摘要:
An application container-level transaction management system for managing transactions of an application on a wireless device. The system comprises a transaction manager for providing an interface to the application container for accessing methods for creation and execution of transactions in a hierarchical order. The transactions comprising correlative operations. The system further comprises a transaction stack for storing the transactions to be executed in an execution order according to the hierarchical order, the order of execution providing for at least one of rollback and completion of the correlative operations.
摘要:
There is provided a system for executing a container-managed application in a processing device, the system comprising a shared service container providing at least one common service for the processing device, executed in at least one process and at least one container-managed application, each comprising an application executed in a given process and accessing at least one service of the application and the at least one common service using a single service discovery API.
摘要:
A system and method of customizing services on a wireless device are provided. The system comprises a device and an application gateway server for communicating with the device. The device has a device runtime environment having core services, a default system application and at least one custom system application. The application gateway server configured for communication with a default back-end service and at least one custom back-end service. The at least one custom back-end service provides customized services to the device. The method comprises the steps of configuring a device runtime environment with core services, a default system application and at least one custom system application, and communicating with at least one custom back-end service to customize services of the device.
摘要:
Methods and systems for controlling centralized memory management in wireless terminal devices. Memory management scripts associated with a wireless application are stored in a registry accessible through a data network for on-demand download and execution. A memory management kernel in each terminal device monitors a memory utilization of the terminal device. Based on the memory utilization, the memory management kernel interacts with an application gateway hosting the terminal device to download and execute one or more of the memory management scripts.
摘要:
A method for extending a script language in a runtime environment of a data processing system to support an application, the runtime environment having a script language interpreter, the method comprising: subclassing a predetermined object defined by the script language to create a subclassed object, the predetermined object having an original method, the subclassed object having a respective replacement method for supporting the application; dynamically registering a symbol corresponding to the subclassed object; detecting the subclassed object in the application with the script language interpreter; and, executing the replacement method with the script language interpreter.
摘要:
A system and method is provided having an execution environment of an intelligent runtime device framework for generating user interface elements on a user interface (UI), declared on the device. The proposed method allows user interface definitions through XML metadata UI definitions (or other structured definition language schema) instead of requiring an implementation of the screen elements in executable code for the application. The UI definitions are stored in a common UI repository as a common resource of the applications on the device and is processed at runtime. The UI definitions are independent from the target platform of the device. The “look and feel” of all the applications on the device can be customized and branded as required. Defining layout and ordering of UI elements separately from the applications logic offers modularization of the applications. Such modularization allows reuse of already defined UI screens and sharing them between different applications. The system has a themes and branding repository, a UI repository, a visualization engine, an execution environment, and a UI service. The method includes steps of parsing the XML definitions, applying theme and branding characteristics, providing a screen model to the execution environment, visualizing the user interface, and event handling.
摘要:
A Repetitive Layout scheme is provided that operates on a collection of data objects, such that each data object accords to the same data object definition (data model) expressed in a structured definition language. The Repetitive Layout consists of one UI section repeated for every object in the collection. Each UI section is composed of a set of UI controls or sub-layouts. The UI controls in each section are associated with the data fields of the corresponding data object. A user of a wireless application interacting with the data objects can select UI sections and edit the controls within them via the user interface of the wireless device executing the application. Any modifications are propagated to the data objects mapped to the respective UI sections. Similarly, all modifications (driven by the application logic or incoming server messages) to the data objects are reflected in the UI section mapped to these objects. The generation and application of the repetitive layout scheme can include the steps: dynamic data entity generation (Data Composer stage); determining the collection of data objects that need to be presented by the user interface (Rules Engine stage); sorting the collection of data objects (Sorting Processor stage); generating the UI Layout (Layout Generator stage); propagating UI changes back to the Data Model having the definitions of the data objects (Data Dispatcher stage); propagating data changes to the Repetitive Layout; and propagating changes to nodes of the data model.
摘要:
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles.
摘要:
Systems and methods for secure control of a wireless mobile communication device are disclosed. Each of a plurality of domains includes at least one wireless mobile communication device asset. When a request to perform an operation affecting at least one of the assets is received, it is determined whether the request is permitted by the domain that includes the at least one affected asset, by determining whether the entity with which the request originated has a trust relationship with the domain, for example. The operation is completed where it is permitted by the domain. Wireless mobile communication device assets include software applications, persistent data, communication pipes, and configuration data, properties or user or subscriber profiles.
摘要:
A method performed on a device includes receiving, from a user, a finger-touch-initiated request for access to a layer of a multi-layer application on the device, the multi-layer application having a plurality of user interface layers. The method may also include identifying a finger of the user used to provide the finger-touch-initiated request, the finger associated with one of the layers of the multi-layer application. The layer associated with the identified finger of the user may be operated on. Each finger of the user can be associated with a different layer of the multi-layer application. Fingerprints can be used to differentiate each finger and/or to identify the user by fingerprint recognition techniques. Fingerprints can be used to vary the access parameters of a layer of the application and/or to provide security levels for accessing the layers of the multi-layer application.