US20170154121A1 - Selectively deleting items that are not of interest to a user - Google Patents

Selectively deleting items that are not of interest to a user Download PDF

Info

Publication number
US20170154121A1
US20170154121A1 US15/430,324 US201715430324A US2017154121A1 US 20170154121 A1 US20170154121 A1 US 20170154121A1 US 201715430324 A US201715430324 A US 201715430324A US 2017154121 A1 US2017154121 A1 US 2017154121A1
Authority
US
United States
Prior art keywords
items
user
delete
interest
browser
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/430,324
Inventor
Andrew Zeigler
Jennifer C. Trahan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing LLC filed Critical Microsoft Technology Licensing LLC
Priority to US15/430,324 priority Critical patent/US20170154121A1/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: TRAHAN, JENNIFER C., ZEIGLER, ANDREW
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Publication of US20170154121A1 publication Critical patent/US20170154121A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G06F17/30902
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F17/30876
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Definitions

  • a user When a user browses on the Web, their Web browser typically writes data to a cache or history file that describes aspects of a user's browsing activities.
  • a user's history file can include a list of websites to which a user has browsed, as well as cookies associated with those websites and other data.
  • a user will opt to delete these files using a feature, e.g. “Delete Browsing History”, that is provided by their Web browser.
  • the delete feature offered by most if not all browsers tends to be indiscriminate in what it deletes. Specifically, such features typically delete all of a user's collected data when such feature is selected by the user.
  • Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them.
  • a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest.
  • items that appear on a user-specified list are not deleted when a delete operation is performed relative to items to which a user browses.
  • FIG. 1 illustrates an operating environment in which various principles described herein can be employed in accordance with one or more embodiments.
  • FIG. 2 illustrates a flow diagram that describes steps in a method in accordance with one or more embodiments.
  • FIG. 3 illustrates an example Web browser in accordance with one or more embodiments.
  • FIG. 4 illustrates a flow diagram that describes steps in a method in accordance with one or more embodiments.
  • FIG. 5 illustrates an example user interface in accordance with one or more embodiments.
  • FIG. 6 illustrates an example system that can be used to implement one or more embodiments.
  • Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them.
  • a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest.
  • items that appear on a user-specified list are not deleted when a delete operation is performed relative to items to which a user browses.
  • a user interface is provided and enables a user to select classes of items that are to be retained when delete operations are performed.
  • Items can include, by way of example and not limitation, URLs, cookies, and/or any other information that can be collected and saved which describe, or are in some way associated with a user's browsing activities.
  • a section entitled “Operating Environment” is provided and describes one environment in which one or more embodiments can be employed. Following this, a section entitled “Items in Which a User Has an Implied Interest” is provided and describes various items in which a user can have an implied interest. Next, a section entitled “Retaining Items in Which a User Has an Implied Interest” is provided and describes an example embodiment in which items can be selectively retained in view of a delete operation. Following this, a section entitled “Selectively Deleting Items in a User's Browsing History” is provided and describes an embodiment in which items in a user's browsing history can be selectively deleted. Next, a section entitled “Example User Interface” is provided and describes an example user interface in accordance with one or more embodiments. Finally, a section entitled “Example System” is provided and describes an example system in which one or more embodiments can be implemented.
  • FIG. 1 illustrates an operating environment in accordance with one or more embodiments, generally at 100 .
  • Environment 100 includes a computing device 102 having one or more processors 104 , one or more computer-readable media 106 and one or more applications 108 that reside on the computer-readable media and which are executable by the processor(s).
  • the computer-readable media can include, by way of example and not limitation, all forms of volatile and non-volatile memory and/or storage media that are typically associated with a computing device. Such media can include ROM, RAM, flash memory, hard disk, removable media and the like.
  • FIG. 6 One specific example of a computing device is shown and described below in FIG. 6 .
  • computing device 102 includes a software application in the form of a Web browser 110 .
  • Web browser 110 is configured to enable a user to use their browser to selectively delete items that are not of interest to them.
  • a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest.
  • the Web browser enables a user to define a user-specified list.
  • Web browser 110 includes or otherwise provides a user with access to an associated delete module 110 a and a user interface module 110 b. Logic implemented by the delete module is described in more detail below.
  • an example user interface provided by user interface module 110 b is shown and described below in connection with FIG. 5 .
  • the functionality provided by the delete module and/or the user interface module associated with the Web browser can be provided as a native part of a Web browser, a Web browser extension or “plug-in”, or as code modules that are separate from but work in association with the Web browser.
  • environment 100 includes a network 112 , such as the Internet, and one or more Web sites 114 from and to which content can be received and sent.
  • a network 112 such as the Internet
  • Web sites 114 from and to which content can be received and sent.
  • Computing device 102 can be embodied as any suitable computing device such as, by way of example and not limitation, a desktop computer, a portable computer, a handheld computer such as a personal digital assistants (PDA), cell phone, and the like.
  • a desktop computer such as a desktop computer, a portable computer, a handheld computer such as a personal digital assistants (PDA), cell phone, and the like.
  • PDA personal digital assistants
  • Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them.
  • a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest.
  • a Web browser can imply a user's interest in a particular item based upon some action that a user has taken with respect to the particular item.
  • a user's implied interest can be ascertained based on any suitable action that a user can take. For example, if a user has most recently browsed to an item, then the item may be of particular interest to the user. Alternately or additionally, if a user frequently browses to particular items on the Web, these items may be of particular interest to a user. Alternately or additionally, if a user has proactively added a particular item to their favorites list or has otherwise bookmarked a particular item, this item is of particular interest to a user.
  • the Web browser can take steps to ensure that those items in which there is an implied user interest are not deleted.
  • FIG. 2 is a flow diagram that describes steps in a method in accordance with one or more embodiments.
  • the method can be implemented in connection with any suitable hardware, software, firmware or combination thereof
  • aspects of the method can be implemented by an application, such as a suitably configured Web browser such as the one illustrated and described in FIG. 1 .
  • Step 200 receives input to conduct a delete operation.
  • This step can be performed in any suitable way.
  • a user can indicate via a suitably-configured user interface that they wish to delete a class of items.
  • a user's Web browser may be configured to automatically, periodically, delete items or classes of items.
  • Step 202 ascertains whether a user has an implied interest in an item.
  • a user can have an implied interest in a particular item for any number of reasons examples of which are provided above. If, at 202 , a user does not have an implied interest in a particular item, step 204 deletes the item. If, on the other hand, a user has an implied interest in a particular item, step 206 retains the item.
  • the item can remain available for use by the user's Web browser.
  • Such can include, by way of example and not limitation, retaining the item in an appropriate store (whether local or remote) such that the item is available for use by the Web browser.
  • a user can selectively delete items that are not of interest to them and retain items that are of interest to them.
  • FIG. 3 illustrates a system in accordance with one or more embodiments.
  • a Web browser 110 includes or otherwise makes use of an associated delete module 110 a and a user interface module 110 b.
  • the delete module is utilized by the Web browser to selectively delete items as described above and below.
  • the user interface module is used to provide a mechanism by which a user can indicate their preference to selectively delete various items as described above and below.
  • a user's browsing history can be manifest by items that are stored in one or more different stores including, by way of example and not limitation, a browsing history store 300 , a cookie store 302 , and/or a temporary Internet files store 304 . Although these stores are illustrated as separate stores, such stores can reside in the form of one logical store that stores associated items.
  • the delete module 110 a maintains or otherwise has access to a so-called allow list 306 which maintains a list of items in which a user has an implied interest.
  • a user can have an implied interest in items such as those items to which a user has most recently browsed, has most frequently browsed, and/or has otherwise indicated as being important to the user.
  • a user can indicate an item's importance by, for example, adding the item to a user-specified list, such as a favorites list or a bookmarked list.
  • Other lists can, of course, be used to reflect a user's interest.
  • a user When a user wishes to delete a class of items, the user can effect a delete operation by way of invoking a user interface provided by user interface module 110 b .
  • a delete operation When a delete operation is invoked, whether through a specific user action or otherwise, a class of items subject to the delete operation can be compared to a list of items appearing on the allow list 306 . If an item appears on the allow list 306 , then the item is not deleted during the delete operation. If, on the other hand, the item does not appear on the allow list 306 , the item is deleted. So, for example, a user's browsing history may include a number of URLs to which a user has browsed.
  • URLs appearing on the allow list 306 are not deleted.
  • cookies appearing on allow list 306 are not deleted.
  • temporary Internet files temporary Internet files that appear on the allow list 306 are not deleted.
  • FIG. 4 is a flow diagram that describes steps in a method in accordance with one or more embodiments.
  • the method can be implemented in connection with any suitable hardware, software, firmware or combination thereof.
  • aspects of the method can be implemented by an application, such as a suitably configured Web browser.
  • Step 400 receives input to conduct a delete operation on a user's browsing history.
  • This step can be performed in any suitable way.
  • the user can, through a suitably-configured user interface, indicate that a delete operation is to be performed relative to their browsing history.
  • Step 402 compares items in the user's browsing history to items that appear on an allow list. Examples of items that appear on an allow list and how such items can come to reside on the allow list are given above.
  • the comparison that is performed at step 402 can be performed in any suitable way. For example, one comparison can compare portions of an URL's domain or an entire domain. Specifically, a top-level domain and one or more sub-domains can be used in the comparison.
  • the top-level domain “com” in combination with the sub-domain “Yahoo” can be used as a basis for the comparison.
  • Other comparisons can, of course, be used without departing from the spirit and scope of the claimed subject matter.
  • step 406 deletes the item. If, on the other hand, the item does appear on the allow list, step 408 retains the item.
  • FIG. 5 illustrates an example user interface in accordance with one or more embodiments generally at 500 .
  • User interface 500 can be provided in any suitable way.
  • user interface 500 is provided via a user interface module such as that described above in FIG. 1 .
  • user interface 500 comprises a “Delete Browsing History” window that provides a number of different classes of items that can be deleted by a user.
  • classes of items that can be deleted include, by way of example and not limitation, temporary Internet files, cookies, history, form data, and passwords.
  • a user interface instrumentality 502 is provided to enable a user to selectively define items that are not to be deleted when a delete operation is conducted.
  • a user can opt to keep data from their favorite websites by simply checking the check box. Accordingly, when a user opts to delete their browsing history, if the check box of instrumentality 502 has been checked, those items appearing in an associated allow list are not deleted. In this instance, the items appearing in the associated allow list would include those items that appear as a user's favorite websites.
  • FIG. 6 illustrates an example computing device 600 that can implement the various embodiments described above.
  • Computing device 600 can be, for example, computing device 102 of FIG. 1 or any other suitable computing device.
