc.


 System,  providing a toggleable remoting mode for computer operating systems patent thumbnailnew patent System, providing a toggleable remoting mode for computer operating systems
Software can also be used via a remote application window, remote desktop window, or remote graphical windowing user session window. The present invention describes how software (application, desktop, or graphical windowing user session) can know whether or not it is running in local or remote mode, and control its handling of functionalities accordingly.

 Systems and methods for processing video streams patent thumbnailSystems and methods for processing video streams
Embodiments of a method and system described herein enable capture of video data streams from multiple, different video data source devices and the processing of the video data streams. The video data streams are merged such that various data protocols can all be processed with the same worker processors on different types of operating systems, which are typically distributed..
Placemeter Inc.


 Robust, adaptive and efficient object detection, classification and tracking patent thumbnailRobust, adaptive and efficient object detection, classification and tracking
Embodiments of a method and system described herein enable capture of video data streams from multiple, different video data source devices and the processing of the video data streams. The video data streams are merged such that various data protocols can all be processed with the same worker processors on different types of operating systems, which are typically distributed.
Placemeter Inc.


 System and method to redirect uasp mass storage devices to an unsupported operating system in a vdi environment patent thumbnailSystem and method to redirect uasp mass storage devices to an unsupported operating system in a vdi environment
In certain information handling system environments, universal serial bus (usb) attached small computer interface (scsi) protocol (uasp) devices may be connected to a client and redirected to a server or other information handling system. Some operating systems (os) of a server may not support uasp.
Dell Productss L.p.


 System and method to support usb devices in an unsupported operating system in vdi environments patent thumbnailSystem and method to support usb devices in an unsupported operating system in vdi environments
In certain information handling system environments, universal serial bus (usb) devices may be connected to a client and redirected to a server or other information handling system. Some operating systems (os) of a server may not be upgraded such that the os does not support certain usb devices based on more recently published usb versions, such as usb 3.0.
Dell Products L.p.


 Method and system for process automation in computing patent thumbnailMethod and system for process automation in computing
The embodiments herein disclose a method and system for process automation in computing by implementing a robotic process automation software arm component used for automation of tasks that involves transactional activities like reading from a document, application, writing into a system or application and so on. The process automation allows workflow generation for automation of business user activities on numerous operating systems and works with multiple platforms, environments and applications.
Tata Consultancy Services Limited


System and multi-device video image display and modification

Methods and systems for allowing multiple devices to display and annotate (or modify) a video image are described, where a content renderer device displays a video image that is also displayed (or viewed) by one or more content viewer devices, which can both display and annotate (or modify) the same video image at the same time, and the content renderer selectively determines whether or not a gui menu is displayed on its display screen. Annotation commands (e.g., screen touch data) on the viewer devices are captured, packaged and sent to the content renderer, which creates a combined modified video image having the annotations from the viewer devices, displays it to the renderer display and sends it to the viewer devices for display thereon.
Disney Enterprises, Inc.

Method for executing dual operating systems of smart phone

A smart phone according to an embodiment of the present invention suggests a method for accessing dual environments in a lock screen. The method may comprise: a step for receiving an inputted password or release pattern in a lock screen of a smart phone; and a step for providing smart phone environments different from each other according to the inputted password..
Soosan Int Co., Ltd.

Method for consistent storage of data in an industrial controller

A system and method for employing a file system and file system services on the industrial controller. The file system allows industrial control programs to implement many functions previously performed within the industrial control program and stored in the same memory as the industrial control program.
Rockwell Automation Technologies, Inc.

Storage isolation using i/o authentication

Techniques are described for logically isolating data i/o requests from different operating systems (oses) for a same multi-tenant storage system (mtss). Techniques provide for oses and the mtss to obtain security tokens associated with the oses.
Oracle International Corporation

Monitoring access of network darkspace

A system includes one or more “botmagnet” modules that are exposed to infection by malicious code. The botmagnets may include one or more virtual machines hosing operating systems in which malicious code may be installed and executed without exposing sensitive data or other parts of a network.
Attivo Networks Inc.

Sound effect processing , plug-in unit manager and sound effect plug-in unit

Provided are a sound effect processing method and device, a plug-in unit manager and a sound effect plug-in unit, which belong to the field of information technology processing. The sound effect processing method comprises: invoking a pre-loaded plug-in unit manager to acquire a sound effect processing parameter supported by each preloaded sound effect plug-in unit (101); acquiring a sound effect configuration file pre-configured by the plug-in unit manager (102); displaying sound effect index identifiers corresponding to various sound effect modes (103); according to a selected sound effect index identifier, determining a selected sound effect mode, and according to an adjustment interface, acquiring adjusted parameter control data (104); sending the adjusted parameter control data to a selected sound effect plug-in unit (105); and invoking the plug-in unit manager to send data to be processed to the selected sound effect plug-in unit, and according to the adjusted parameter control data, conducting sound effect processing on the data to be processed by the selected sound effect plug-in unit (106).
Tencent Technology (shenzhen) Company Limited

Smarter operating systems: file system events

An on device client that augments operating system functionality may monitor for an event from an operating system running on a processor of a device. Responsive to determining that the event is indicative of an installation of an application on the device, the on device client may generate a table associated with the application.
International Business Machines Corporation

Computer

A computer, on which a plurality of operating systems run, wherein the plurality of operating systems includes a first operating system and a second operating system configured to generate a plurality of virtual computers. The first operating system runs on a first logical resource, and the second operating system runs on a second logical resource.
Hitachi, Ltd.

Extensible kernel for adaptive application enhancement

Resource use by applications used by user equipment (ue) is adaptively controlled. A ue can comprise a modem-network kernel component that can be well partitioned from modem operations and can facilitate adaptively controlling use of functional blocks for applications of the ue, and enhancing use of network resources in connection with use of applications by the ue.
At&t Intellectual Property I, L.p.

Extracting and formatting content from web-resources

A system is provided for presenting content on a companion computing device associated with a primary computing device. A web-resource micro-app package is configured, when operating in concert with a companion manager executing on the primary computing device, to control the delivery and presentation of content on the companion computing device.
Microsoft Technology Licensing, Llc

Local streaming proxy server

A local application streaming proxy can create a virtual image of storage media, which allows cloud operators to rapidly deliver applications, or deliver any operating system remotely, while providing better security, network utilization, low power requirements, and consistent performance for streamed applications and operating systems. A station using its wifi/lan provides qos guarantees (or priority) for application streaming network communications to create a consistent user experience regardless of other application bandwidth utilization.
Numecent Holdings, Inc.

Fast user kiosk access in a non-persistent desktop environment

Techniques for improving logon time for remote desktops a user has not logged onto before. In general, these techniques involve utilizing a pre-logon script to create a profile-specifying registry entry that links to an already created persistent or “mandatory” profile.
Vmware, Inc.

Method and system for anticipating demand for a computational resource by containers running above guest operating systems within a distributed, virtualized computer system

The current document is directed to methods and systems for efficiently executing osl-virtualization containers within the execution environments provided by virtual machines that execute above traditional virtualization layers within large, virtualized, distributed computing systems. The currently disclosed methods and systems anticipate the need for additional virtual machines in order to meet anticipated demands for one or more computational resources by the containers.
Vmware, Inc.

Method and template based platform and infrastructure provisioning

Systems and methods described herein are directed to a template based deployment system providing settings across platform and physical infrastructures. The infrastructure can involve a server, storage, and a network.
Hitachi, Ltd.

Method and controlling a plurality of operating systems

An electronic device and method for operation of same are provided. The electronic device includes a display, a memory, and a processor configured to execute a first operating system, a second operating system and an application run on the second operating system.
Samsung Electronics Co., Ltd.

Implementation and deletion methods and apparatuses for multiple operating systems on smart device

Implementation and deletion methods and apparatuses for multiple operating systems on a smart device are presented. The method includes receiving an operating instruction for installing a new operating system, where the operating instruction carries identification information of a new operating system to be installed; storing special identification information in a storage device according to the identification information of the new operating system, where the special identification information is used to instruct to enter, when a smart device is restarted, a special mode to install the new operating system; restarting the smart device, entering the special mode according to the special identification information, and allocating, according to capacity of the storage device, system space to the new operating system to be installed; updating a system partition table according to the allocated system space; and installing the new operating system in the allocated system space according to the updated system partition table..
Huawei Device Co., Ltd.

Personal computer network

Personal computer network (pcn) is a closed network to logically network the global computer users' small network at home through their interfaces and routers. The network architecture contains local operating systems, regional operating systems and global operating systems distributed globally and identified by country codes and area codes.

