Follow us on Twitter
twitter icon@FreshPatents


Operating Systems patents

      

This page is updated frequently with new Operating Systems-related patent applications.




 Mobile application testing engine patent thumbnailMobile application testing engine
Providing collection and storage of mobile application data associated with execution of a mobile application is disclosed for a carrier core-network connected component. In an aspect, the carrier core-network connected component can enable storage of some, none, or all mobile application data related to mobile application information traversing a carrier core-network comprising the carrier core-network connected component.
At&t Mobility Ii Llc


 Operating-system-level isolation of multi-tenant applications patent thumbnailOperating-system-level isolation of multi-tenant applications
Implementations of pdb sandboxing in layers and mapping to different operating systems are described. In exemplary implementations, one or more pluggable databases (pdbs) are encapsulated on common container databases to form one or more pdb sandboxes.
Oracle International Corporation


 System and  reversibly and transparently increasing the disk storage capacity of desktop microsoft windows operating systems, including free disk space and total disk capacity projection at an operator customizable compression ratio patent thumbnailSystem and reversibly and transparently increasing the disk storage capacity of desktop microsoft windows operating systems, including free disk space and total disk capacity projection at an operator customizable compression ratio
The present invention overcomes deficiencies inherent in data compression in computer systems running the microsoft windows operating system, and accelerates disk read speeds.. .

 System and  regulating cell culture based production of biologics patent thumbnailSystem and regulating cell culture based production of biologics
The disclosure is directed to a system and method for control of at least one bioreactor, other cell cultivation-related equipment, and systems containing any combination of these in a plant. For example, a plant-wide control system (pwcs) or a process control system (pcs) may be divided into three main components: hardware (including operating systems, such as a controller communicating with one or more servers of a network associated with the pwcs, (2) software (such as a control module) for performing control, and (3) one or more instrument control loops, which may be used by the software to maintain certain process values.
Lonza Limited


 Systems and methods for fingerprinting operating systems and software applications based on network resource access pattern patent thumbnailSystems and methods for fingerprinting operating systems and software applications based on network resource access pattern
A system for fingerprinting operating system and/or other client software incorporates a server executing multiple logical servers, a data storage unit and dns server. Upon receiving a client dns query for resolving a domain name of a logical server, the dns server provides multiple ip addresses for the server domain name.
Limited Liability Company Mail.ru


 Cross device task continuity patent thumbnailCross device task continuity
Systems and methods for cross device and/or cross operating system task continuity between devices for frictionless task engagement and reengagement. Task continuity can provide for simple detection and selection of recently viewed and/or modified tasks.
Microsoft Technology Licensing, Llc


 Method and system for providing stack memory management in real-time operating systems patent thumbnailMethod and system for providing stack memory management in real-time operating systems
A method and system for providing memory management in a real-time operating system (rtos) based system are provided. The method includes creating a plurality of tasks with a two level stack scheme comprising a first level stack and a second level stack, scheduling a first task for execution by moving a stack pointer from the first level stack to the second level stack, determining whether the first task is pre-empted, allocating the second level stack to the first task in a second state if the first task is not pre-empted, changing an active task for execution, determining whether the first task relinquishes control from the second state and is waiting for a resource, moving the stack pointer back from the second level stack to the first level stack if the first task relinquishes itself and providing the second level stack for use by a second task..
Samsung Electronics Co., Ltd.


 User interfaces and associated processes for information resources patent thumbnailUser interfaces and associated processes for information resources
Methods and systems are disclosed for user interfaces and associated processes in computer applications and operating systems to provide an information resource area with information resources. In some embodiments, an information resource area is opened in response to detection of a user being idle for a predefined length of time with respect to an executing software program.

