Patent application number | Description | Published |
20110179483 | METHODS FOR HANDLING A FILE ASSOCIATED WITH A PROGRAM IN A RESTRICTED PROGRAM ENVIRONMENT - Techniques for handling a file associated with a program are described herein. According to an aspect of the invention, in response to a request for accessing a file received through a first program, the file is stored in a first sandboxed storage area, where the file is to be accessed by a second program. An atomic move operation is then performed on the file that atomically moves the file from the first sandboxed storage area to a second sandboxed storage area, where the first sandboxed storage area is not accessible to the first program and second program. The second program is launched to access the file stored in the second sandboxed storage area, where the second sandboxed storage area is a part of a sandbox associated with the second program. | 07-21-2011 |
20130205362 | CENTRALIZED OPERATION MANAGEMENT - A novel security framework that is part of an operating system of a device is provided. The framework includes a security assessor that performs security policy assessments for different operations that need to be performed with respect to an application executing on the device. Examples of such operations include the installation of the application, execution of the application, and the opening of content files (e.g., opening of documents) by the application. | 08-08-2013 |
20130205363 | CENTRALIZED OPERATION MANAGEMENT - A novel security framework that is part of an operating system of a device is provided. The framework includes a security assessor that performs security policy assessments for different operations that need to be performed with respect to an application executing on the device. Examples of such operations include the installation of the application, execution of the application, and the opening of content files (e.g., opening of documents) by the application. | 08-08-2013 |
20130205364 | CENTRALIZED OPERATION MANAGEMENT - A novel security framework that is part of an operating system of a device is provided. The framework includes a security assessor that performs security policy assessments for different operations that need to be performed with respect to an application executing on the device. Examples of such operations include the installation of the application, execution of the application, and the opening of content files (e.g., opening of documents) by the application. | 08-08-2013 |
20150350355 | ACTIVITY CONTINUATION BETWEEN ELECTRONIC DEVICES - The described embodiments transfer an activity from a source electronic device to a companion electronic device. The source electronic device receives activity information describing an activity performed in a first application at the source electronic device, determines an activity identifier for the activity information, and broadcasts an activity advertisement comprising the activity identifier. Upon receiving the activity advertisement, the companion electronic device determines whether a second application that is associated with the first application is available at the companion electronic device. If the second application is available, the companion electronic device requests extended activity data from the source electronic device. The source electronic device responds by sending extended activity data from the first application to the companion electronic device. Then, the companion electronic device uses the extended activity data to configure the second application and commences performing the activity with the second application at the companion electronic device. | 12-03-2015 |
20150350356 | ACTIVITY CONTINUATION BETWEEN ELECTRONIC DEVICES - The described embodiments transfer an activity from a source electronic device to a companion electronic device. The source electronic device receives activity information describing an activity performed in a first application at the source electronic device, determines an activity identifier for the activity information, and broadcasts an activity advertisement comprising the activity identifier. Upon receiving the activity advertisement, the companion electronic device determines whether a second application that is associated with the first application is available at the companion electronic device. If the second application is available, the companion electronic device requests extended activity data from the source electronic device. The source electronic device responds by sending extended activity data from the first application to the companion electronic device. Then, the companion electronic device uses the extended activity data to configure the second application and commences performing the activity with the second application at the companion electronic device. | 12-03-2015 |
20150350814 | COMPANION APPLICATION FOR ACTIVITY COOPERATION - The described embodiments augment an activity performed in a first application at a source electronic device using a controller at a companion electronic device. The source electronic device receives controller information describing a controller that the activity performed in the first application accepts controller data from, determines a controller identifier for the controller information, and broadcasts a controller advertisement comprising the controller identifier. Upon receiving the controller advertisement, the companion electronic device determines whether a second application that can provide the controller data is available at the companion electronic device. If the second application is available, the companion electronic device establishes a cooperative-activity communication channel with the source electronic device. The companion electronic device uses the cooperative-activity communication channel to provide controller data to the source electronic device. The source electronic device provides the controller data to the first application to cause a corresponding action to be performed. | 12-03-2015 |