Computer

A computer, on which operating systems run, the computer comprising a virtualization function module configured to manage virtual computers. A operating system is configured to run on each of the virtual computers.
Hitachi, Ltd.

System and hosting multiple recovery operating systems in memory

A failure to load a primary operating system at a data processing device is identified. A partition in a volatile random access memory is allocated to store a second operating system.
Dell Products, Lp

Integrated hosted directory

Methods, systems, and devices for enterprise-wide management of disparate devices, applications, and users are described. A cloud-based central server may maintain an integrated hosted directory, which may allow user authentication, authorization, and management of information technology (it) resources across device types, operating systems, and software-as-a-service (saas) and on-premises applications.
Jumpcloud, Inc.

Systems and methods for managing distributed applications

Systems and methods of executing and/or provisioning an application in an application specific runtime environment or general runtime environment are disclosed. The application specific runtime environment or general runtime environment are optionally defined by an application environment specification to include a minimal or reduced set of software resources required for execution of the application.
Vmware, Inc.

Dynamically updated predictive modeling of systems and processes

Various examples are provided for dynamically updating or adapting predictive modeling for prediction of outcomes of interest for operating systems and processes. Embodiments of the disclosure may provide systems, apparatus, processes, and methods for generating and deploying dynamically updated predictive models.
Predikto, Inc

Threat detection using reputation data

Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can be usefully employed with any attribute or other metric that can be instrumented on an endpoint and tracked over time including observable events such as changes to files, data, software configurations, operating systems, and so forth.
Sophos Limited

Managing object identifiers

A method, system, and computer program product for managing an object related to a plurality of groups of users is disclosed. The method, system, and computer program product include utilizing identifiers of objects so that a requesting user can submit an object-request for access to the object utilizing a chosen identifier of the user.
International Business Machines Corporation

Electronic cigarette and cigar charging and operating systems integration with various cell phone and tablet types using a common case

The present invention describes a common case that can hold, protect, and recharge both one or more electronic cigarettes and/or electronic cigars (e-cigs) and either a cell phone or a tablet computer simultaneously with a single external battery charger that plugs into a port on the common case. Once one or more e-cigs are integrated in this way using a common case with a cell phone or tablet, a number additional features can be achieved that make the user's daily routine easier, more productive, and manageable.

Performance and security management of applications deployed in hosted computing environments

Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts.
Draios Inc.

Data processing multiple operating systems and terminal equipment

A data processing method for multiple operating systems and a terminal equipment are described. The terminal equipment has a display area and is capable of running multiple operating systems simultaneously by means of split-screen displaying.
Zte Corporation

Method and system for implementing mandatory file access control in native discretionary access control environments

A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control in a system comprising a plurality of computers, the system comprising a plurality of information assets, stored as files on the plurality of computers, and a network communicatively connecting the plurality of computers, wherein each of the plurality of computers includes an operating system that uses a discretionary access control policy, and wherein each of a subset of the plurality of computers includes a software agent component operable to perform the steps of intercepting a request for a file operation on a file from a user of one of the plurality of computers including the software agent, determining whether the file is protected, if the file is protected, altering ownership of the file from the user to another owner, and providing access to the file based on a mandatory access control policy..
Mcafee, Inc.

Operating systems for an rfid tag

In embodiments of the present invention improved capabilities are described for a wireless computing device, comprising an antenna, an analog block for receiving and transmitting an rf signal through the antenna, a power management block for managing power requirements of the wireless computing device, and a data processing and controller block for data management, wherein the data processing and controller block comprises (i) a first program memory adapted to store a first set of instructions comprising a system call adapted to control at least one function of the wireless computing device (ii) a second program memory adapted to store a second set of instructions comprising an instruction to call the system call, and (iii) at least one processor, wherein at least one processor is adapted to execute the first set of instructions and at least one processor is adapted to execute the second set of instructions.. .
Tego, Inc.

Method for implementing gpu virtualization and related apparatus, and system

A method for implementing gpu virtualization. The method is applied to a physical host and the physical host includes: a hardware layer including a gpu, a host running on the hardware layer, and n back-end gpu domains and m front-end vms that run on the host, where there are service channels between the n back-end gpu domains and the m front-end vms.
Huawei Technologies Co., Ltd.