  • Computing device 600 includes one or more processors or processing units 602 , one or more memory and/or storage components 604 , one or more input/output (I/O) devices 606 , and a bus 608 that allows the various components and devices to communicate with one another.
  • Bus 608 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures.
  • Bus 608 can include wired and/or wireless buses.
  • Memory/storage component 604 represents one or more computer storage media.
  • Component 604 can include volatile media (such as random access memory (RAM)) and/or nonvolatile media (such as read only memory (ROM), Flash memory, optical disks, magnetic disks, and so forth).
  • Component 604 can include fixed media (e.g., RAM, ROM, a fixed hard drive, etc.) as well as removable media (e.g., a Flash memory drive, a removable hard drive, an optical disk, and so forth).
  • One or more input/output devices 606 allow a user to enter commands and information to computing device 600 , and also allow information to be presented to the user and/or other components or devices.
  • input devices include a keyboard, a cursor control device (e.g., a mouse), a microphone, a scanner, and so forth.
  • output devices include a display device (e.g., a monitor or projector), speakers, a printer, a network card, and so forth.
  • Computer readable media can be any available medium or media that can be accessed by a computing device.
  • computer readable media may comprise “computer storage media”.
  • Computer storage media include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data.
  • Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer.
  • Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them.
  • a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest.
  • items that appear on a user-specified list are not deleted when a delete operation is performed relative to items to which a user browses.
  • a user interface is provided and enables a user to select classes of items that are to be retained when delete operations are performed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them. In at least some embodiments, a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest. In one or more embodiments, items that appear on a user-specified list, such as a favorites or a bookmarked list, are not deleted when a delete operation is performed relative to items to which a user browses. In at least some embodiments, a user interface is provided and enables a user to select classes of items that are to be retained when delete operations are performed.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 11/936,940 filed on Nov. 8, 2007, entitled “SELECTIVELY DELETING ITEMS THAT ARE NOT OF INTEREST TO A USER,” which issued as U.S. patent Ser. No. ______ on ______, and which application is expressly incorporated herein by reference in its entirety.
  • BACKGROUND
  • When a user browses on the Web, their Web browser typically writes data to a cache or history file that describes aspects of a user's browsing activities. For example, a user's history file can include a list of websites to which a user has browsed, as well as cookies associated with those websites and other data. Often times, and typically for privacy and/or performance reasons, a user will opt to delete these files using a feature, e.g. “Delete Browsing History”, that is provided by their Web browser. The delete feature offered by most if not all browsers tends to be indiscriminate in what it deletes. Specifically, such features typically delete all of a user's collected data when such feature is selected by the user.
  • BRIEF SUMMARY
  • This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
  • Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them. In at least some embodiments, a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest.
  • In one or more embodiments, items that appear on a user-specified list, such as a favorites or a bookmarked list, are not deleted when a delete operation is performed relative to items to which a user browses.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The same numbers are used throughout the drawings to reference like features.
  • FIG. 1 illustrates an operating environment in which various principles described herein can be employed in accordance with one or more embodiments.
  • FIG. 2 illustrates a flow diagram that describes steps in a method in accordance with one or more embodiments.
  • FIG. 3 illustrates an example Web browser in accordance with one or more embodiments.
  • FIG. 4 illustrates a flow diagram that describes steps in a method in accordance with one or more embodiments.
  • FIG. 5 illustrates an example user interface in accordance with one or more embodiments.
  • FIG. 6 illustrates an example system that can be used to implement one or more embodiments.
  • DETAILED DESCRIPTION Overview
  • Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them. In at least some embodiments, a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest.
  • In one or more embodiments, items that appear on a user-specified list, such as a favorites or a bookmarked list, are not deleted when a delete operation is performed relative to items to which a user browses. In at least some embodiments, a user interface is provided and enables a user to select classes of items that are to be retained when delete operations are performed.
  • In the discussion above and below, the notion of an “item” is used to describe information that may be of interest to a user. Items can include, by way of example and not limitation, URLs, cookies, and/or any other information that can be collected and saved which describe, or are in some way associated with a user's browsing activities.
  • In the discussion that follows, a section entitled “Operating Environment” is provided and describes one environment in which one or more embodiments can be employed. Following this, a section entitled “Items in Which a User Has an Implied Interest” is provided and describes various items in which a user can have an implied interest. Next, a section entitled “Retaining Items in Which a User Has an Implied Interest” is provided and describes an example embodiment in which items can be selectively retained in view of a delete operation. Following this, a section entitled “Selectively Deleting Items in a User's Browsing History” is provided and describes an embodiment in which items in a user's browsing history can be selectively deleted. Next, a section entitled “Example User Interface” is provided and describes an example user interface in accordance with one or more embodiments. Finally, a section entitled “Example System” is provided and describes an example system in which one or more embodiments can be implemented.
  • Operating Environment
  • FIG. 1 illustrates an operating environment in accordance with one or more embodiments, generally at 100. Environment 100 includes a computing device 102 having one or more processors 104, one or more computer-readable media 106 and one or more applications 108 that reside on the computer-readable media and which are executable by the processor(s). The computer-readable media can include, by way of example and not limitation, all forms of volatile and non-volatile memory and/or storage media that are typically associated with a computing device. Such media can include ROM, RAM, flash memory, hard disk, removable media and the like. One specific example of a computing device is shown and described below in FIG. 6.
