Integrated application feature store
First Claim
Patent Images
1. A computer-implemented method comprising:
- under control of one or more processors configured with executable instructions;
presenting a user interface of a productivity application, the user interface of the productivity application including an application storefront of an application feature store;
the application storefront displaying one or more controls corresponding to one or more application features available for selection;
receiving a selection of one of the controls corresponding to an application feature available within the application feature store;
in response to receiving the selection, integrating the selected application feature into the productivity application;
determining that the productivity application comprises one or more security boundaries;
executing the selected application feature within the productivity application, while enforcing the one or more security boundaries to prevent the selected application feature from accessing features or data protected by the one or more security boundaries; and
executing another application feature within the productivity application without enforcing the one or more security boundaries.
2 Assignments
0 Petitions
Accused Products
Abstract
An application feature store may be integrated with an application. The feature store may be accessed by a user through a feature storefront hosted within the application. The user may search the feature store for additional desired features available for the augmentation of the productivity application.
13 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
under control of one or more processors configured with executable instructions; presenting a user interface of a productivity application, the user interface of the productivity application including an application storefront of an application feature store; the application storefront displaying one or more controls corresponding to one or more application features available for selection; receiving a selection of one of the controls corresponding to an application feature available within the application feature store; in response to receiving the selection, integrating the selected application feature into the productivity application; determining that the productivity application comprises one or more security boundaries; executing the selected application feature within the productivity application, while enforcing the one or more security boundaries to prevent the selected application feature from accessing features or data protected by the one or more security boundaries; and executing another application feature within the productivity application without enforcing the one or more security boundaries. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising:
-
memory; one or more processors coupled to the memory; an application stored in the memory and operable on the one or more processors, the application comprising; an integrated portal configured to access a feature store, the feature store comprising one or more application features compatible with the application; and a representation of an application feature selected from the feature store and installed within the application, the representation consistent with representations of one or more application features previously installed within the application; and a security module configured to; determine one or more boundaries associated with the application; during execution of the selected application feature within the application, enforcing the one or more boundaries to prevent the selected application feature from accessing data or features secured by the one or more boundaries; and during execution of an application feature included with an initial installation of the application, allowing execution without enforcing the one or more boundaries. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. One or more computer-readable storage media storing computer-executable instructions that, when executed on one or more processors, cause the one or more processors to perform operations comprising:
-
presenting a user interface usable to interact with a feature storefront; receiving a selection of an application feature available from the feature storefront; determining that a base application comprises one or more security boundaries; in response to receiving the selection; integrating the application feature with the base application based, at least in part, on the one or more security boundaries; and presenting a representation of the application feature within the base application; during execution of the application feature within the base application, enforcing the one or more security boundaries to prevent the application feature from accessing data or features protected by the one or more security boundaries; and during execution of an application feature that was included with the base application, not enforcing the one or more security boundaries. - View Dependent Claims (17, 18, 19, 20)
-
Specification