Context-based selective downloading of application resources

One or more techniques and/or systems are provided for generating a bundle package, digitally signing the bundle package, selectively distributing the bundle package, and/or indexing one or more resource packages retrieved from the bundle package. That is, a bundle package (e.g., an application or game bundle package) comprises one or more app packages comprising application code configured to execute on various computing environments (e.g., operating systems, processors, etc.).
Microsoft Technology Licensing, Llc

Scalable and area optimized method to implement command queues in sriov based nvm devices

Provided are method for dynamically allocating resources to command queues and response queues by a non-volatile memory (nvm) controller. The method includes creating command queues and response queues for at least one operating system among a plurality of operating systems running on a host system and mapping the created command queues and response queues to a plurality of internal shared queue registers.
Samsung Electronics Co., Ltd.

Emulating transparent file processing

Transparent file processing is supported in unix-like operating systems by emulating the desired file processing through a number of recipes that accommodate different contexts. Recipes are provided, for example, for local folders in user space, for whole devices (e.g., flash drives or network drives), and for folders synchronized to cloud data.
Sophos Limited

Systems and methods of using a hypervisor with guest operating systems and virtual processors

An apparatus includes a processor and a guest operating system. In response to receiving a request to create a task, the guest operating system requests a hypervisor to create a virtual processor to execute the requested task.
Qualcomm Incorporated

Access to storage resources using a virtual storage appliance

Methods and systems for improved access to storage resources include installing a virtual storage appliance as a virtual machine on a hypervisor. The virtual storage appliance installs itself as a virtual pci-e device and communicates with guest operating systems of the hypervisor using direct memory access via a pci-e non-transparent bridge.
Dell Products L.p.

Policy-driven device control in operating systems

Techniques describe a policy-driven approach to controlling device access. A dummy driver is mapped to the device.
Symantec Corporation

Resource processing method, operating system, and device

A resource processing method, an operating system, and a device are provided. The method is applied to a multi-core operating system, where the multi-core operating system includes a management operating system and multiple load operating systems that run on a host machine and includes a physical resource pool.
Huawei Technologies Co.,ltd.

Multifunction peripheral device with interchangable connectors and casts for mobile devices

Disclosed herein is a multifunction core for use with a wide variety of belt connectors, operating systems, mobile devices, and replaceable cases. The features of the multifunction core are controlled by a dedicated application program installed in the mobile device..

Information processing system, managing device, and computer readable medium

An information processing system includes a plurality of computers and a management device. Each computer executes a program to generate virtual machines and a plurality of virtual operating systems.
Fujitsu Limited

Multi-configuration input device

A multi-configuration input device is described. In one or more examples, an input device comprises a connection portion configured to be secured to a mobile computing device using a magnetic connection, an input portion having one or more sensors configured to generate inputs responsive to user interaction, a support portion rotationally secured to the input portion and the connection portion and effective to assume a cover configuration in which the support portion and the input portion are positioned to cover a display device of the mobile computing device, and further effective to assume a stand configuration in which the support portion and the input portion are position at an acute angle with respect to one another, and an operating system selection key operable to select from a plurality of operating systems..
Microsoft Technology Licensing, Llc

Vehicle operating system using motion capture

Vehicle operating systems for operating a vehicle having a driving seat for a vehicle driver and at least one passenger seat for passengers are described. The vehicle operating system may include one or more camera devices for shooting images of hand actions of the driver or images of hand actions of a passenger, and a storage device for storing operating signals corresponding to hand actions.
Thunder Power Hong Kong Ltd.

Vehicle operating system using motion capture

Vehicle operating systems for operating a vehicle having a driving seat for a vehicle driver and at least one passenger seat for passengers are described. The vehicle operating system may include one or more camera devices for shooting images of hand actions of the driver or images of hand actions of a passenger, and a storage device for storing operating signals corresponding to hand actions.
Thunder Power Hong Kong Ltd.



Operating Systems topics:
  • Operating System
  • Operating Systems
  • Virtual Machine
  • Computer System
  • The Operating System
  • Distributed
  • System Call
  • Distributed Computing
  • Access Control
  • Cloud Computing
  • Host Computer
  • Virtualization
  • Privileges
  • Computer Readable
  • File System


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Operating Systems for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Operating Systems with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.9658

    file did exist - 2753

    0 - 1 - 52