  • In addition, computing device 102 includes a software application in the form of a Web browser 110. Any suitable Web browser can be used examples of which are available from the assignee of this document and others. In at least some embodiments, Web browser 110 is configured to enable a user to use their browser to selectively delete items that are not of interest to them. In at least some embodiments, a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest. Further, in at least some embodiments, the Web browser enables a user to define a user-specified list. Items that appear on a user-specified list, such as a favorites or a bookmarked list, are not deleted when a delete operation is performed relative to items to which a user browses. In at least some embodiments, a user interface is provided and enables a user to select classes of items that are to be retained when delete operations are performed. To this end, Web browser 110 includes or otherwise provides a user with access to an associated delete module 110 a and a user interface module 110 b. Logic implemented by the delete module is described in more detail below. In addition, an example user interface provided by user interface module 110 b is shown and described below in connection with FIG. 5. It is to be appreciated and understood that the functionality provided by the delete module and/or the user interface module associated with the Web browser can be provided as a native part of a Web browser, a Web browser extension or “plug-in”, or as code modules that are separate from but work in association with the Web browser.
  • In addition, environment 100 includes a network 112, such as the Internet, and one or more Web sites 114 from and to which content can be received and sent.
  • Computing device 102 can be embodied as any suitable computing device such as, by way of example and not limitation, a desktop computer, a portable computer, a handheld computer such as a personal digital assistants (PDA), cell phone, and the like.
  • Items in Which a User Has an Implied Interest
  • Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them. In at least some embodiments, a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest.
  • In one or more embodiments, a Web browser can imply a user's interest in a particular item based upon some action that a user has taken with respect to the particular item. A user's implied interest can be ascertained based on any suitable action that a user can take. For example, if a user has most recently browsed to an item, then the item may be of particular interest to the user. Alternately or additionally, if a user frequently browses to particular items on the Web, these items may be of particular interest to a user. Alternately or additionally, if a user has proactively added a particular item to their favorites list or has otherwise bookmarked a particular item, this item is of particular interest to a user.
  • In these as well as other instances, when a user conducts a delete operation, such as selecting to delete a group of items to which a user has browsed, the Web browser can take steps to ensure that those items in which there is an implied user interest are not deleted.
  • Retaining Items in Which a User Has an Implied Interest
  • FIG. 2 is a flow diagram that describes steps in a method in accordance with one or more embodiments. The method can be implemented in connection with any suitable hardware, software, firmware or combination thereof In at least some embodiments, aspects of the method can be implemented by an application, such as a suitably configured Web browser such as the one illustrated and described in FIG. 1.
  • Step 200 receives input to conduct a delete operation. This step can be performed in any suitable way. For example, in at least some embodiments, a user can indicate via a suitably-configured user interface that they wish to delete a class of items. Alternately or additionally, a user's Web browser may be configured to automatically, periodically, delete items or classes of items. Step 202 ascertains whether a user has an implied interest in an item. A user can have an implied interest in a particular item for any number of reasons examples of which are provided above. If, at 202, a user does not have an implied interest in a particular item, step 204 deletes the item. If, on the other hand, a user has an implied interest in a particular item, step 206 retains the item. By retaining the item, the item can remain available for use by the user's Web browser. Such can include, by way of example and not limitation, retaining the item in an appropriate store (whether local or remote) such that the item is available for use by the Web browser.
  • Accordingly, in this manner, a user can selectively delete items that are not of interest to them and retain items that are of interest to them.
  • Having described the notion of an implied interest and how that implied interest can be used, consider now a specific example embodiment in which items can be selectively deleted from a user's browsing history.
  • Selectively Deleting Items in a User's Browsing History
  • FIG. 3 illustrates a system in accordance with one or more embodiments. In this example, a Web browser 110 includes or otherwise makes use of an associated delete module 110 a and a user interface module 110 b. The delete module is utilized by the Web browser to selectively delete items as described above and below. The user interface module is used to provide a mechanism by which a user can indicate their preference to selectively delete various items as described above and below.
  • In this example, a user's browsing history can be manifest by items that are stored in one or more different stores including, by way of example and not limitation, a browsing history store 300, a cookie store 302, and/or a temporary Internet files store 304. Although these stores are illustrated as separate stores, such stores can reside in the form of one logical store that stores associated items.
  • Further, the delete module 110 a maintains or otherwise has access to a so-called allow list 306 which maintains a list of items in which a user has an implied interest. A user can have an implied interest in items such as those items to which a user has most recently browsed, has most frequently browsed, and/or has otherwise indicated as being important to the user. A user can indicate an item's importance by, for example, adding the item to a user-specified list, such as a favorites list or a bookmarked list. Other lists can, of course, be used to reflect a user's interest.
