Abstract:
The described embodiments augment an activity performed in a first application at a source electronic device using a controller at a companion electronic device. The source electronic device receives controller information describing a controller that the activity performed in the first application accepts controller data from, determines a controller identifier for the controller information, and broadcasts a controller advertisement comprising the controller identifier. Upon receiving the controller advertisement, the companion electronic device determines whether a second application that can provide the controller data is available at the companion electronic device. If the second application is available, the companion electronic device establishes a cooperative-activity communication channel with the source electronic device. The companion electronic device uses the cooperative-activity communication channel to provide controller data to the source electronic device. The source electronic device provides the controller data to the first application to cause a corresponding action to be performed.
Abstract:
A novel security framework that is part of an operating system of a device is provided. The framework includes a security assessor that performs security policy assessments for different operations that need to be performed with respect to an application executing on the device. Examples of such operations include the installation of the application, execution of the application, and the opening of content files (e.g., opening of documents) by the application.
Abstract:
A device may comprise at least one wireless transceiver, a memory configured to store a local pasteboard, and a processor. The processor may be configured to receive local selections of data to be placed on a local pasteboard, broadcast advertisements indicating that the local data is on the local pasteboard, and wirelessly transmit the local data to remote device pasteboards. The processor may also be configured to receive advertisements indicating that remote data is available on remote pasteboards of other devices, request the remote data in response to a paste command, wirelessly receive the remote data, and paste the remote data.
Abstract:
The described embodiments transfer an activity from a source electronic device to a companion electronic device. The source electronic device receives activity information describing an activity performed in a first application at the source electronic device, determines an activity identifier for the activity information, and broadcasts an activity advertisement comprising the activity identifier. Upon receiving the activity advertisement, the companion electronic device determines whether a second application that is associated with the first application is available at the companion electronic device. Then, the companion electronic device configures the second application and commences performing the activity with the second application at the companion electronic device.
Abstract:
A connection manager manages connections for associated user devices by determining whether an incoming connection has been answered at a user device, and if so then generating and transmitting silencing commands to associated user devices using first and second wireless communication modes, with one mode being faster. Connections can comprise phone calls, and modes can comprise push and Bluetooth® messaging. The connection manager can instruct device outputs to provide connection alerts, limited to visual alerts when an associated user device is active, listen for associated user device communications, and instruct device outputs to stop providing alerts when a silencing command is received. Further, a connection manager can receive a signal regarding a headset status, route an outside connection from a phone to the headset when the headset is active or to another device when the headset is not active, detect a change in headset status, and reroute the connection accordingly.
Abstract:
Methods and systems for associating, in a secure manner, a link between web sites (or other network resources) and installed applications. In one embodiment, a signed list of one or more URLs is downloaded and validated to establish an association, which is stored in a data structure, between a first application and a second application. In response to receiving a selection of a URL in the second application, comparing the selected URL to URLs in the data structure and displaying, in the first application, content of the selected URL in response to determining that at least a prefix portion of the selected URL matches one of the URL associated with the first application in the data structure.
Abstract:
Methods and systems for associating, in a secure manner, a link between web sites (or other network resources) and installed applications. In one embodiment, a signed list of one or more URLs is downloaded and validated to establish an association, which is stored in a data structure, between a first application and a second application. In response to receiving a selection of a URL in the second application, comparing the selected URL to URLs in the data structure and displaying, in the first application, content of the selected URL in response to determining that at least a prefix portion of the selected URL matches one of the URL associated with the first application in the data structure.
Abstract:
Various embodiments of a system and method for securely caching and sharing image data. A process can generate image data and store the image data into the protected cache using a UUID that is cryptographically derived from the image data. Any process with access to the UUID may retrieve the image data. Because the UUID is uniquely derived from the actual data of the generated file, a process will only be able to retrieve image data that could have been generated by a process associated with the user account, or from a process associated with a user account that could have generated the image data, or that otherwise has a record of the image data.
Abstract:
Methods, program products, and systems for location-based reminders are disclosed. A first user device can receive an input specifying that a reminder be presented at a given location. The first user device can provide a reminder request, including type and content of the reminder and the location, to a server computer for pushing to one or more user devices. A second user device, upon receiving the reminder request, can determine a device location of the second user device. If the given location matches the device location, the second user device can present the reminder in a user interface.
Abstract:
A novel security framework that is part of an operating system of a device is provided. The framework includes a security assessor that performs security policy assessments for different operations that need to be performed with respect to an application executing on the device. Examples of such operations include the installation of the application, execution of the application, and the opening of content files (e.g., opening of documents) by the application.