 Passing data streams between remote cooperating systems patent thumbnailPassing data streams between remote cooperating systems
A method, computer program product, and/or system for facilitating communication between an origin machine and a target machine are provided. To facilitate communication, a reference to an original object of the origin machine is constructed within a remote object services level.
International Business Machines Corporation


 Passing data streams between remote cooperating systems patent thumbnailPassing data streams between remote cooperating systems
A method, computer program product, and/or system for facilitating communication between an origin machine and a target machine are provided. To facilitate communication, a reference to an original object of the origin machine is constructed within a remote object services level.
International Business Machines Corporation


Touch free disaster recovery

A recovery as a service (raas) system including a configuration management database (cmdb), a resource planning system (rps), a recovery execution system (res), and an asset reservation system (ars). A scope for a test or recovery is specified as one or more applications.
Sungard Availability Services, Lp

Systems for enabling subscriber monitoring of telecommunications network usage and service plans

Methods, servers and systems for directly accessing and modifying charging information maintained within a telecommunications operator's business and operating systems' infrastructure from user equipment. A mobile application server may receive a charging request from a user equipment, identify a relevant charging system based on the received request, send a charging request to the identified charging system for processing, receive a first response message including charging information from the identified charging system, generate a second response message based on the charging information included in the first response message, and send the generated second response message to the user equipment.
Openet Telecom Ltd.

Policy setting for content sharing of a plurality of remotely connected computing devices in physical or virtualized space

An information handling system includes a method for executing instructions for a content sharing system executing role-based policy settings for a plurality of remotely connected computing devices operatively connected to share content, detecting pre-paired wireless connectivity of remotely connected computing devices to a system hosting the content sharing system, implementing role-based policy settings to partially limit content sharing system operation based on a device role classification for the at least one of the plurality of remotely connected computing devices, auto-initiating navigation accessibility to the pre-paired remotely connected computing device via the content sharing system, and displaying a content sharing system desktop comprising a plurality of device environment-representative windows representing at least two of the plurality of remotely connected computing devices that devices function via different operating systems.. .
Dell Products, Lp

Method and system for real-time causality and root cause determination of transaction and infrastructure related events provided by multiple, heterogeneous agents

A method is disclosed that estimates causal relationships between events based on heterogeneous monitoring data. The monitoring data consists in transaction tracing data, describing the execution performance of individual transactions, resource utilization measurements of infrastructure entities like processes or operating systems and network utilization measurement data.
Dynatrace Llc

Presenting hypervisor data for a virtual machine with associated operating system data

The disclosed embodiments relate to a system for presenting data for virtual machines. During operation, the system obtains hypervisor data for a set of virtual machines, wherein the hypervisor data was received from one or more hypervisors while the set of virtual machines was running on the hypervisors.
Splunk Inc.

System, providing a toggleable remoting mode for computer operating systems

Software can also be used via a remote application window, remote desktop window, or remote graphical windowing user session window. The present invention describes how software (application, desktop, or graphical windowing user session) can know whether or not it is running in local or remote mode, and control its handling of functionalities accordingly.

Systems and methods for processing video streams

Embodiments of a method and system described herein enable capture of video data streams from multiple, different video data source devices and the processing of the video data streams. The video data streams are merged such that various data protocols can all be processed with the same worker processors on different types of operating systems, which are typically distributed..
Placemeter Inc.

Robust, adaptive and efficient object detection, classification and tracking

Embodiments of a method and system described herein enable capture of video data streams from multiple, different video data source devices and the processing of the video data streams. The video data streams are merged such that various data protocols can all be processed with the same worker processors on different types of operating systems, which are typically distributed.
Placemeter Inc.

System and method to redirect uasp mass storage devices to an unsupported operating system in a vdi environment

In certain information handling system environments, universal serial bus (usb) attached small computer interface (scsi) protocol (uasp) devices may be connected to a client and redirected to a server or other information handling system. Some operating systems (os) of a server may not support uasp.
Dell Productss L.p.

System and method to support usb devices in an unsupported operating system in vdi environments

In certain information handling system environments, universal serial bus (usb) devices may be connected to a client and redirected to a server or other information handling system. Some operating systems (os) of a server may not be upgraded such that the os does not support certain usb devices based on more recently published usb versions, such as usb 3.0.
Dell Products L.p.

