Various inventive embodiments disclosed herein relate generally to processing computer input/output operations, and more particularly to a system for and method of providing a universal input/output (I/O) command translation framework in an application publishing environment.
Many different types of computing devices exist today. Many computing devices use traditional input/output (I/O) devices (e.g., mouse, keyboard, and display). However, there are many computing devices that do not use traditional I/O devices. For example, more and more handheld computing devices, such as mobile phones (e.g., Android™ Phone and iPhone), personal digital assistants (PDAs) (e.g., Blackberry®), and tablet devices (e.g., iPad and Samsung Galaxy Tab), are relying on touchscreen technology as the primary mechanism by which users interact with the device. In a remote access system in which a user uses a remote device, such as the aforementioned handheld computing devices, to access resources of an application host computer or application server, there may be certain limitations due to incompatibility of I/O devices between the user's remote access device and the application host computer or application server. For example, the control functions of the applications that are being accessed remotely from the application host computer or application server may not be exposed (i.e., published) to the client devices and therefore there can be no direct access to the functionality of these applications using the client devices. In other words, the control functions exist internal to these applications and without direct accessibility by other programs or processes.
Various inventive embodiments disclosed herein, both as to its organization and manner of operation, together with further objectives and advantages, may be best understood by reference to the following description, taken in connection with the accompanying drawings as set forth below:
The disclosure provides a system for and method of providing a universal input/output (I/O) command translation framework in an application publishing environment. The client-server computing system of the disclosure exhibits numerous advantages over existing systems. In various embodiments, the client computing system provides a universal translation framework that is integrated into the remote applications of the host computer, application server, or cloud server. Using the translation framework, an application-specific translation layer can be created and integrated into remote applications. The application-specific translation layer enables I/O commands from client devices to be interpreted by remote applications whose control functions only exist internally (i.e., controls are private, not published). The application-specific translation layer that is created using the translation framework receives the I/O commands of the client device that are generated via touch-based user input. Then, the application-specific translation layer translates the client I/O commands to the native internal control functions of the remote application. The remote application then performs actions according to the translated I/O commands. Next, the actions that result from a translated I/O commands are “remoted” from the host computer, application server, or cloud server to the client device and the display of the client device is updated accordingly.
Therefore, in various embodiments, the client-server computing system of the disclosure and associated methods enable the user to access applications that are designed for mouse and keyboard input using their touch-based client devices, thereby enabling cross-platform application execution.
In one example, hosting service 105 includes a network of one or more host computers 110, i.e., host computers 110-1 through 110-n; an application server 120; a document database 130; and a user database 140. Host computers 110-1 through 110-n may be connected to application server 120 and user database 140 via, for example, a TCP connection. The TCP connection may be a standard TCP connection with no encryption or a TCP connection with encryption.
One or more users 150 are associated with client-server computing system 100. Users 150 may be individual users and/or groups of users and, thus, hereafter it may be understood that any reference to users 150 means individual users or user groups (i.e., groups of users 150). Users 150 may access hosting service 105 via client devices 160, which are connected to hosting service 105 via a network 170.
Network 170 may be, for example, a local area network (LAN) and/or a wide area network (WAN) for connecting to the Internet. Entities of client-server computing system 100 may connect to network 170 by any wired and/or wireless means. Client-server computing system 100 may be implemented using standard client-server architecture between hosting service 105 and client devices 160.
Host computers 110 are any computers on which any types of resources, applications, programs, processes, files, and/or data may be installed and accessed by client devices 160 through hosting service 105. Accordingly, the operating systems of host computers 110 may be, for example, the Windows operating system, the Linux operating system, the UNIX operating system, the Mac OS X operating system, and the like.
It is to be understood that the application publishing server 120 and host computer 110-1 etc., may comprise the same physical machine.
Client devices 160 are, for example, desktop computers, laptop computers, handheld computing devices, mobile phones, and tablet devices. In the example of mobile devices, the operating systems of client devices 160 may be, for example, the iOS operating system (Apple Inc., Cupertino, Calif.), the Android operating system (Google Inc., Mountain View, Calif.), the Windows CE and the Windows Mobile operating systems (Microsoft Corp., Redmond, Wash.), and the like.
In a remote access system, such as client-server computing system 100, the “remoting” software is installed and executing (i.e., “running”) on each host computer 110, which is software that allows users 150 to remotely access applications that are installed on each host computer 110. By way of example, a set of applications 112 are installed on each host computer 110. Applications 112 represent any applications, programs, and/or processes executing (i.e., “running”) on host computers 110. The functionality of applications 112 shall be visible to and accessible by client devices 160 via network 170. For example, the functionality of applications 112 may be accessed from client devices 160 using a process herein known as application publishing, which is currently supported by products such as GraphOn GO-Global, Microsoft Remote Desktop Services and Citrix XenApp. Such application publishing may be performed in accordance with teachings of commonly-owned U.S. Pat. No. 5,831,609, filed Jun. 6, 1995, entitled “Method and system for dynamic translation between different graphical user interface systems”, which is incorporated by reference as though fully set forth herein.
Examples of applications 112 include, but are not limited to, the Microsoft® Office suite of programs (e.g., Word, PowerPoint, Excel, Outlook, Access, and Publisher); Microsoft® Visio; a personal or business finance application, such as Intuit® QuickBooks® and Intuit® Quicken® (Intuit Inc., Mountain View, Calif.); a computer-aided design (CAD) application, such as Autodesk® AutoCAD® (Autodesk, Inc., San Rafael, Calif., USA) and Cadence® Virtuoso® (Cadence Design Systems, San Jose, Calif.); a medical clinical workflow application, such as Siemens AG Symbia.net™ (Siemens AG, Munich, Germany); an interactive mapping application, such as Google Earth (Google, Inc.); a web browser application, such as Internet Explorer, Safari, and Mozilla Firefox; Adobe® Reader (Adobe Systems Incorporated, San Jose, Calif.); a 3D game; and the like.
Using an example of three host computers 110-1, 110-2, and 110-3, instances of the same or different types of applications 112 may be installed on each of the host computers 110-1, 110-2, and 110-3. For example, the Microsoft® Office suite of programs may be installed and available on all three host computers 110-1, 110-2, and 110-3. Adobe® Reader may be installed and available on host computers 110-2 and 110-3, but not on host computer 110-1. Autodesk® AutoCAD® and the AutoCAD® viewer may be installed and available only on host computer 110-2. Intuit® QuickBooks® may be installed and available on host computers 110-1 and 110-3, but not on host computer 110-2, and so on.
Each host computer 110 further includes a remote access service 114 and a virtual display driver 116. Remote access service 114 provides an application publishing service. Namely, at each host computer 110, remote access service 114 is used to publish its applications 112 to users 150. The remote access service 114 is an application running on each host computer 110 that is capable of starting a remote session in which applications can be run and displayed to a user 150 at his/her client device 160, which is a remote device. The remote access service 114 application manages the communication of each host computer 110 with the client device 160 with respect to creating and displaying host sessions on behalf of users 150. Namely, remote access service 114 is the application or process that manages the user access process at the host computer 110 whenever an application access request is received from a client device 160 of a certain user 150 via application server 120.
Virtual display driver 116 is a software code module that enables commands or functions that are called in host computer 110 to be encoded and transmitted to client devices 160 over network 170. Namely, virtual display driver 116 is used to communicate display commands from each host computer 110 to client devices 160. More particularly, when “remoting” the user interface of the applications 112 to client devices 160, display commands of the host computer 110 are directed to virtual display driver 116 for communication to client devices 160 via network 170.
Application server 120 is used as the gateway into hosting service 105. Namely, application server 120 provides the interface between client devices 160 and host computers 110. As such, applications 112 of host computers 110-1 through 110-n is delivered to client devices 160 via application server 120. More specifically, application server 120 includes a application publishing service 122. Application publishing service 122 may be implemented as a web application that is accessible by client devices 160 via, for example, the Internet (e.g., network 170). Application publishing service 122 controls access to host computers 110 and any other entities of hosting service 105. More particularly, under the control of application publishing service 122, applications 112 of host computers 110 shall be visible to and accessible by client devices 160 via network 170. For example, users 150 authenticate to application server 120 using application publishing service 122. Once authenticated, based on access rights and permissions, users 150 are allowed access to applications 112 of host computers 110-1 through 110-n that are connected to application server 120.
Each client device 160 includes a client application 162. Client application 162 is used to provide a user interface to application publishing service 122 of application server 120. Namely, client application 162 is the component that is the counterpart to application publishing service 122 of application server 120. Client application 162 may be implemented as a web application and run in a web browser, such as Internet Explorer. However, client application 162 may be implemented by other means, such as a .NET application, a light weight desktop application, a mobile app, and the like.
Application publishing service 122 of application server 120 is the first process that client application 162 of client devices 160 connects to. The purpose of application publishing service 122 is to authenticate users 150 and keep track of what each individual user 150 is allowed to access. Namely, application publishing service 122 is used to enforce the access rights and limitations that a system administrator (not shown) has defined.
Optionally, client-server computing system 100 may support a document sharing service, such as any cloud-based service. Accordingly, document database 130 provides a centralize document storage means in hosting service 105. In one example, document database 130 is used for storing a repository of documents 132. In this example, documents 132 may be any documents created and/or processed using applications 112. Using client devices 160, documents 132 may be created by users 150, then saved to document database 130 and shared with other users 150.
User/group information 142 may be stored in user database 140. A system administrator (not shown) creates and defines user/group information 142. Additionally, if allowed by the administrator, users may create their own accounts and groups. User/group information 142 may contain, for example, account information, user names, group names, user/group credentials, locations of user/group profiles (e.g., file paths), and the like.
Client-server computing system 100, and more particularly hosting service 105, may support a cloud computing environment. In a cloud computing environment, application server 120 is the cloud server. Further, hosting service 105 of client-server computing system 100 is not limited to one application server 120 only. Hosting service 105 may include any number of application servers 120 (or cloud servers).
Some of applications 112 of host computers 110 are designed having control application programming interfaces (APIs) that are published, which allows control commands to be translated directly between the client devices 160 and the remote applications 112. The Microsoft® Office suite of programs is an example of applications 112 whose control APIs are published. In this example, the Windows framework provides programmatic ways of processing MS Office user I/O commands. However, there are many other types of applications 112 of host computers 110 that do not have published control APIs and therefore there can be no direct access to the functionality thereof using client devices 160. Namely, the control functions only exist internal to these applications 112 and without programmatic accessibility by other programs or processes.
Therefore, application server 120 further includes a translation framework 124 that provides a set of generic public APIs 126 by which client devices 160 may control the remote applications 112 that natively do not provide published APIs. Translation framework 124 may be implemented as a software development kit (SDK) framework. Further, translation framework 124 is implemented as a library function. The presence of translation framework 124 in client-server computing system 100 removes the burden of application providers (or software vendors) providing their own external-facing control APIs. Instead, translation framework 124 provides public APIs 126, which are the external-facing control APIs. Public APIs 126 may include generic public APIs, such as, but not limited to, a file new API, a file open API, a file close API, a file save API, a file delete API, a zoom in API, a zoom out API, a scroll up API, a scroll down API, and the like.
Application providers use translation framework 124 to create a translation layer 118 that is specific to each type of application 112. Translation layer 118 is an abstraction layer that may be used, in one example, to abstract from the Window Mobile OS to a certain application 112. More particularly, translation layer 118 is used to map the public APIs 126 of translation framework 124 to the internal control functions of the certain application 112.
In one example, if the application 112 that does not have public APIs is Quicken®, translation framework 124 is used to create a Quicken-specific translation layer 118 that is integrated into the Quicken® application 112. The Quicken-specific translation layer 118 maps the public APIs 126 of translation framework 124 to the internal control functions of Quicken®. For example, when a user 150 accesses the remote Quicken® application via his/her client device 160 and finger-taps on the “new document” control button, a “file new” call is transmitted to the Quicken-specific translation layer 118 of the Quicken® application 112 at host computer 110. The Quicken-specific translation layer 118 translates the “file new” call to the internal “new file dialog” of the Quicken® application 112. The Quicken® application 112 performs the requested action and the result of the action is “remoted” to the client device 160 and its display is updated accordingly.
In summary, translation framework 124 is used to correlate the native I/O commands of client devices 160 to generic I/O commands that are understood by the translation layers 118. Translation layers 118 interpret the generic I/O commands and then translate the generic I/O commands into the native source code of applications 112. The applications 112 then execute the commands initiated by users 150 on client devices 160.
In this example, the Quicken® translation layer 212 translates the generic public APIs 126 that translation framework 124 provides to internal control functions of the Quicken® application 210. Similarly, the AutoCAD® translation layer 222 translates the generic public APIs 126 to internal control functions of the AutoCAD® application 220, the Adobe Illustrator® translation layer 232 translates the generic public APIs 126 to internal control functions of the Adobe Illustrator® application 230, and the Symbia.net™ translation layer 242 translates the generic public APIs 126 to internal control functions of the Symbia.net™ application 240. A detailed example of the translation is described with reference to
At a step 410, using client application 162 of the user's client device 160, the user 150 signs into the application publishing service 122 and a standard authentication process is performed that allows the user 150 to access applications 112 of host computers 110-1 through 110-n and document database 130. User-sign in may occur a number of ways. In one example, the user 150 may manually browse to the website of application publishing service 122 and enter credentials (e.g., username and password). In another example, the user sign-in process may occur automatically when the user 150 starts his/her client device 160.
At a step 412, client-server computing system 100 displays the applications 112 that are available to the authenticated user 150. More specifically, a list of applications 112 to which the user 150 has rights and privileges is published by application publishing service 122 and displayed on the user's client device 160.
At a step 414, user 150 selects a certain application 112 from the list presented in step 412. In one example, if the user 150 selects a Microsoft® PowerPoint application, which is one of the listed applications 112.
At a step 416, application publishing service 122 selects the host computer 110 on which to start the application 112 selected in step 414. The choice of computers includes any host computers 110-1 through 110-n of hosting service 105 to which the user 150 has access rights. For example, application publishing service 122 selects a host computer 110 that has the lightest load (i.e., lowest CPU utilization) or selects the last host computer 110 that the user 150 accessed in a previous session on hosting service 105. In one example, application publishing service 122 selects host computer 110-2 for running the Microsoft® PowerPoint application on behalf of the user's client device 160.
At a step 418, remote access service 114 of the host computer 110 selected in step 416 displays the interface of the application 112 selected in step 414 on the user's client device 160 via client application 162. Continuing the example, remote access service 114 of host computer 110-2 displays the interface of the Microsoft® PowerPoint application on the user's client device 160 via client application 162.
Various embodiments of the present disclosure allow for the method 400 to be performed by an intermediary device, such as a server 180, which may reside, be associated with host computers 110, or reside elsewhere in the network (e.g., the cloud). In one example, server 180 (which may be in intermediary or proxy device) may receive information regarding what the host computer 110-2 is currently displaying. The server 180 may provide information to a certain client device 160 so that the particular client device 160 can generation a corresponding display. Server 180 may additionally monitor the host computer 110-2 to detect any changes, identify any commands, encode the identified commands, generate a bitstream including the encoded commands, and provide a bitstream to the client device 160 for processing. Further, server 180 may include translation framework 124, which is used to integrate the application-specific translation layers 118 into the different types of applications 112.
Referring now to
Once the user 150 signs out of application publishing service 122 or the user's session times out, application publishing service 122 of application server 120 may delete the user 150's host sessions on all host computers 110. Alternatively, the user 150's host sessions may remain running so that the user 150 can reconnect to them at a later time.