  • When a user wishes to delete a class of items, the user can effect a delete operation by way of invoking a user interface provided by user interface module 110 b. An example of one user interface that can be used is provided just below. When a delete operation is invoked, whether through a specific user action or otherwise, a class of items subject to the delete operation can be compared to a list of items appearing on the allow list 306. If an item appears on the allow list 306, then the item is not deleted during the delete operation. If, on the other hand, the item does not appear on the allow list 306, the item is deleted. So, for example, a user's browsing history may include a number of URLs to which a user has browsed. When the user opts to delete their browsing history, URLs appearing on the allow list 306 are not deleted. Alternately or additionally, when a user opts to delete their cookies, cookies appearing on allow list 306 are not deleted. Similarly, if a user opts to delete their temporary Internet files, temporary Internet files that appear on the allow list 306 are not deleted.
  • In this way, items that are of interest to a user, whether implied through a particular user action or proactively specified by the user are retained for future use by the Web browser.
  • FIG. 4 is a flow diagram that describes steps in a method in accordance with one or more embodiments. The method can be implemented in connection with any suitable hardware, software, firmware or combination thereof. In at least some embodiments, aspects of the method can be implemented by an application, such as a suitably configured Web browser.
  • Step 400 receives input to conduct a delete operation on a user's browsing history. This step can be performed in any suitable way. For example, the user can, through a suitably-configured user interface, indicate that a delete operation is to be performed relative to their browsing history. Step 402 compares items in the user's browsing history to items that appear on an allow list. Examples of items that appear on an allow list and how such items can come to reside on the allow list are given above. The comparison that is performed at step 402 can be performed in any suitable way. For example, one comparison can compare portions of an URL's domain or an entire domain. Specifically, a top-level domain and one or more sub-domains can be used in the comparison. For example, in the URL “mail.Yahoo.com”, the top-level domain “com” in combination with the sub-domain “Yahoo” can be used as a basis for the comparison. Other comparisons can, of course, be used without departing from the spirit and scope of the claimed subject matter.
  • If, at step 404, an item does not appear on the allow list, step 406 deletes the item. If, on the other hand, the item does appear on the allow list, step 408 retains the item.
  • Having described various embodiments in which items can be selectively deleted, consider now an example user interface that can be utilized to implement one or more of the above-described embodiments.
  • Example User Interface
  • FIG. 5 illustrates an example user interface in accordance with one or more embodiments generally at 500. User interface 500 can be provided in any suitable way. In at least some embodiments, user interface 500 is provided via a user interface module such as that described above in FIG. 1.
  • In the illustrative example, user interface 500 comprises a “Delete Browsing History” window that provides a number of different classes of items that can be deleted by a user. For example, in this specific instance, classes of items that can be deleted include, by way of example and not limitation, temporary Internet files, cookies, history, form data, and passwords. In this example, a user interface instrumentality 502 is provided to enable a user to selectively define items that are not to be deleted when a delete operation is conducted. In this particular example, a user can opt to keep data from their favorite websites by simply checking the check box. Accordingly, when a user opts to delete their browsing history, if the check box of instrumentality 502 has been checked, those items appearing in an associated allow list are not deleted. In this instance, the items appearing in the associated allow list would include those items that appear as a user's favorite websites.
  • Having described an example user interface that can be used to selectively delete various items, consider now an example system that can be utilized to implement one or more of the above-described embodiments.
  • Example System
  • FIG. 6 illustrates an example computing device 600 that can implement the various embodiments described above. Computing device 600 can be, for example, computing device 102 of FIG. 1 or any other suitable computing device.
  • Computing device 600 includes one or more processors or processing units 602, one or more memory and/or storage components 604, one or more input/output (I/O) devices 606, and a bus 608 that allows the various components and devices to communicate with one another. Bus 608 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. Bus 608 can include wired and/or wireless buses.
  • Memory/storage component 604 represents one or more computer storage media. Component 604 can include volatile media (such as random access memory (RAM)) and/or nonvolatile media (such as read only memory (ROM), Flash memory, optical disks, magnetic disks, and so forth). Component 604 can include fixed media (e.g., RAM, ROM, a fixed hard drive, etc.) as well as removable media (e.g., a Flash memory drive, a removable hard drive, an optical disk, and so forth).
  • One or more input/output devices 606 allow a user to enter commands and information to computing device 600, and also allow information to be presented to the user and/or other components or devices. Examples of input devices include a keyboard, a cursor control device (e.g., a mouse), a microphone, a scanner, and so forth. Examples of output devices include a display device (e.g., a monitor or projector), speakers, a printer, a network card, and so forth.
  • Various techniques may be described herein in the general context of software or program modules. Generally, software includes routines, programs, objects, components, data structures, and so forth that perform particular tasks or implement particular abstract data types. An implementation of these modules and techniques may be stored on or transmitted across some form of computer readable media. Computer readable media can be any available medium or media that can be accessed by a computing device. By way of example, and not limitation, computer readable media may comprise “computer storage media”.
  • “Computer storage media” include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Computer storage media include, but are not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer.
  • Conclusion
  • Various embodiments enable a user to use their browser to selectively delete items that are not of interest to them. In at least some embodiments, a user's interest in a particular item is implied by some action a user has taken with respect to the particular item. Responsive to this implied interest, various delete operations that can be performed relative to the items are performed so as to exclude items in which a user has some implied interest.
  • In one or more embodiments, items that appear on a user-specified list, such as a favorites or a bookmarked list, are not deleted when a delete operation is performed relative to items to which a user browses. In at least some embodiments, a user interface is provided and enables a user to select classes of items that are to be retained when delete operations are performed.
  • Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (20)

What is claimed is:
1. A system comprising:
one or more processors;
one or more computer-readable storage media embodying software instructions which, when executed, implement a method comprising:
detecting a plurality of items corresponding to content that is browsed to with a browser by the system;
identifying a first set of one or more of the plurality of items to be retained even when a delete operation is triggered for at least a second set of one or more of the plurality of items, the first set of the one or more of the plurality of items to be retained being based on an implied interest of the one or more items absent additional user actions with the first set of the one or more of the plurality of items;
detecting input for deleting the second set of one or more plurality of items; and
selectively deleting the second set of the one or more plurality of items without deleting the first set of the one or more plurality of times based at least in part on determining the implied interest in the one or more items.
2. The system of claim 1, wherein the first set of the one or more plurality of items include cookies in a cookie store.
3. The system of claim 2, wherein the second set of the one or more plurality of items include additional cookies in the cookie store.
4. The system of claim 1, wherein the first and second set of the one or more plurality of items include browsing history items.
5. The system of claim 1, wherein the implied interest is based on a browsing history in which the browser is used to browse to content associated with the first set of one or more of the plurality of items.
6. The system of claim 1, wherein the browser is configured to periodically delete a class of items that includes the second set of one or more of the plurality of items.
7. The system of claim 1, wherein the browser is configured to automatically delete a class of items that includes the second set of one or more of the plurality of items.
8. A method implemented by a computing system having one or more processors and one or more computer-readable storage media embodying software instructions which, when executed by the one or more processors, implement the method, the method comprising:
detecting a plurality of items corresponding to content that is browsed to with a browser by the system;
identifying a first set of one or more of the plurality of items to be retained even when a delete operation is triggered for at least a second set of one or more of the plurality of items, the first set of the one or more of the plurality of items to be retained being based on an implied interest of the one or more items absent additional user actions with the first set of the one or more of the plurality of items;
detecting input for deleting the second set of one or more plurality of items; and
selectively deleting the second set of the one or more plurality of items without deleting the first set of the one or more plurality of times based at least in part on determining the implied interest in the one or more items.
9. The method of claim 8, wherein the first set of the one or more plurality of items include cookies in a cookie store.
10. The method of claim 8, wherein the second set of the one or more plurality of items include additional cookies in the cookie store.
11. The method of claim 8, wherein the first and second set of the one or more plurality of items include browsing history items.
12. The method of claim 8, wherein the implied interest is based on a browsing history in which the browser is used to browse to content associated with the first set of one or more of the plurality of items.
13. The method of claim 8, wherein the browser is configured to periodically delete a class of items that includes the second set of one or more of the plurality of items.
14. The method of claim 8, wherein the browser is configured to automatically delete a class of items that includes the second set of one or more of the plurality of items.
15. A computer program product comprising one or more computer-readable storage media embodying software instructions which are executable by one or more processors of a computing system to implement a method that includes the computing system performing the following:
the computing system detecting a plurality of items corresponding to content that is browsed to with a browser by the system;
the computing system identifying a first set of one or more of the plurality of items to be retained even when a delete operation is triggered for at least a second set of one or more of the plurality of items, the first set of the one or more of the plurality of items to be retained being based on an implied interest of the one or more items absent additional user actions with the first set of the one or more of the plurality of items;
the computing system detecting input for deleting the second set of one or more plurality of items; and
the computing system selectively deleting the second set of the one or more plurality of items without deleting the first set of the one or more plurality of times based at least in part on determining the implied interest in the one or more items.
16. The computer program product of claim 15, wherein the first and second sets of the one or more plurality of items include cookies in a cookie store.
17. The computer program product of claim 15, wherein the first and second set of the one or more plurality of items include browsing history items.
18. The computer program product of claim 15, wherein the implied interest is based on a browsing history in which the browser is used to browse to content associated with the first set of one or more of the plurality of items.
19. The computer program product of claim 15, wherein the browser is configured to periodically delete a class of items that includes the second set of one or more of the plurality of items.
20. The computer program product of claim 15, wherein the browser is configured to automatically delete a class of items that includes the second set of one or more of the plurality of items.
US15/430,324 2007-11-08 2017-02-10 Selectively deleting items that are not of interest to a user Abandoned US20170154121A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/430,324 US20170154121A1 (en) 2007-11-08 2017-02-10 Selectively deleting items that are not of interest to a user

