Application Activation Framework
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for application activation are described herein. An operating system (OS) can be configured to incorporate various extension points that are serviceable through contracts defining individual invocations of extensible functionality. The extensible functionality is integrated as part of the OS and controlled by the OS in a centralized manner. However, the specific implementations of the extensible functionally are offloaded to applications using the contracts. For example, the OS can include or otherwise make use of a centralized application activation component that employs an object-oriented approach to invoke applications to perform particular contracts. The application activation component can pass information describing a particular contract to activate a designated application and enable the application to service the contract in the manner specified by the OS. In this way, the manner in which contracts are handled by application code can be managed and coordinated through a centralized application activation component.
-
Citations
21 Claims
-
1. (canceled)
-
2. A computing device comprising:
-
one or more processors; and computer-readable storage media storing computer-executable instructions that are executable by the one or more processors to cause the system to perform operations comprising; notifying an operating system regarding entry points of an application to indicate support by the application for one or more extension points through the entry points; activating the application to service a contract associated with one of the one or more extension points; obtaining a contract object through an entry point that identifies the contract and specifies how the application is to fulfill the contract; performing processing specified by the contract object to fulfill the contract; and communicating results of the processing to the operating system. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method comprising:
-
notifying, by an application, an operating system of a computing device regarding entry points of the application to indicate support by the application for one or more extension points through the entry points; activating the application to service a contract associated with one of the one or more extension points; obtaining a contract object through an entry point that identifies the contract and specifies how the application is to fulfill the contract; performing processing specified by the contract object to fulfill the contract; responsive to determining that the contract was not successfully fulfilled, communicating to the operating system that the contract was not successfully fulfilled and initiating a retry of the processing specified by the contract; and responsive to the retry of the processing specified by the contract being successful, communicating results of the processing to the operating system. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computing device comprising:
-
one or more processors; and computer-readable storage media storing computer-executable instructions that, when executed by the one or more processors, implement an application activation component to provide a common pathway for application activation across different applications and runtime platforms of the computing device, the application activation component configured to; implement an object-oriented protocol to activate applications to service extension points provided by an operating system of the computing device; obtain a request to use extensible functionality provided by a particular extension point of the operating system; and activate an application to service the request including; selecting the application from among multiple applications registered with the operating system to service the particular extension point; and communicating an object to an entry point designated for the particular extension point by the application, the object being defined in accordance with the object-oriented protocol and configured to cause the entry point to initiate processing by the application to implement the requested extensible functionality. - View Dependent Claims (18, 19, 20, 21)
-
Specification