G06F9/468

Sharing user context and preferences

Technology for interoperability is disclosed by enabling the sharing of user context or preferences for a computing experience across computing devices, operating systems, applications, or locations. A platform and application programming interface (API) are provided for computer applications and services to store and retrieve context data associated with a computing experience. Access to the context data for sharing may be managed by an access controller, which enables a user to manage access permissions for the sharing of the context data. The context data may be defined according to a common schema, which specifies the information for sharing and may be communicated using common communication channels or protocols. Thus context data may be shared across nearly any application or service including those developed in different computer programming languages or operating on different types of computing devices or devices running different operating systems or by different software developers.

Microcontroller and semiconductor device
11526598 · 2022-12-13 · ·

A microcontroller includes a CPU and a cryptographic circuit, and when a first program uses the cryptographic circuit, the second program transmits installation information of the first program and encrypted program installation information to the cryptographic circuit. The cryptographic circuit decrypts the encrypted program installation information and compares it with the installation information of the first program. In the case of match, the use of the cryptographic circuit by the first program is permitted.

Application building in a distributed computing environment

Embodiments of the present disclosure relate to a method for building an application. According to the method, a request is received from a building environment to acquire at least one component for executing at least one function of at least one feature of the application. The at least one feature is to be deployed to at least one target node in a distributed service platform comprising a plurality of nodes. The at least one target node and the at least one component are determined based on the request. The at least one component is acquired from the at least one target node. The at least one component is sent to the building environment for building the at least one feature.

METHOD AND APPARATUS FOR PROCESSING RESOURCE, ELECTRONIC DEVICE AND STORAGE MEDIUM
20220382599 · 2022-12-01 ·

The disclosure relates to processing a multimedia resource, including acquiring resource presentation data determined based on a resource style type of a resource to be processed and account information of a third user account. The resource presentation data includes presentation data of the joint virtual space including the first user account for activating the joint virtual space and the second user account participating in the joint virtual space. Based on anchor information corresponding to the second user account that meets the preset association condition with the third user account from the resource presentation data, the target resource presentation data bound with the joint virtual space is determined.

CLOUD PROVIDER ACCOUNT MAPPINGS
20220382590 · 2022-12-01 ·

Techniques are described for providing a method of creating and managing mappings between cloud based resources and cloud provider accounts. Specifically, the present disclosure presents a method executed by a centralized service for acquiring account credentials associated with a cloud provider account from a cloud provider. The centralized service is further configured to receive a request to allocate account credentials to a network resources. After receiving the request, the centralized service generates a mapping of the cloud provider account with the network resource based at least in part on the acquired account credentials of the cloud provider account. Finally, the centralized service returns the mapping based on the cloud provider account.

Creating a layered multi-tenant architecture
11513834 · 2022-11-29 · ·

Disclosed is a system and a method for creating a layered and portable multi-tenant architecture. Initially, a cloud container for a platform is created. The cloud container includes a namespace for a tenant accessing the platform. Further, a logical isolation for the namespace of the tenant is created. Subsequently, a plurality of tenants in the namespace is generated based on the logical isolation. The tenant is further allowed to access a tenant database via Application Programming Interfaces (APIs), thereby creating a layered multi-tenant architecture.

Method of secure memory addressing
11593277 · 2023-02-28 · ·

The problem to be solved is to seek an alternative to known addressing methods which provides the same or similar effects or is more secure. Solution The problem is solved by a method (40) of addressing memory in a data-processing apparatus (10) comprising, when a central processing unit (11), while performing a task (31, 32, 33, 34) of the apparatus (10), executes an instruction involving a pointer (59) into a segment (s, r, d, h, f, o, i, c) of the memory: decoding the instruction by means of an instruction decoder (12), generating a virtual address (45) within the memory by means of a safe pointer operator (41) operating on the pointer (59), augmenting the virtual address (45) by an identifier (43) of the task (31, 32, 33, 34) and an identifier (44) of the segment (s, r, d, h, f, o, i, c), said identifiers (43, 44) being hardware-controlled (42), and, based on the augmented address (45), dereferencing the pointer (59) via a memory management unit (13).

Enhanced real-time linking methods and systems

Systems and methods for enabling links between various devices is provided. The systems and methods may include a platform that enables different devices to access spatial models of a resource. The platform may enable the different devices to define and/or modify assignment conditions for access rights to resources. Further, the platform may enable definition of assignment conditions before or after the access rights are available for assignment.

Devices, Methods, and Graphical User Interfaces for Automatically Providing Shared Content to Applications

A computer system receives, in a first messaging conversation by a first messaging application of a plurality of applications, information identifying a first shared content item. In response to receiving the information identifying the first shared content item, in accordance with a determination that the first shared content item is of a first type, the computer system automatically makes the first shared content item available within a first application of the plurality of applications, the first application is associated with content of the first type. In accordance with a determination that the first shared content item is of a second type, the computer system automatically makes the first shared content item available within a second application of the plurality of applications, wherein the second application is associated with content of the second type.

CONTAINER AND RESOURCE ACCESS RESTRICTION
20220368695 · 2022-11-17 ·

A computer-implemented system and related method secures the access of a data object in a datastore by a remote system without user-specific credentials. The method comprises using a processor of a data resident operating system for verifying, using a security resource profile for the datastore, which access entity the remote system has access to, but without the user-specific credentials. The method also provides the security resource profile through a security application program interface (API) to the processor to determine whether access to the access entity should be allowed. The method allows the access to the data object by the remote system when the security resource profile exists and permits the access.