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/936,940 US9594844B2 (en) 2007-11-08 2007-11-08 Selectively deleting items that are not of interest to a user
US15/430,324 US20170154121A1 (en) 2007-11-08 2017-02-10 Selectively deleting items that are not of interest to a user

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/936,940 Continuation US9594844B2 (en) 2007-11-08 2007-11-08 Selectively deleting items that are not of interest to a user

Publications (1)

Publication Number Publication Date
US20170154121A1 true US20170154121A1 (en) 2017-06-01

Family

ID=40624912

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/936,940 Active 2031-11-26 US9594844B2 (en) 2007-11-08 2007-11-08 Selectively deleting items that are not of interest to a user
US15/430,324 Abandoned US20170154121A1 (en) 2007-11-08 2017-02-10 Selectively deleting items that are not of interest to a user

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/936,940 Active 2031-11-26 US9594844B2 (en) 2007-11-08 2007-11-08 Selectively deleting items that are not of interest to a user

Country Status (1)

Country Link
US (2) US9594844B2 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8244740B2 (en) * 2008-11-26 2012-08-14 Microsoft Corporation Providing suggested sites associated with target sites
US9055113B2 (en) * 2010-08-20 2015-06-09 Arbor Networks, Inc. Method and system for monitoring flows in network traffic
JP5597613B2 (en) * 2011-09-30 2014-10-01 楽天株式会社 Information processing apparatus, information processing method, information processing program, and recording medium
US20160070446A1 (en) 2014-09-04 2016-03-10 Home Box Office, Inc. Data-driven navigation and navigation routing
CN104298790A (en) * 2014-11-11 2015-01-21 北京奇虎科技有限公司 Browser accelerating method and browser device with accelerator
US10229431B1 (en) * 2015-05-28 2019-03-12 Sprint Communications Company L.P. Explicit user history input
US10855764B2 (en) * 2017-02-16 2020-12-01 Konica Minolta Healthcare Americas, Inc. Multi-location exchange of medical images and data
CN111222073A (en) * 2020-01-07 2020-06-02 常国枫 Method and system for deleting content in limited time and reserving conditions generated by user

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194222A1 (en) * 2001-06-18 2002-12-19 International Business Machines Corporation Method and apparatus for disabling histories in a browser
US20030018665A1 (en) * 2001-07-11 2003-01-23 International Business Machines Corporation Method and system for dynamic web page breadcrumbing using javascript
US6638314B1 (en) * 1998-06-26 2003-10-28 Microsoft Corporation Method of web crawling utilizing crawl numbers
US20040122873A1 (en) * 2002-12-20 2004-06-24 International Business Machines Corporation Free space management
US20040128346A1 (en) * 2001-07-16 2004-07-01 Shmuel Melamed Bandwidth savings and qos improvement for www sites by catching static and dynamic content on a distributed network of caches
US20050144157A1 (en) * 2003-12-29 2005-06-30 Moody Paul B. System and method for searching and retrieving related messages
US6959420B1 (en) * 2001-11-30 2005-10-25 Microsoft Corporation Method and system for protecting internet users' privacy by evaluating web site platform for privacy preferences policy
US20060143147A1 (en) * 2004-12-28 2006-06-29 Pearson Joseph A Systems and methods for client-side cached representation of database-persisted information
US20060143697A1 (en) * 2004-12-28 2006-06-29 Jon Badenell Methods for persisting, organizing, and replacing perishable browser information using a browser plug-in
US7099929B1 (en) * 1999-07-20 2006-08-29 Nortel Networks Limited System and method for transferring information in a hypertext transfer protocol based system
US20060218245A1 (en) * 2001-06-21 2006-09-28 Horn Frederic A Method, system, and computer program product for distributing a stored URL and web document set
US20080046840A1 (en) * 2005-01-18 2008-02-21 Apple Inc. Systems and methods for presenting data items
US20080184138A1 (en) * 2007-01-25 2008-07-31 Derek Krzanowski System, method and apparatus for selecting content from web sources and posting content to web logs
US20090019374A1 (en) * 2006-02-18 2009-01-15 James D. Logan Methods and apparatus for creating, combining, distributing and reproducing program content for groups of participating users
US7509490B1 (en) * 2000-05-26 2009-03-24 Symantec Corporation Method and apparatus for encrypted communications to a secure server
US20090089366A1 (en) * 2007-09-27 2009-04-02 Kalman Csaba Toth Portable caching system
US7680875B1 (en) * 2002-04-01 2010-03-16 Novell, Inc. Markers for cached objects
US8112310B1 (en) * 2005-01-21 2012-02-07 A9.Com, Inc. Internet advertising system that provides ratings-based incentives to advertisers
US8166406B1 (en) * 2001-12-04 2012-04-24 Microsoft Corporation Internet privacy user interface

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6226785B1 (en) * 1994-09-30 2001-05-01 Apple Computer, Inc. Method and apparatus for storing and replaying creation history of multimedia software or other software content
US6453342B1 (en) 1998-12-03 2002-09-17 International Business Machines Corporation Method and apparatus for selective caching and cleaning of history pages for web browsers
US7197709B2 (en) * 1999-09-16 2007-03-27 Sharp Laboratories Of America, Inc. Audiovisual information management system with multiple user identifications
US6725269B1 (en) * 1999-12-02 2004-04-20 International Business Machines Corporation System and method for maintaining multiple identities and reputations for internet interactions
US8489669B2 (en) * 2000-06-07 2013-07-16 Apple Inc. Mobile data processing system moving interest radius
JP2002084359A (en) 2000-09-07 2002-03-22 Matsushita Electric Ind Co Ltd Portable information terminal, communication method, and recording medium
US20020162009A1 (en) * 2000-10-27 2002-10-31 Shimon Shmueli Privacy assurance for portable computing
US20020191015A1 (en) * 2001-06-18 2002-12-19 International Business Machines Corporation Method and apparatus for managing history logs in a data processing system
US20020191020A1 (en) * 2001-06-18 2002-12-19 International Business Machines Corporation Method and apparatus for removing confindential information from a history
US7457822B1 (en) * 2002-11-01 2008-11-25 Bluearc Uk Limited Apparatus and method for hardware-based file system
US8566422B2 (en) * 2004-03-16 2013-10-22 Uppfylla, Inc. System and method for enabling identification of network users having similar interests and facilitating communication between them