Method and system for process automation in computing

The embodiments herein disclose a method and system for process automation in computing by implementing a robotic process automation software arm component used for automation of tasks that involves transactional activities like reading from a document, application, writing into a system or application and so on. The process automation allows workflow generation for automation of business user activities on numerous operating systems and works with multiple platforms, environments and applications.
Tata Consultancy Services Limited

System and multi-device video image display and modification

Methods and systems for allowing multiple devices to display and annotate (or modify) a video image are described, where a content renderer device displays a video image that is also displayed (or viewed) by one or more content viewer devices, which can both display and annotate (or modify) the same video image at the same time, and the content renderer selectively determines whether or not a gui menu is displayed on its display screen. Annotation commands (e.g., screen touch data) on the viewer devices are captured, packaged and sent to the content renderer, which creates a combined modified video image having the annotations from the viewer devices, displays it to the renderer display and sends it to the viewer devices for display thereon.
Disney Enterprises, Inc.

Method for executing dual operating systems of smart phone

A smart phone according to an embodiment of the present invention suggests a method for accessing dual environments in a lock screen. The method may comprise: a step for receiving an inputted password or release pattern in a lock screen of a smart phone; and a step for providing smart phone environments different from each other according to the inputted password..
Soosan Int Co., Ltd.

Method for consistent storage of data in an industrial controller

A system and method for employing a file system and file system services on the industrial controller. The file system allows industrial control programs to implement many functions previously performed within the industrial control program and stored in the same memory as the industrial control program.
Rockwell Automation Technologies, Inc.

Storage isolation using i/o authentication

Techniques are described for logically isolating data i/o requests from different operating systems (oses) for a same multi-tenant storage system (mtss). Techniques provide for oses and the mtss to obtain security tokens associated with the oses.
Oracle International Corporation

Monitoring access of network darkspace

A system includes one or more “botmagnet” modules that are exposed to infection by malicious code. The botmagnets may include one or more virtual machines hosing operating systems in which malicious code may be installed and executed without exposing sensitive data or other parts of a network.
Attivo Networks Inc.

Sound effect processing , plug-in unit manager and sound effect plug-in unit

Provided are a sound effect processing method and device, a plug-in unit manager and a sound effect plug-in unit, which belong to the field of information technology processing. The sound effect processing method comprises: invoking a pre-loaded plug-in unit manager to acquire a sound effect processing parameter supported by each preloaded sound effect plug-in unit (101); acquiring a sound effect configuration file pre-configured by the plug-in unit manager (102); displaying sound effect index identifiers corresponding to various sound effect modes (103); according to a selected sound effect index identifier, determining a selected sound effect mode, and according to an adjustment interface, acquiring adjusted parameter control data (104); sending the adjusted parameter control data to a selected sound effect plug-in unit (105); and invoking the plug-in unit manager to send data to be processed to the selected sound effect plug-in unit, and according to the adjusted parameter control data, conducting sound effect processing on the data to be processed by the selected sound effect plug-in unit (106).
Tencent Technology (shenzhen) Company Limited

Smarter operating systems: file system events

An on device client that augments operating system functionality may monitor for an event from an operating system running on a processor of a device. Responsive to determining that the event is indicative of an installation of an application on the device, the on device client may generate a table associated with the application.
International Business Machines Corporation

Computer

A computer, on which a plurality of operating systems run, wherein the plurality of operating systems includes a first operating system and a second operating system configured to generate a plurality of virtual computers. The first operating system runs on a first logical resource, and the second operating system runs on a second logical resource.
Hitachi, Ltd.

Extensible kernel for adaptive application enhancement

Resource use by applications used by user equipment (ue) is adaptively controlled. A ue can comprise a modem-network kernel component that can be well partitioned from modem operations and can facilitate adaptively controlling use of functional blocks for applications of the ue, and enhancing use of network resources in connection with use of applications by the ue.
At&t Intellectual Property I, L.p.

Extracting and formatting content from web-resources

A system is provided for presenting content on a companion computing device associated with a primary computing device. A web-resource micro-app package is configured, when operating in concert with a companion manager executing on the primary computing device, to control the delivery and presentation of content on the companion computing device.
Microsoft Technology Licensing, Llc

Local streaming proxy server

A local application streaming proxy can create a virtual image of storage media, which allows cloud operators to rapidly deliver applications, or deliver any operating system remotely, while providing better security, network utilization, low power requirements, and consistent performance for streamed applications and operating systems. A station using its wifi/lan provides qos guarantees (or priority) for application streaming network communications to create a consistent user experience regardless of other application bandwidth utilization.
Numecent Holdings, Inc.

Fast user kiosk access in a non-persistent desktop environment

Techniques for improving logon time for remote desktops a user has not logged onto before. In general, these techniques involve utilizing a pre-logon script to create a profile-specifying registry entry that links to an already created persistent or “mandatory” profile.
Vmware, Inc.

Method and system for anticipating demand for a computational resource by containers running above guest operating systems within a distributed, virtualized computer system

The current document is directed to methods and systems for efficiently executing osl-virtualization containers within the execution environments provided by virtual machines that execute above traditional virtualization layers within large, virtualized, distributed computing systems. The currently disclosed methods and systems anticipate the need for additional virtual machines in order to meet anticipated demands for one or more computational resources by the containers.
Vmware, Inc.

Method and template based platform and infrastructure provisioning

Systems and methods described herein are directed to a template based deployment system providing settings across platform and physical infrastructures. The infrastructure can involve a server, storage, and a network.
Hitachi, Ltd.

Method and controlling a plurality of operating systems

An electronic device and method for operation of same are provided. The electronic device includes a display, a memory, and a processor configured to execute a first operating system, a second operating system and an application run on the second operating system.
Samsung Electronics Co., Ltd.

Implementation and deletion methods and apparatuses for multiple operating systems on smart device

Implementation and deletion methods and apparatuses for multiple operating systems on a smart device are presented. The method includes receiving an operating instruction for installing a new operating system, where the operating instruction carries identification information of a new operating system to be installed; storing special identification information in a storage device according to the identification information of the new operating system, where the special identification information is used to instruct to enter, when a smart device is restarted, a special mode to install the new operating system; restarting the smart device, entering the special mode according to the special identification information, and allocating, according to capacity of the storage device, system space to the new operating system to be installed; updating a system partition table according to the allocated system space; and installing the new operating system in the allocated system space according to the updated system partition table..
Huawei Device Co., Ltd.

Personal computer network

Personal computer network (pcn) is a closed network to logically network the global computer users' small network at home through their interfaces and routers. The network architecture contains local operating systems, regional operating systems and global operating systems distributed globally and identified by country codes and area codes.

Computer

A computer, on which operating systems run, the computer comprising a virtualization function module configured to manage virtual computers. A operating system is configured to run on each of the virtual computers.
Hitachi, Ltd.

System and hosting multiple recovery operating systems in memory

A failure to load a primary operating system at a data processing device is identified. A partition in a volatile random access memory is allocated to store a second operating system.
Dell Products, Lp

Integrated hosted directory

Methods, systems, and devices for enterprise-wide management of disparate devices, applications, and users are described. A cloud-based central server may maintain an integrated hosted directory, which may allow user authentication, authorization, and management of information technology (it) resources across device types, operating systems, and software-as-a-service (saas) and on-premises applications.
Jumpcloud, Inc.

Systems and methods for managing distributed applications

Systems and methods of executing and/or provisioning an application in an application specific runtime environment or general runtime environment are disclosed. The application specific runtime environment or general runtime environment are optionally defined by an application environment specification to include a minimal or reduced set of software resources required for execution of the application.
Vmware, Inc.

Dynamically updated predictive modeling of systems and processes

Various examples are provided for dynamically updating or adapting predictive modeling for prediction of outcomes of interest for operating systems and processes. Embodiments of the disclosure may provide systems, apparatus, processes, and methods for generating and deploying dynamically updated predictive models.
Predikto, Inc

Threat detection using reputation data

Threat detection is improved by monitoring variations in observable events and correlating these variations to malicious activity. The disclosed techniques can be usefully employed with any attribute or other metric that can be instrumented on an endpoint and tracked over time including observable events such as changes to files, data, software configurations, operating systems, and so forth.
Sophos Limited

Managing object identifiers

A method, system, and computer program product for managing an object related to a plurality of groups of users is disclosed. The method, system, and computer program product include utilizing identifiers of objects so that a requesting user can submit an object-request for access to the object utilizing a chosen identifier of the user.
International Business Machines Corporation

Electronic cigarette and cigar charging and operating systems integration with various cell phone and tablet types using a common case

The present invention describes a common case that can hold, protect, and recharge both one or more electronic cigarettes and/or electronic cigars (e-cigs) and either a cell phone or a tablet computer simultaneously with a single external battery charger that plugs into a port on the common case. Once one or more e-cigs are integrated in this way using a common case with a cell phone or tablet, a number additional features can be achieved that make the user's daily routine easier, more productive, and manageable.

Performance and security management of applications deployed in hosted computing environments

Systems and methods for performance and security management of the computing infrastructure that supports an application deployed in a hosted computing environment are described. In one embodiment, for example, a system comprises agents installed on hosts.
Draios Inc.

Data processing multiple operating systems and terminal equipment

A data processing method for multiple operating systems and a terminal equipment are described. The terminal equipment has a display area and is capable of running multiple operating systems simultaneously by means of split-screen displaying.
Zte Corporation

Method and system for implementing mandatory file access control in native discretionary access control environments

A method is provided for implementing a mandatory access control model in operating systems which natively use a discretionary access control scheme. A method for implementing mandatory access control in a system comprising a plurality of computers, the system comprising a plurality of information assets, stored as files on the plurality of computers, and a network communicatively connecting the plurality of computers, wherein each of the plurality of computers includes an operating system that uses a discretionary access control policy, and wherein each of a subset of the plurality of computers includes a software agent component operable to perform the steps of intercepting a request for a file operation on a file from a user of one of the plurality of computers including the software agent, determining whether the file is protected, if the file is protected, altering ownership of the file from the user to another owner, and providing access to the file based on a mandatory access control policy..
Mcafee, Inc.

Operating systems for an rfid tag

In embodiments of the present invention improved capabilities are described for a wireless computing device, comprising an antenna, an analog block for receiving and transmitting an rf signal through the antenna, a power management block for managing power requirements of the wireless computing device, and a data processing and controller block for data management, wherein the data processing and controller block comprises (i) a first program memory adapted to store a first set of instructions comprising a system call adapted to control at least one function of the wireless computing device (ii) a second program memory adapted to store a second set of instructions comprising an instruction to call the system call, and (iii) at least one processor, wherein at least one processor is adapted to execute the first set of instructions and at least one processor is adapted to execute the second set of instructions.. .
Tego, Inc.

Method for implementing gpu virtualization and related apparatus, and system

A method for implementing gpu virtualization. The method is applied to a physical host and the physical host includes: a hardware layer including a gpu, a host running on the hardware layer, and n back-end gpu domains and m front-end vms that run on the host, where there are service channels between the n back-end gpu domains and the m front-end vms.
Huawei Technologies Co., Ltd.



Operating Systems topics:
  • Operating System
  • Operating Systems
  • Virtual Machine
  • Computer System
  • The Operating System
  • Distributed
  • System Call
  • Distributed Computing
  • Access Control
  • Cloud Computing
  • Host Computer
  • Virtualization
  • Privileges
  • Computer Readable
  • File System


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Operating Systems for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Operating Systems with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.3825

    file did exist - file did put2700

    3 - 1 - 51