Unlock instant, AI-driven research and patent intelligence for your innovation.

Application file system access

A file system and application access technology, applied in special data processing applications, user interface execution, instruments, etc., can solve problems such as defects and changes in reliability

Inactive Publication Date: 2015-03-25
MICROSOFT TECH LICENSING LLC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because of the large number of applications that may be available and the variety of developers who may provide the applications, the functionality of the applications may have varying degrees of reliability
For example, apps may have flawed functionality, may have been written by parties with malicious intent, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application file system access
  • Application file system access
  • Application file system access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] overview

[0018] With the proliferation of application developers, users of computing devices are exposed to an increasing number of applications. However, the trustworthiness of these applications varies widely, as do the developers who write them. Thus, traditional file systems that have historically permitted unimpeded access may expose computing devices to flawed and even malicious applications.

[0019] Application file system access techniques are described. In an implementation, the proxy module is utilized to manage application access to the file system to access local files, networked computers, and / or peripherals communicatively coupled to the computing device. For example, an agent module may be configured to facilitate the output of a user interface. Via the user interface, the user can authenticate the application's request for access to the file system. In this way, the proxy module can help users manage the access to be granted to applications execut...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Application file system access techniques are described. In implementations, a request is received by one or more modules via an application programming interface from an application that is executed on the computing device to access a file system of a computing device. A portion is exposed in a user interface by the one or more modules, the portion having an option that is selectable by a user to confirm that access is to be granted, the portion exposed such that the application is not aware of what is contained in the portion. Responsive to selection of the option, access is granted to the application by the one or more modules such that the application is not aware of where in the file system the access is granted.

Description

Background technique [0001] Users can access a wide variety of applications from a wide variety of different sources. For example, users have traditionally obtained applications from "bricks and mortar" stores, on computer-readable storage media such as optical discs, and then installed the applications on the users' home computing devices. These apps are usually provided by reputable developers and therefore considered trustworthy. [0002] Later, subsequent technologies were developed in which users access the network in order to locate and install applications. For example, an application marketplace may be made available for access via the Internet to locate and purchase applications. In some cases, an application marketplace may include a large number of applications, possibly from a variety of different developers. However, because of the large number of applications that may be available and the variety of developers who may provide the applications, the functionalit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30
CPCG06F21/6218G06F17/30126G06F2221/2101G06F2221/2141G06F16/168G06F3/048G06F9/44G06F9/451
Inventor L.王S.D.胡格维尔夫M.米什拉S.J.鲍尔S.J.莫罗J.哈里斯B.J.卡拉斯K.拉哈克里什南R.A.埃贝林R.H.廖A.W.卡德维尔M.J.吉尔摩尔
Owner MICROSOFT TECH LICENSING LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More