摘要:
Techniques are described for facilitating sharing of executable software images between users in a configurable manner. In at least some situations, the executable software images are virtual machine images, and while executing may access and use remote network-accessible services (e.g., Web services). In addition, some or all shared executable software images may be made available in a fee-based manner by creator users, such that execution of such a fee-based software image by a software image execution service on behalf of a user other than the creator user is performed in exchange for fees from the other user as specified by the creator user. The creator user may further receive at least some of the specified fees paid by the other user, such as at least some of a difference between the specified fees and fees charged by the software image execution service for the execution.
摘要:
A secure first process uses a non-secure software object by hosting said non-secure software object in a separate second process, where the first process's address space is inaccessible to the second process. The first process communicates with the second process, preferably by means of a COM API that the second process exposes to the first process. The application that runs in the second process may expose APIs of the hosted non-secure object to the first process, and the first process may communicate with the non-secure object hosted in the second process through this API. In a preferred embodiment, the second process renders its output in a child window of the first process, so that the use of a second process to host non-secure software objects is transparent to a user of the first process.
摘要:
An enhanced telephony (ET) computer user interface that seamlessly integrates features of a personal computer (PC) and a telephone into a coherent user interface. The user is provided with a rich variety of functionality that leverages the fact that the PC has considerably more processing power and greater access to variety of data than the ordinary telephone. This processing power and data access is used to the user's advantage as the telephone's capabilities and functionality are greatly expanded. In general, the ET user interface includes a plurality of environments for the user to choose. These environments include a My Contacts environment, a communication preferences environment, and a Call History environment. Each of these environments contains certain available processes and features for controlling and managing telephones.
摘要:
A method and system for providing an electronic shopping service integrated into a software application, and for controlling the set of web sites that are reachable from within the shopping service. Each web site is represented by data which is signed by a private key, and the data together with this signature is delivered to a plurality of computing devices that provide the shopping service. Each of the computing devices has access to the public key that corresponds to the private key, and uses the public key to verify the signature. The computing device displays links to those web sites whose representative data validates against the signature.
摘要:
A secure first process uses a non-secure software object by hosting said non-secure software object in a separate second process, where the first process's address space is inaccessible to the second process. The first process communicates with the second process, preferably by means of a COM API that the second process exposes to the first process. The application that runs in the second process may expose APIs of the hosted non-secure object to the first process, and the first process may communicate with the non-secure object hosted in the second process through this API. In a preferred embodiment, the second process renders its output in a child window of the first process, so that the use of a second process to host non-secure software objects is transparent to a user of the first process.
摘要:
A method and system for generating and/or servicing requests for information requested across networks, such as the Internet, is disclosed. In some embodiments, supplemental request header information is included with HyperText Transfer Protocol (HTTP) requests for a web page. The supplemental request header information may identify one or more characteristics of an application for which the HTTP request was generated. In further embodiments, the Internet server servicing the HTTP request having such a supplemental request header may extract and use information from this header to select and/or modify the requested web page to best suit the requesting application's status and/or current characteristic.
摘要:
An enhanced computer telephony integration system that facilitates the interaction and integration of a private branch exchange (PBX) with a client computer on a computer network. An enhanced telephony (ET) server connects to the PBX and to all running instances of an ET client on a user's computers. The ET server acts as a proxy between the ET clients and the PBX. The ET clients register with the ET server for a certain telephone extension. The ET server then can forward telephone action requests (such as placing a telephone call) from the registered ET clients to the PBX servicing the telephone extension. Moreover, the ET server can relay telephone events (such as an incoming call) from the PBX to all registered clients. The ET server facilitates seamless integration of telephone and personal computer features to provide a rich user-controlled computer-telephone integration for a user.
摘要:
A digital license corresponds to encrypted digital content and includes a content key for decrypting same. The content key is encrypted and is decryptable by a decryption key available only to the first persona, the license thereby being tied to the first persona. The license is a first license and further includes referral information specifying a first location at which a second persona may obtain a second license for the content tied thereto. The second persona requests to render the content by way of the first license and the request is denied because the first license is not tied to the second persona. The referral information is obtained from the first license and employed to initiate contact with the specified first location and obtain the second license tied to the second persona.
摘要:
This invention describes a system and method for branding software deployed over computer networks. A user contacts the distributor's web site and initiates a download of the software. When the user visits the download website, the identity of the particular web site from which the download was initiated is transmitted to a branding server and captured on the user's computer, preferably in the form of a cookie. Subsequently, the user contacts the branding server and branding instructions are provided to the user's computer in accordance with the cookie. Branding may take the form of featuring the distributor's web site more prominently in an “integrated shopping service” or in a directory, or it may perform other alterations to the software. Branding is controlled by the software manufacturer's branding server, and can be modified at any time after the software is released.
摘要:
A system and process for tracking users' usage of content in computer systems. The tracking and accumulation of content usage information allows content providers to understand more about their user base. In a computer system having numerous users, it is advantageous to provide relevant customized content in addition to any specifically requested content. By storing and processing content usage information for users in a computer system, customized content may be provided to a user based on the user's previous usage of similar content. In operation, a computer system hosting various content creates a unique identifier, having data storage space, for a given user of the computer system. When a user sends a request for content to the computer system, a unique identifier is created and/or updated with information relevant to a user's content request. The identifier is passed back to the user with the specifically desired content. When processing subsequent requests for content, the computer system updates the unique identifier with most recent usage information. In addition, the computer system processes the unique identifier for previous usage information in an effort to provide customized relevant content, in addition to the specifically desired content.