摘要:
The present invention relates generally to systems and methods for delivering content from content providers to end users using computer networks. Aspects of the invention enable content providers cost-effective content delivery using, for example, download and peer-to-peer mechanisms, while also allowing content providers the ability to control and restrict usage of the content and combat piracy. These and other aspects of the invention are discussed in more detail herein.
摘要:
In a single machine that has entities running in an untrusted environment and entities running in a trusted environment, the trustworthiness of the entities in the trusted environment is projected to the entities in the untrusted environment. This is applicable, for example, to Microsoft®'s Next Generation Secure Computing Base (NGSCB), where a regular operating system (e.g., the Windows® operating system) hosts a secure operating system (e.g., the nexus).
摘要:
The present invention relates generally to systems and methods for delivering content from content providers to end users using computer networks. Aspects of the invention enable content providers cost-effective content delivery using, for example, download and peer-to-peer mechanisms, while also allowing content providers the ability to control and restrict usage of the content and combat piracy. These and other aspects of the invention are discussed in more detail herein.
摘要:
VoIP calls associated with VoIP applications installed on a mobile computing device are treated similar to calls not associated with installed VoIP applications. VoIP applications invoke the same native incoming call user interface that is invoked when a mobile device detects an incoming call that is not associated with an installed VoIP application. Mobile devices can simultaneously host a VoIP call and a call not associated with an installed VoIP application while a mobile device is locked. A reduced call user interface is displayed while a mobile device is simultaneously hosting multiple calls. Selection of the reduced call user interface causes the mobile device to make the active call the inactive call and vice versa. The reduced call user interface is managed by the mobile device operating system.
摘要:
VoIP calls associated with VoIP applications installed on a mobile computing device are treated similar to calls not associated with installed VoIP applications. VoIP applications invoke the same native incoming call user interface that is invoked when a mobile device detects an incoming call that is not associated with an installed VoIP application. Mobile devices can simultaneously host a VoIP call and a call not associated with an installed VoIP application while a mobile device is locked. A reduced call user interface is displayed while a mobile device is simultaneously hosting multiple calls. Selection of the reduced call user interface causes the mobile device to make the active call the inactive call and vice versa. The reduced call user interface is managed by the mobile device operating system.
摘要:
In a single machine that has entities running in an untrusted environment and entities running in a trusted environment, the trustworthiness of the entities in the trusted environment is projected to the entities in the untrusted environment. This is applicable, for example, to Microsoft®'s Next Generation Secure Computing Base (NGSCB), where a regular operating system (e.g., the Windows® operating system) hosts a secure operating system (e.g., the nexus).
摘要:
A computer-implemented system is provided that facilitates implementation of a voice over IP (VOIP) application. The system includes a host system and a user interface (UI) host process residing on the host system. The system also includes an agent host process residing on the host system which is being configured to process a VOIP call received by one or more VOIP applications executable on the host system. The agent host process running as a foreground or background process for the duration of the VOIP call to (i) communicate with a VOIP server associated with the VOIP application, (ii) capture content from at least one input device associated with the host system and (iii) render content on an output device associated with the host system when an instance of the UI host process operates in the foreground.
摘要:
A computer-implemented system is provided that facilitates implementation of a voice over IP (VOIP) application. The system includes a host system and a user interface (UI) host process residing on the host system. The system also includes an agent host process residing on the host system which is being configured to process a VOIP call received by one or more VOIP applications executable on the host system. The agent host process running as a foreground or background process for the duration of the VOIP call to (i) communicate with a VOIP server associated with the VOIP application, (ii) capture content from at least one input device associated with the host system and (iii) render content on an output device associated with the host system when an instance of the UI host process operates in the foreground.
摘要:
A trusted data store is provided for use with a trusted element of a trusted operating system on a computing machine. In the trusted data store, a storage medium stores data in a pre-determined arrangement, where the data includes trusted data from the trusted element of the trusted operating system on the computing machine. An access controller writes data to and reads data from the storage medium, and a trust controller is interposed between the computing machine and the access controller. The trust controller allows only the trusted element to perform operations on the trusted data thereof on the storage medium.
摘要:
The present invention extends to methods, systems, and computer program products for using directory historical data to facilitate automated file updates. A pair of directories is updated, for example, synchronized, with one another. Directory historical data, such as, for example, previous contents of the directories, is utilized to determine what file operations are to be performed during an update. User-selectable update modes can also be used to further configure what file operations are performed during an update.