At a step 510, an application developer (or software vendor) uses translation framework 124 to create the translation layer 118 for a certain remote application 112. For example and referring to
At a step 512, the application developer (or software vendor) deploys the translation layer 118 atop the remote application 112. For example and referring again to
At a step 514, using client device 160, the user 150 accesses a certain remote application 112 that has the integrated translation layer 118. In one example and referring to
At a step 516, using touch-based input at client device 160, user 150 interacts with the application 112 and I/O commands are generated. In one example and referring again to
At a step 518, I/O commands are transmitted from client device 160 to application server 120 of hosting service 105. Continuing the example and referring again to
At a step 520, the I/O commands from client device 160 are intercepted by translation framework 124. Continuing the example and referring again to
At a step 522, translation framework 124 correlates the I/O commands from client device 160 to generic public APIs 126. Continuing the example and referring again to
At a step 524, translation layer 118 of the remote application 112 correlates the generic public APIs 126 to internal functions of the remote application 112. Continuing the example and referring again to
At a step 526, the remote application 112 performs actions based on the translated commands of translation layer 118. Continuing the example and referring again to
At a step 528, the action resulting from executing the translated commands is “remoted” to client device 160. Continuing the example and referring again to
At a step 530, the display of client device 160 is updated according to the translated commands. Continuing the example and referring again to
At a step 610, the I/O command generated at client device 160 and transmitted to application server 120 of hosting service 105. For example and referring to
At a step 612, the I/O command generated at client device 160 is intercepted by translation framework 124. Continuing the example and referring again to
At a step 614, translation framework 124 translates the I/O command generated at client device 160 to internal functions of the remote application 112. Continuing the example and referring again to
At a step 616, the remote application 112 performs actions based on the translated commands. Continuing the example and referring again to
The present disclosure may be implemented in an application that may be operable using a variety of devices. Non-transitory computer-readable storage media refer to any medium or media that participate in providing instructions to a central processing unit (CPU) for execution. Such media can take many forms, including, but not limited to, non-volatile and volatile media such as optical or magnetic disks and dynamic memory, respectively. Common forms of non-transitory computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-ROM disk, digital video disk (DVD), any other optical medium, RAM, PROM, EPROM, a FLASHEPROM, and any other memory chip or cartridge.
Various forms of transmission media may be involved in carrying one or more sequences of one or more instructions to a CPU for execution. A bus carries the data to system RAM, from which a CPU retrieves and executes the instructions. The instructions received by system RAM can optionally be stored on a fixed disk either before or after execution by a CPU. Various forms of storage may likewise be implemented as well as the necessary network interfaces and network topologies to implement the same.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. The descriptions are not intended to limit the scope of the disclosure to the particular forms set forth herein. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments. It should be understood that the above description is illustrative and not restrictive. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the disclosure as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art. The scope of the disclosure should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents.
Number | Name | Date | Kind |
---|---|---|---|
5831609 | London et al. | Nov 1998 | A |
5898419 | Liu | Apr 1999 | A |
5978834 | Simonoff et al. | Nov 1999 | A |
6288702 | Tachibana | Sep 2001 | B1 |
7051288 | Bennet et al. | May 2006 | B2 |
7188181 | Squier et al. | Mar 2007 | B1 |
7222158 | Wexelblat | May 2007 | B2 |
7249175 | Donaldson | Jul 2007 | B1 |
7353252 | Yang et al. | Apr 2008 | B1 |
7461134 | Ambrose | Dec 2008 | B2 |
7526792 | Ross | Apr 2009 | B2 |
7587459 | Wewalaarachchi et al. | Sep 2009 | B2 |
7647411 | Schiavone et al. | Jan 2010 | B1 |
7716302 | Maze et al. | May 2010 | B2 |
7739693 | Bernhard et al. | Jun 2010 | B2 |
7920528 | Karaoguz et al. | Apr 2011 | B2 |
8073855 | Nagoya | Dec 2011 | B2 |
8219807 | Danoyan et al. | Jul 2012 | B1 |
8281410 | Sobel et al. | Oct 2012 | B1 |
8427445 | Kennedy | Apr 2013 | B2 |
8438473 | Mak et al. | May 2013 | B2 |
8527978 | Sallam | Sep 2013 | B1 |
8688734 | Tidd | Apr 2014 | B1 |
8694507 | Meyerzon et al. | Apr 2014 | B2 |
8713658 | Tidd | Apr 2014 | B1 |
8738814 | Cronin | May 2014 | B1 |
8799777 | Lee | Aug 2014 | B1 |
8856907 | Tidd | Oct 2014 | B1 |
8863232 | Tidd | Oct 2014 | B1 |
8887132 | Hunter | Nov 2014 | B1 |
8950007 | Teal et al. | Feb 2015 | B1 |
8954887 | Tseng | Feb 2015 | B1 |
9165160 | Tidd | Oct 2015 | B1 |
20010023438 | Ishida | Sep 2001 | A1 |
20020091697 | Huang et al. | Jul 2002 | A1 |
20020158921 | Silverstein | Oct 2002 | A1 |
20030163448 | Kilemba et al. | Aug 2003 | A1 |
20040080771 | Mihira et al. | Apr 2004 | A1 |
20040190049 | Itoh | Sep 2004 | A1 |
20050044483 | Maze et al. | Feb 2005 | A1 |
20050093868 | Hinckley | May 2005 | A1 |
20050114760 | Arregui et al. | May 2005 | A1 |
20050149857 | Negishi et al. | Jul 2005 | A1 |
20050177730 | Davenport et al. | Aug 2005 | A1 |
20050198299 | Beck et al. | Sep 2005 | A1 |
20050210418 | Marvit et al. | Sep 2005 | A1 |
20060047780 | Patnude | Mar 2006 | A1 |
20060075224 | Tao | Apr 2006 | A1 |
20060150256 | Fanton et al. | Jul 2006 | A1 |
20060161846 | Van Leeuwen | Jul 2006 | A1 |
20060253558 | Acree et al. | Nov 2006 | A1 |
20070061264 | Yeung et al. | Mar 2007 | A1 |
20070078994 | Wilson et al. | Apr 2007 | A1 |
20070113187 | McMullen et al. | May 2007 | A1 |
20070121584 | Qiu et al. | May 2007 | A1 |
20070198950 | Dodge | Aug 2007 | A1 |
20070280459 | Yee et al. | Dec 2007 | A1 |
20070283446 | Yami et al. | Dec 2007 | A1 |
20080016504 | Cheng et al. | Jan 2008 | A1 |
20080071860 | Dal Canto et al. | Mar 2008 | A1 |
20080137131 | Cavill et al. | Jun 2008 | A1 |
20080167005 | Gilzean et al. | Jul 2008 | A1 |
20080209537 | Wong et al. | Aug 2008 | A1 |
20080270516 | Ragnet et al. | Oct 2008 | A1 |
20090013045 | Maes et al. | Jan 2009 | A1 |