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6638314B1 (en) * 1998-06-26 2003-10-28 Microsoft Corporation Method of web crawling utilizing crawl numbers
US7099929B1 (en) * 1999-07-20 2006-08-29 Nortel Networks Limited System and method for transferring information in a hypertext transfer protocol based system
US7509490B1 (en) * 2000-05-26 2009-03-24 Symantec Corporation Method and apparatus for encrypted communications to a secure server
US20020194222A1 (en) * 2001-06-18 2002-12-19 International Business Machines Corporation Method and apparatus for disabling histories in a browser
US20060218245A1 (en) * 2001-06-21 2006-09-28 Horn Frederic A Method, system, and computer program product for distributing a stored URL and web document set
US20030018665A1 (en) * 2001-07-11 2003-01-23 International Business Machines Corporation Method and system for dynamic web page breadcrumbing using javascript
US20040128346A1 (en) * 2001-07-16 2004-07-01 Shmuel Melamed Bandwidth savings and qos improvement for www sites by catching static and dynamic content on a distributed network of caches
US6959420B1 (en) * 2001-11-30 2005-10-25 Microsoft Corporation Method and system for protecting internet users' privacy by evaluating web site platform for privacy preferences policy
US8166406B1 (en) * 2001-12-04 2012-04-24 Microsoft Corporation Internet privacy user interface
US7680875B1 (en) * 2002-04-01 2010-03-16 Novell, Inc. Markers for cached objects
US20040122873A1 (en) * 2002-12-20 2004-06-24 International Business Machines Corporation Free space management
US20050144157A1 (en) * 2003-12-29 2005-06-30 Moody Paul B. System and method for searching and retrieving related messages
US20060143697A1 (en) * 2004-12-28 2006-06-29 Jon Badenell Methods for persisting, organizing, and replacing perishable browser information using a browser plug-in
US20060143147A1 (en) * 2004-12-28 2006-06-29 Pearson Joseph A Systems and methods for client-side cached representation of database-persisted information
US20080046840A1 (en) * 2005-01-18 2008-02-21 Apple Inc. Systems and methods for presenting data items
US8112310B1 (en) * 2005-01-21 2012-02-07 A9.Com, Inc. Internet advertising system that provides ratings-based incentives to advertisers
US20090019374A1 (en) * 2006-02-18 2009-01-15 James D. Logan Methods and apparatus for creating, combining, distributing and reproducing program content for groups of participating users
US20080184138A1 (en) * 2007-01-25 2008-07-31 Derek Krzanowski System, method and apparatus for selecting content from web sources and posting content to web logs
US20090089366A1 (en) * 2007-09-27 2009-04-02 Kalman Csaba Toth Portable caching system

Also Published As

Publication number Publication date
US20090125827A1 (en) 2009-05-14
US9594844B2 (en) 2017-03-14

Similar Documents

Publication Publication Date Title
US20170154121A1 (en) Selectively deleting items that are not of interest to a user
US8893042B2 (en) Determination and display of relevant websites
US8554768B2 (en) Automatically showing additional relevant search results based on user feedback
US9330191B2 (en) Identifying changes for online documents
US9275106B2 (en) Dynamic search box for web browser
US8683374B2 (en) Displaying a user's default activities in a new tab page
US9858273B2 (en) Speculative rendering during cache revalidation
US8051370B2 (en) Intelligent autocompletion
US8271865B1 (en) Detection and utilization of document reading speed
US9632652B2 (en) Switching search providers within an application search box
US20080276195A1 (en) Live companion window
US20100262610A1 (en) Identifying Subject Matter Experts
US20100313149A1 (en) Aggregating dynamic visual content
US20120047451A1 (en) Transferring data between applications
US20060294476A1 (en) Browsing and previewing a list of items
US11176139B2 (en) Systems and methods for accelerated contextual delivery of data
US8756292B2 (en) Smart cache learning mechanism in enterprise portal navigation
KR20140051207A (en) Presenting images as search results
US20100131452A1 (en) Displaying resources based on shared contexts
US8584001B2 (en) Managing bookmarks in applications
EP1875379A2 (en) Providing travel log integration for objects hosted in a browser
US8037420B2 (en) Maintaining browser navigation relationships and for choosing a browser window for new documents
US20120191744A1 (en) Detecting search mode in a browser navigation bar
US20060085476A1 (en) Method and system to identify a previously visited universal resource locator (url) in results from a search
US20060104276A1 (en) Dynamic hover text for HTML table cells

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ZEIGLER, ANDREW;TRAHAN, JENNIFER C.;REEL/FRAME:041230/0531

Effective date: 20071101

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:041230/0543

Effective date: 20141014

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION