Secure Application Interoperation via User Interface Gestures
First Claim
1. One or more computer-readable media storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform acts comprising:
- detecting an atomic user gesture requesting to facilitate a communication between a first location of a computing device and a second location of the computing device, the computing device providing a bilateral security boundary isolating communications from the first location to the second location and from the second location to the first location; and
at least partly in response to the detecting of the atomic user gesture,piercing the bilateral security boundary isolating the communications from the first location to the second location and from the second location to the first location; and
facilitating the requested communication between the first location and the second location.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for facilitating secure application interoperation via user interface (UI) gestures in computing devices that strictly isolate applications operating thereon are described herein. For instance, applications may define one or more specific UI gestures that, when executed by the user, express that the user desires for the computing device to allow for an instance of directed, ephemeral, by-value communication between two isolated applications. In some implementations, the gesture is an atomic gesture, such as a drag-and-drop operation. That is, the gesture is one that the user completes continuously and without interruption.
78 Citations
20 Claims
-
1. One or more computer-readable media storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform acts comprising:
-
detecting an atomic user gesture requesting to facilitate a communication between a first location of a computing device and a second location of the computing device, the computing device providing a bilateral security boundary isolating communications from the first location to the second location and from the second location to the first location; and at least partly in response to the detecting of the atomic user gesture, piercing the bilateral security boundary isolating the communications from the first location to the second location and from the second location to the first location; and facilitating the requested communication between the first location and the second location. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
one or more processors; memory, accessible by the one or more processors; multiple applications, stored in the memory and executable by the one or more processors; and an operating system, stored in the memory and executable by the one or more processors to; run the multiple applications on the computing device and enforce security boundaries isolating each of the multiple applications from the other; detect a gesture made by a user, the gesture requesting to enable communication between a first of the multiple applications and a second of the multiple applications and across a security boundary there between; and enable the communication between the first and the second application and across the security boundary there between at least partly in response to the detecting of the gesture and without prompting the user for permission. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method implemented at least in part by a computing device, the method comprising:
-
detecting a predefined gesture that specifies an intent of a user to move data from a first application to a second application and across a security boundary there between; moving the data from the first application to the second application and across the security boundary there between at least partly in response to the detecting of the gesture and without prompting the user for permission; again detecting the predefined gesture, the again detected gesture specifying an intent of the user to move different data from a third application to a fourth application and across a security boundary there between; and moving the different data from the third application to the fourth application and across the security boundary there between at least partly in response to the again detecting of the gesture and without prompting the user for permission. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification