摘要:
Systems and methods are described for providing a standard list function to create a graphical user interface list and list manager while allowing the graphical user interface to vary by appearance. An application developer can include a list manager control in an application. Properties are set that link the list manager to display controls, a data source and a scrolling behavior source. The list manager provides the appropriate content to the display controls in response to user selections of the display controls. The display controls and a user interface that contains them may vary without altering the basic functionality of the list manager.
摘要:
Systems and methods are described for providing a standard list function to create a graphical user interface list and list manager while allowing the graphical user interface to vary by appearance. An application developer can include a list manager control in an application. Properties are set that link the list manager to display controls, a data source and a scrolling behavior source. The list manager provides the appropriate content to the display controls in response to user selections of the display controls. The display controls and a user interface that contains them may vary without altering the basic functionality of the list manager.
摘要:
Methods and systems for mapping between components of a packaging model and features of a physical representation of a package are provided. Components of a packaging model may include, by way of example only, a part name, a content type, the contents of a part, and/or a growth hint. Physical representations of a package may include, by way of example only, physical persistence formats and/or various transports, e.g., network-based protocols. Computer-readable media having computer-executable instructions for performing the disclosed methods, as well as computers programmed to perform the disclosed methods, are also provided.
摘要:
Systems and methods are described for providing a standard list function to create a graphical user interface list and list manager while allowing the graphical user interface to vary by appearance. An application developer can include a list manager control in an application. Properties are set that link the list manager to display controls, a data source and a scrolling behavior source. The list manager provides the appropriate content to the display controls in response to user selections of the display controls. The display controls and a user interface that contains them may vary without altering the basic functionality of the list manager.
摘要:
Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user credential, e.g., personal identification number (PIN), password, etc. has been forgotten or is unknown. A computing device generates a cryptographic key that is protected with a PIN unlock key (PUK) provided by an administrative entity. If the user PIN cannot be input to the computing device the PUK can be input to unlock the locked cryptographic key and thereby provide access to protected data. A computing device can also, or alternatively, generate a group of challenges and formulate responses thereto. The formulated responses are each used to secure a computing device cryptographic key. If the user PIN cannot be input to the computing device an entity may request a challenge. The computing device issues a challenge from the set of generated challenges. Upon receiving a valid response back, the computing device can unlock the secured computing device cryptographic key associated with the issued challenge and subsequently provide access to protected data.
摘要:
Computing devices utilizing trusted execution environments as virtual smart cards are designed to support expected credential recovery operations when a user credential, e.g., personal identification number (PIN), password, etc. has been forgotten or is unknown. A computing device generates a cryptographic key that is protected with a PIN unlock key (PUK) provided by an administrative entity. If the user PIN cannot be input to the computing device the PUK can be input to unlock the locked cryptographic key and thereby provide access to protected data. A computing device can also, or alternatively, generate a group of challenges and formulate responses thereto. The formulated responses are each used to secure a computing device cryptographic key. If the user PIN cannot be input to the computing device an entity may request a challenge. The computing device issues a challenge from the set of generated challenges. Upon receiving a valid response back, the computing device can unlock the secured computing device cryptographic key associated with the issued challenge and subsequently provide access to protected data.
摘要:
Systems and methods are described for providing a standard list function to create a graphical user interface list and list manager while allowing the graphical user interface to vary by appearance. An application developer can include a list manager control in an application. Properties are set that link the list manager to display controls, a data source and a scrolling behavior source. The list manager provides the appropriate content to the display controls in response to user selections of the display controls. The display controls and a user interface that contains them may vary without altering the basic functionality of the list manager.
摘要:
Systems and methods are described for providing a standard list function to create a graphical user interface list and list manager while allowing the graphical user interface to vary by appearance. An application developer can include a list manager control in an application. Properties are set that link the list manager to display controls, a data source and a scrolling behavior source. The list manager provides the appropriate content to the display controls in response to user selections of the display controls. The display controls and a user interface that contains them may vary without altering the basic functionality of the list manager.