20090013273 | Fuchs | Jan 2009 | A1 |
20090021387 | Hosono | Jan 2009 | A1 |
20090024626 | Takei | Jan 2009 | A1 |
20090027334 | Foulk et al. | Jan 2009 | A1 |
20090037976 | Teo et al. | Feb 2009 | A1 |
20090070404 | Mazzaferri | Mar 2009 | A1 |
20090083852 | Kuo et al. | Mar 2009 | A1 |
20090132509 | Nagoya | May 2009 | A1 |
20090177791 | Edelstein et al. | Jul 2009 | A1 |
20090180777 | Bernard et al. | Jul 2009 | A1 |
20090182501 | Fyke | Jul 2009 | A1 |
20090187857 | Tanaka | Jul 2009 | A1 |
20090204711 | Binyamin | Aug 2009 | A1 |
20090231285 | Duncan | Sep 2009 | A1 |
20090235347 | Syed et al. | Sep 2009 | A1 |
20090245176 | Balasubramanian et al. | Oct 2009 | A1 |
20090300129 | Golub | Dec 2009 | A1 |
20100020025 | Lemort et al. | Jan 2010 | A1 |
20100058431 | McCorkendale et al. | Mar 2010 | A1 |
20100138780 | Marano et al. | Jun 2010 | A1 |
20100153581 | Nagarajan et al. | Jun 2010 | A1 |
20100162163 | Wang et al. | Jun 2010 | A1 |
20100228963 | Kassab et al. | Sep 2010 | A1 |
20100269152 | Pahlavan et al. | Oct 2010 | A1 |
20100293499 | Young et al. | Nov 2010 | A1 |
20100295817 | Nicholson et al. | Nov 2010 | A1 |
20100321406 | Iwase | Dec 2010 | A1 |
20100325716 | Hong et al. | Dec 2010 | A1 |
20110010668 | Feldstein | Jan 2011 | A1 |
20110029772 | Fanton et al. | Feb 2011 | A1 |
20110113427 | Dotan | May 2011 | A1 |
20110137974 | Momchilov | Jun 2011 | A1 |
20110138295 | Momchilov et al. | Jun 2011 | A1 |
20110138314 | Mir et al. | Jun 2011 | A1 |
20110141031 | McCullough et al. | Jun 2011 | A1 |
20110154212 | Gharpure et al. | Jun 2011 | A1 |
20110191407 | Fu et al. | Aug 2011 | A1 |
20110197051 | Mullin et al. | Aug 2011 | A1 |
20110209064 | Jorgensen et al. | Aug 2011 | A1 |
20110258271 | Gaquin | Oct 2011 | A1 |
20110264463 | Kincaid | Oct 2011 | A1 |
20110270936 | Guthrie et al. | Nov 2011 | A1 |
20110277027 | Hayton et al. | Nov 2011 | A1 |
20110279829 | Chang et al. | Nov 2011 | A1 |
20110302495 | Pinto et al. | Dec 2011 | A1 |
20110307614 | Bernardi et al. | Dec 2011 | A1 |
20110314093 | Sheu et al. | Dec 2011 | A1 |
20120011472 | Ohkubo | Jan 2012 | A1 |
20120011578 | Hinton et al. | Jan 2012 | A1 |
20120023593 | Puder et al. | Jan 2012 | A1 |
20120054671 | Thompson et al. | Mar 2012 | A1 |
20120066695 | Berezansky et al. | Mar 2012 | A1 |
20120066762 | Todorovic | Mar 2012 | A1 |
20120084713 | Desai et al. | Apr 2012 | A1 |
20120092277 | Momchilov | Apr 2012 | A1 |
20120096389 | Flam et al. | Apr 2012 | A1 |
20120159570 | Reierson et al. | Jun 2012 | A1 |
20120173673 | Dietrich et al. | Jul 2012 | A1 |
20120185527 | Jaudon et al. | Jul 2012 | A1 |
20120185767 | Schlegel | Jul 2012 | A1 |
20120226742 | Momchilov et al. | Sep 2012 | A1 |
20120246645 | Iikura et al. | Sep 2012 | A1 |
20120297471 | Smithson | Nov 2012 | A1 |
20120304061 | Hoover | Nov 2012 | A1 |
20120304168 | Raj Seeniraj et al. | Nov 2012 | A1 |
20120311070 | BianRosa et al. | Dec 2012 | A1 |
20120324365 | Momchilov et al. | Dec 2012 | A1 |
20130060842 | Grossman | Mar 2013 | A1 |
20130097550 | Grossman et al. | Apr 2013 | A1 |
20130110828 | Meyerzon et al. | May 2013 | A1 |
20130198600 | Lockhart et al. | Aug 2013 | A1 |
20130219338 | VanBlon | Aug 2013 | A1 |
20130254675 | de Andrade et al. | Sep 2013 | A1 |
20130254761 | Reddy et al. | Sep 2013 | A1 |
20130290856 | Beveridge et al. | Oct 2013 | A1 |
20130305344 | Alicherry et al. | Nov 2013 | A1 |
20130318582 | McCann et al. | Nov 2013 | A1 |
20130326583 | Freihold et al. | Dec 2013 | A1 |
20140012574 | Pasupalak et al. | Jan 2014 | A1 |
20140026057 | Kimpton et al. | Jan 2014 | A1 |
20140074881 | Meyerzon et al. | Mar 2014 | A1 |
20140143846 | Tidd | May 2014 | A1 |
20140143847 | Tidd | May 2014 | A1 |
20150074199 | Lv | Mar 2015 | A1 |
Number | Date | Country |
---|---|---|
WO 2010135127 | Nov 2010 | WO |
Entry |
---|
U.S. Appl. No. 13/481,746 Office Action mailed Dec. 19, 2013. |
U.S. Appl. No. 13/481,751 Office Action dated Dec. 30, 2013. |
U.S. Appl. No. 13/367,239 Final Office Action dated Nov. 14, 2013. |
U.S. Appl. No. 13/481,742 Final Office Action dated Sep. 4, 2013. |
U.S. Appl. No. 13/481,752 Final Office Action dated Sep. 4, 2013. |
U.S. Appl. No. 13/753,474 Office Action dated Nov. 21, 2013. |
U.S. Appl. No. 13/367,228 Final Office Action dated Jul. 23, 2013. |
U.S. Appl. No. 13/367,228 Office Action dated Jan. 30, 2013. |
U.S. Appl. No. 13/367,239 Office Action dated Jun. 24, 2013. |
U.S. Appl. No. 13/481,742 Office Action dated May 9, 2013. |
U.S. Appl. No. 13/481,752 Office Action dated May 9, 2013. |
Park et al.; “Role-based access control on the web”; ACM transactions on information and system security; vol. 4, No. 1, Feb. 2001. p. 37-71, 35 pages. |
U.S. Appl. No. 13/753,474 Office Action mailed Jun. 11, 2014. |
U.S. Appl. No. 13/570,115 Final Office Action mailed Jun. 30, 2014. |
U.S. Appl. No. 13/481,746 Final Office Action mailed Mar. 26, 2014. |
U.S. Appl. No. 13/570,108 Office Action mailed May 13, 2014. |
U.S. Appl. No. 13/753,474 Final Office Action mailed Mar. 6, 2014. |
U.S. Appl. No. 13/570,115 Office Action mailed Feb. 11, 2014. |
U.S. Appl. No. 13/481,751 Final Office Action mailed Sep. 3, 2014. |
U.S. Appl. No. 13/753,474 Final Office Action mailed Oct. 6, 2014. |
U.S. Appl. No. 13/570,108 Office Action mailed Oct. 10, 2014. |
U.S. Appl. No. 13/668,097 Office Action mailed Sep. 12, 2014. |
U.S. Appl. No. 13/668,100 Office Action mailed Sep. 10, 2014. |
U.S. Appl. No. 13/753,475 Office Action mailed Apr. 24, 2015. |
U.S. Appl. No. 13/753,476 Office Action mailed Apr. 22, 2015. |
U.S. Appl. No. 13/570,115 Office Action mailed Jun. 19, 2015. |
U.S. Appl. No. 13/570,103 Office Action mailed Apr. 24, 2015. |
U.S. Appl. No. 13/668,097 Final Office Action mailed Jun. 16, 2015. |
U.S. Appl. No. 13/668,100 Final Office Action mailed Jun. 17, 2015. |
U.S. Appl. No. 13/481,743 Office Action mailed Jan. 14, 2015. |
U.S. Appl. No. 14/332,660 Office Action mailed Mar. 27, 2015. |
U.S. Appl. No. 13/481,745 Office Action mailed Feb. 10, 2015. |
U.S. Appl. No. 13/753,474 Office Action mailed Mar. 27, 2015. |
U.S. Appl. No. 13/570,108 Office Action mailed Apr. 1, 2015. |
U.S. Appl. No. 13/570,110 Office Action mailed Mar. 30, 2015. |
U.S. Appl. No. 13/570,111 Office Action mailed Apr. 1, 2015. |
U.S. Appl. No. 13/570,113 Office Action mailed Apr. 3, 2015. |
U.S. Appl. No. 13/753,477 Office Action mailed Jul. 29, 2015. |
U.S. Appl. No. 13/753,478 Office Action mailed Aug. 19, 2015. |
U.S. Appl. No. 13/753,479 Office Action mailed Aug. 12, 2015. |
U.S. Appl. No. 13/668,105 Office Action mailed Jul. 8, 2015. |
U.S. Appl. No. 13/481,746 Office Action mailed Sep. 15, 2015. |
U.S. Appl. No. 13/481,751 Office Action mailed Sep. 15, 2015. |
U.S. Appl. No. 14/332,660 Final Office Action mailed Nov. 3, 2015. |
U.S. Appl. No. 13/481,743 Office Action mailed Oct. 23, 2015. |
U.S. Appl. No. 13/570,108 Final Office Action mailed Oct. 29, 2015. |