| 12038882 |
File upload on demand |
Brian Jones, Kayla Lindsey Ngan |
2024-07-16 |
| 11392711 |
Authentication state-based permission model for a file storage system |
Jyotsana Rathore, Kevin Andrew Chan, Gabriela Kornelia Kaczka, Deepak Sreenivas Pemmaraju, Robert C. Turner +2 more |
2022-07-19 |
| 11151097 |
Dynamic schema inference and enforcement |
Ryan Edward Gregg, Federico Gomez Suarez, David Porter |
2021-10-19 |
| 11132457 |
Editing using secure temporary session-based permission model in a file storage system |
Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Peter Daniel Henderson, Gabriela Kornelia Kaczka |
2021-09-28 |
| 10693971 |
Identifying the best suitable application to open a file shared via a link |
Brandon Philip Zahl, Hui Huang, Jonathan A. Bockelman, Rafael Lopez-Uricoechea, Peter Eberhardy +2 more |
2020-06-23 |
| 10652227 |
Impersonating target account via account redirection |
Nicola Greene Alfeo, Kevin Thomas Brown, Harry Phillip Ferguson, IV, Jeffrey E. Steinbok |
2020-05-12 |
| 10521251 |
Hosting application experiences within storage service viewers |
Kirk R. Myhre, Can Comertoglu, Ryan Edward Gregg, Edgar A. Banguero, David Michon |
2019-12-31 |
| 10204113 |
Reverse replication to rollback corrupted files |
Marc E. Seinfeld, William Michael Zintel, Adrian Marinescu |
2019-02-12 |
| 10044821 |
Content activity feedback into a reputation system |
Chinna Babu Polinati |
2018-08-07 |
| 10015155 |
Resource-based action attribution |
Sarah Filman, Jonathan A. Bockelman, Arcadiy G. Kantor |
2018-07-03 |
| 9781142 |
Scanning files for inappropriate content during synchronization |
Marc E. Seinfeld, William Michael Zintel, Adrian Marinescu |
2017-10-03 |
| 9645947 |
Bundling file permissions for sharing files |
Mary Angelo, Brad Dodson, Emmanuel Miranda-Steiner, David A. Nichols |
2017-05-09 |
| 9600669 |
Resource-based action attribution |
Sarah Filman, Jonathan A. Bockelman, Arcadiy G. Kantor |
2017-03-21 |
| 9378370 |
Scanning files for inappropriate content during synchronization |
Marc E. Seinfeld, William Michael Zintel, Adrian Marinescu |
2016-06-28 |
| 9336380 |
Applying activity actions to frequent activities |
Youngha Joo, Steven Paul Miale, Federico Emmanuel Gomez Suarez |
2016-05-10 |
| 9229994 |
Server-side tracing of requests |
Patrick Moulhaud, Federico Emmanuel Gomez Suarez |
2016-01-05 |
| 9172707 |
Reducing cross-site scripting attacks by segregating HTTP resources by subdomain |
— |
2015-10-27 |
| 8966118 |
Unauthenticated redirection requests with protection |
Gary Voronel |
2015-02-24 |
| 8868439 |
Content activity feedback into a reputation system |
Chinna Babu Polinati |
2014-10-21 |
| 8689280 |
DNS-based content routing |
Bradley A. Cleaver |
2014-04-01 |
| 8676849 |
Storing lossless transforms of data |
Hasrat Godil |
2014-03-18 |
| 8612391 |
Creating and utilizing network restore points |
David Edward William Mercer, William D. Hay |
2013-12-17 |
| 8117164 |
Creating and utilizing network restore points |
David Edward William Mercer, William D. Hay |
2012-02-14 |