APPLICATION PORTABILITY VIA APPLICATION(S) INSTALLED ON A PORTABLE STORAGE DEVICE
20180218132 ยท 2018-08-02
Inventors
- Arun C. Kalyanasamy (Redmond, WA, US)
- John J. Vintzel (Redmond, WA)
- Jason G. Salameh (Bothell, WA)
- Sarjana S. Mitra (Yarrow Point, WA)
Cpc classification
G06F9/44584
PHYSICS
G06F21/123
PHYSICS
G06F21/6209
PHYSICS
International classification
Abstract
Methods, systems, and computer program products are provided that enable software application(s) to be installed onto a portable storage device and executed by a first computing device coupled to the portable storage device without having to install the application(s) onto the first computing device. While the application(s) are being executed, state information associated with the application(s) may be maintained and also stored on the portable storage device. When the portable storage device is de-coupled from the first computing device and coupled to a second computing device, the application(s) installed on the portable storage device may continue execution from the point where the user stopped using the application(s) on the first computing device without having to install the applications(s) on the second computing device.
Claims
1. A method, comprising: determining that a portable storage device coupled with a computing device stores an application configured on the portable storage device for execution on the computing device without requiring installation on the computing device; in response to said determining, displaying a user-selectable application identifier for the application to a user of the computing device; detecting that a user has selected the user-selectable application identifier; in response to said detecting, determining whether the application is associated with the user; and in response to determining that the application is associated with the user, enabling the application for execution on the computing device without installation on the computing device.
2. The method of claim 1, said enabling comprising: retrieving state information associated with the selected application from the portable storage device; and executing the selected application based on the retrieved state information without installation on the computing device.
3. The method of claim 1, further comprising: in response to determining that the application is not associated with the user, enabling the user to install the application on the computing device.
4. The method of claim 1, wherein determining whether the application is associated with the user comprises: comparing first user identifier utilized to log into the computing device with a second user identifier associated with the application; determining that the application is associated with the user when the first user identifier and the second user identifier match; and determining that the application is not associated with the user when the first user identifier and the second user identifier do not match.
5. The method of claim 1, wherein said enabling comprises: determining that a resource package is required to execute the application on the computing device; retrieving the resource package from a data source remotely located from the portable storage device; and executing the application based on the resource package.
6. The method of claim 4, wherein the resource package comprises at least one of: a language resource package; a graphics resource package; a user interface resource package; or an architecture-specific resource package.
7. The method of claim 1, wherein said enabling comprises: determining that the application is encrypted; determining whether the user has a license to execute the application; in response to determining that the user has the license, retrieving a cryptographic key and decrypting the encrypted application using the cryptographic key; and in response to determining that the user does not have the license, prompting the user to purchase the license and retrieving the cryptographic key after the license has been purchased.
8. A system in a computing device, comprising: an application detector configured to determine that a portable storage device coupled with a computing device stores an application configured on the portable storage for execution on the computing device without requiring installation on the computing device; a user interface configured to, in response to a determination that the portable storage device stores the application, display a user-selectable application identifier for the application to a user of the computing device, the user interface further configured to detect that a user has selected the user-selectable application identifier; an application association module configured to determine whether the application is associated with the user; and an application execution enabler configured to, in response to a determination that the application is associated with the user, enable the application for execution on the computing device without installation on the computing device.
9. The system of claim 8, wherein the application execution enabler comprises: a state manager configured to retrieve state information associated with the selected application from the portable storage device in response to a determination that the application is associated with the user; and an application execution module configured to execute the selected application based on the retrieved state information without installation on the computing device in response to the determination that the application is associated with the user.
10. The system of claim 8, wherein the application association module is configured to determine whether the application is associated with the user by: comparing a first user identifier utilized to log into the computing device is the same as a second user identifier associated with the application; determining that the application is associated with the user when the first user identifier and the second user identifier match; and determining that the application is not associated with the user when the first user identifier and the second user identifier do not match.
11. The system of claim 9, wherein the application execution enabler comprises: a deployment manger configured to: determine that a resource package is required to execute the application on the computing device; and retrieve the resource package from a data source remotely located from the portable storage device; wherein the application execution module is configured to execute the application based on the resource package.
12. The system of claim 11, wherein the resource package comprises at least one of: a language resource package; a graphics resource package; a user interface resource package; or an architecture-specific resource package.
13. The system of claim 8, wherein the application execution enabler comprises: an decryption module configured to: determine that the application is encrypted; determine whether the user has a license to execute the application; in response to a determination that the user has the license, retrieve a cryptographic key and decrypt the encrypted application using the cryptographic key; and in response to a determination that the user does not have the license, prompt the user to purchase the license and retrieve the cryptographic key after the license has been purchased.
14. A method, comprising: installing an application on a portable storage device; storing state information of the application obtained during execution of the application to the portable storage device; and encrypting the application and the state information using at least one first cryptographic key.
15. The method of claim 14, further comprising: storing installation files utilized to install the application on a computing device on the portable storage device; and encrypting the installation files using a second cryptographic key.
16. The method of claim 14, wherein the at least one first cryptographic key is a user-specific cryptographic key.
17. The method of claim 14, wherein the second cryptographic key is a license-specific cryptographic key.
18. A system in a computing device, comprising: an application installer configured to install an application on a portable storage device; a state manager configured to store state information of the application obtained during execution of the application to the portable storage device; and an encryption module configured to encrypt the application and the state information using at least one first cryptographic key.
19. The system of claim 18, wherein the application installer is further configured to store installation files utilized to install the application on a computing device on the portable storage device, and wherein the encryption module is configured to encrypt the installation files using a second cryptographic key.
20. The system of claim 18, wherein the at least one first cryptographic key is a user-specific cryptographic key.
Description
BRIEF DESCRIPTION OF THE DRAWINGS/FIGURES
[0008] The accompanying drawings, which are incorporated herein and form a part of the specification, illustrate examples of the present application and, together with the description, further serve to explain the principles of the examples and to enable a person skilled in the pertinent art to make and use the examples.
[0009]
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031] The features and advantages of the present invention will become more apparent from the detailed description set forth below when taken in conjunction with the drawings, in which like reference characters identify corresponding elements throughout. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements. The drawing in which an element first appears is indicated by the leftmost digit(s) in the corresponding reference number.
DETAILED DESCRIPTION
I. Introduction
[0032] The present specification and accompanying drawings disclose one or more examples that incorporate the features of the present invention. The scope of the present invention is not limited to the disclosed examples. The disclosed examples merely exemplify the present invention, and modified versions of the disclosed examples are also encompassed by the present invention. Examples of the present invention are defined by the claims appended hereto.
[0033] References in the specification to one example, an example, etc., indicate that the example described may include a particular feature, structure, or characteristic, but every example may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same example. Further, when a particular feature, structure, or characteristic is described in connection with an example, it is submitted that it is within the knowledge of one skilled in the art to effect such feature, structure, or characteristic in connection with other examples whether or not explicitly described.
[0034] Numerous exemplary examples are described as follows. It is noted that any section/subsection headings provided herein are not intended to be limiting. Examples are described throughout this document, and any type of example may be included under any section/subsection. Furthermore, examples disclosed in any section/subsection may be combined with any other examples described in the same section/subsection and/or a different section/subsection in any manner.
II. Exemplary Examples
[0035] Examples described herein enable one or more software application(s) (also referred to as applications or apps) to be installed onto a portable storage device and executed by a first computing device coupled to the portable storage device without having to install the application(s) onto the first computing device. While the application(s) are being executed, state information associated with the application(s) may be maintained and also stored on the portable storage device. When the portable storage device is de-coupled from the first computing device and coupled to a second computing device, the application(s) installed on the portable storage device may continue execution from the point where the user stopped using the application(s) on the first computing device without having to install the applications(s) on the second computing device.
[0036] The foregoing may be achieved regardless of the type of computing device used to execute the application(s) installed on the portable storage device. For example, the first computing device may be a desktop computer, and the second computing device may be a smart phone or tablet. To account for potential compatibly issues between the first computing device and the second computing device, additional components may be downloaded and/or installed that enable the application(s) to properly execute on the second computing device. The additional components may provide additional resources and/or functionality for the application(s), such as additional language functionality, graphics functionality, hardware architecture functionality, etc.
[0037] For example, suppose a user is playing a video game on a mobile device, such as a tablet or smart phone. However, the user gets frustrated with the smaller screen size and decides she wants to play the video game on her desktop computer. The user would simply remove the portable storage device from the mobile device and couple it to the desktop computer. Additional components may be downloaded to support the enhanced graphics functionality and/or hardware architecture supported by the desktop computer. Once the additional components are installed, the user may resume playing the video game from the point at which she stopped playing the game on the mobile device.
[0038] In accordance with an example, the application(s) installed on the portable storage device are Universal Windows Platform (UWP) applications, which are platform-homogenous applications (i.e., applications that can be executed on any device (e.g., a computer, tablet, smartphone, etc.)) executing the same operating system. In accordance with such an example, the additional component(s) may be resource packages that are downloaded from an application store (e.g., the Windows Store provided by Microsoft Corporation, the App Store provided by Apple, Inc., the Google Play Store provided by Google, Inc., etc.). In other examples, the application(s) installed on the portable storage device may be other types of applications.
[0039] In situations in which the second computing device requires the application(s) to be installed thereon to be executed, the portable storage device may further store one or more application installation files that are used to install the application(s) onto the second computing device.
[0040] Accordingly, the examples described herein advantageously allow a user to continue using an application from any computing device, and across computing devices, in a simple and efficient manner without having to download and/or install the application on each computing device. Moreover, by simply requiring certain components to be downloaded (rather than the entire application) and/or storing application installation file(s) on the portable computing device, network bandwidth, which is normally consumed from downloading such components and installation file(s), is conserved. It is noted that while the application does not need to be installed (e.g., files associated with the application do not need to be copied and/or located on the computing device, but can be accessed on the portable storage device), one or more additional steps may be performed by in order for the computing device to execute the application. For example, the computing device may perform a registration process that registers the application on the computing device, which may enable the computing device to access and/or execute the application.
[0041] For instance,
[0042] Computing device 102 includes a primary (or main) memory 106. Primary memory 106 includes one or more physical hardware memory devices accessible by one or more processors (not shown in
[0043] As shown in
[0044] Operating system 108 may have one or more components that perform tasks relating to the installation of software in memory or devices coupled to first computing device 102. One such component is portable application installer 110. Portable application installer 110 is configured to install an application 112 on to portable storage device 104. Application 112 may be executed by a processor (not shown in
[0045] In accordance with an example, portable application installer 110 is also configured to encrypt application 112 and/or application state information 114. Portable application installer 110 may be configured to perform the encryption using one or more cryptographic keys that are specific to the user. For example, the cryptographic key(s) may be associated with a user identification (ID) associated with the user, which the user uses to log into first computing device 102 and/or other computing devices. In accordance with an example, one cryptographic key is used to encrypt both application 112 and application state information 114. In accordance with another example, one cryptographic key is used encrypt application 112 and another cryptographic key is used to encrypt application state information 114. An example of a user ID includes, but is not limited to, a Microsoft Account ID (also referred to as an MSA ID), which enables users to log into websites (e.g., Outlook.com), devices (computers, tablets, smart phones, etc.), and/or applications (e.g., Visual Studio) using a single ID. Portable application installer 110 may include an encryption module (as described in further detail below) configured to encrypt application 112 and/or application state information 114 according to any encryption technique or algorithm known to persons skilled in the relevant art(s), including a private-key encryption technique or a public-key encryption technique (e.g., PGP (pretty good privacy), etc.), content scrambling system (CSS), advanced encryption standard (AES), or other encryption algorithm. Although several examples of encryption techniques are mentioned, these examples are provided for purposes of illustration and are not intended to be limiting.
[0046] By storing application 112 and application state information 114 on portable storage device 104, a user is enabled to couple portable storage device 112 to any computing device, launch application 112 and continue using application 112 from the point (a program state) where the user stopped using application on first computing device 102.
[0047] Portable application installer 110 may further be configured to store one or more application installation files 116 that are used to install application 112 onto portable storage device 104. Examples of application installation file(s) 116 include, but are not limited, an installer package (e.g., an .msi file) containing instructions regarding installing application 112, a setup file (e.g., a setup.exe. file) that causes the launching of the installation procedure, one or more library files (e.g., dynamic link library (DLL) files), configuration/description files (e.g., .ini files), and/or any other file(s) required to install application 112.
[0048] By storing application installation file(s) 116 on portable storage device 104, a user is enabled to couple portable storage device 104 to a computing device not associated with the user (e.g., another user's device or a device in which the user does not sign into using a user ID), and install application 112 onto the other computing device without having to download application installation file(s) 116 from a remote data store, such as an application store.
[0049] In accordance with an example, application 112 is only installed if the user has a license to install and/or execute application 112 on the other computing device. In accordance with such an example, portable application installer 110 is configured to encrypt application installation file(s) 116. Portable application installer 110 may be configured to perform the encryption using a cryptographic key that is associated with a valid license for application 112. For example, after obtaining the license to install and/or execute application 112 on another computing device, the other computing device may be provided the cryptographic key used to decrypt application installation file(s) 116, thereby enabling installation of application 112 on the other computing device.
[0050]
[0051] Operating system 122 may have one or more components that perform tasks relating to the loading and/or execution of software on second computing device 118. One such component is portable application loader 124. Upon coupling (e.g., inserting, attaching, etc.) portable storage device 104 to second computing device 118 (after disconnecting from first computing device 102 of
[0052] Upon determining the application(s) installed on portable storage device 104, portable application loader 124 may cause one or more user-selectable application identifiers for each of the application(s) installed on portable storage device 104 to be displayed to a user (e.g., via a graphical user interface (GUI) rendered to a display device coupled to or integrated with second computing device 118). The GUI may further display indicator(s) to the user indicating whether additional component(s) must be retrieved and/or installed and/or whether installation of application 112 on second computing device 118 is required on second computing device 118, for example, due to second computing device 118 being associated with a different user.
[0053] When determining that second computing device 118 is associated with the user and/or responsive to the user activating the user-selectable application identifier that identifies application 112 (e.g. by touching it on a touchscreen, pointing to it with a mouse and clicking, etc.), portable application loader 124 may retrieve application state information 114 and execute application 112 based on application state information 114, thereby enabling the user to continue using application 112 from the point where the user stopping using application 112 on first computing device 102. In accordance with an example in which application 112 and/or application state information 114 are encrypted, portable application loader 124 may obtain user-specific cryptographic key(s) and decrypt application 112 and/or application state information 114 based on the user-specific cryptographic key(s). The user-specific cryptographic key(s) may be stored and retrieved from portable storage device 104. Alternatively, the user-specific cryptographic key(s) may be stored and retrieved from a remote data source (e.g., an application store, a software license server, etc.). Portable application loader 124 may include a decryption module configured to decrypt application 112 and/or application state information 114 encrypted according to any encryption scheme mentioned elsewhere herein or otherwise known.
[0054] When determining that additional components are required, portable application loader 124 may retrieve the additional components from a remote data source (e.g., an application store) that is remotely located from second computing device 118, install the additional components, and execute application 112 in accordance with the additional components.
[0055] In response to determining that second computing device 118 is not associated with the user, portable application loader 124 may retrieve application installation file(s) 116 from portable storage device 104 and install application 112 onto second computing device 118 using application installation file(s) 116. In the event that a license is required to install and/or execute application 112, portable application loader 124 may request the user to accept the install, may prompt the user to purchase a license, and may begin installation of application 112 after a license is purchased. In accordance with an example in which application installation file(s) 116 are encrypted, portable application loader 124 may obtain a license-specific cryptographic key after the user has purchased the license and decrypt application installation file(s) 116 based on the license-based cryptographic key. The license-based cryptographic key may be stored and retrieved from portable storage device 104. Alternatively, the license-specific cryptographic key may be stored and retrieved from a remote data source (e.g., an application store, a software license server, etc.).
[0056] Accordingly, in examples, an application may be installed on a portable storage device in many ways. For instance,
[0057] Flowchart 200 begins with step 202. In step 202, an application is installed on a portable storage device. For example, with reference to
[0058] At step 204, state information of the application obtained during execution of the application is stored to the portable storage device. For example, with reference to
[0059] At step 206, the application and the state information are encrypted using at least one first cryptographic key. For example, with reference to
[0060] In accordance with one or more examples, first cryptographic key 322 is a user-specific cryptographic key. For example, first cryptographic key 322 may be associated with a user ID associated with the user, which the user uses to log into first computing device 302 and/or other devices, websites, and/or applications. Examples of such a user ID is a Microsoft Account ID (also referred to as an MSA ID), which enables users to log into websites (e.g., Outlook.com), devices (computers, tablets, smart phones, etc.), and/or applications (e.g., Visual Studio) using a single ID. By doing so, application 312 and application state information 314 may be decrypted and utilized on other computing devices (e.g., computing device 118, as shown in
[0061] In accordance with one or more examples, portable application installer 310 may further be configured to store application installation file(s) onto portable storage device 104. The application installation file(s) may be used to install application 312 onto another computing device. For instance,
[0062] Flowchart 400 begins with step 402. In step 402, installation files utilized to install the application on a computing device are stored on the portable storage device. For example, with reference to
[0063] At step 404, the installation files are encrypted using a second cryptographic key. For example, with reference to
[0064] In accordance with one or more examples, second cryptographic key 502 is a license-specific cryptographic key. For example, second cryptographic key 502 may be associated with a valid license for application 312. By doing so, application installation file(s) 516 may be decrypted and utilized on other computing devices so long as a valid license for application 312 is obtained.
[0065] As described above, applications installed on a portable storage device may be used on different computing devices without requiring installation on those devices. For instance,
[0066] Flowchart 600 begins with step 602. In step 602, a determination is made that a portable storage device coupled with a computing device stores an application configured on the portable storage device for execution on the computing device without requiring installation on the computing device. For example, with reference to
[0067] At step 604, in response to the determination of step 702, a user-selectable application identifier for the application is displayed to a user of the computing device. For example, with reference to
[0068] In accordance with an example, application identifier 705 is shown via a window that is displayed to the user responsive to receiving read data 703. By way of example,
[0069] In accordance with another example, application identifier 705 is integrated with a listing of application identifier(s) for application(s) installed on computing device 718. By way of example,
[0070] As shown in
[0071] Referring again to
[0072] At step 608, in response to the detection at step 606, a determination is made as to whether the application is associated with the user. For example, with reference to
[0073] At step 610, the application is enabled for execution on the computing device without installation on the computing device. For example, with reference to
[0074] After a selected application has been enabled for execution on computing device 718, the application identifier corresponding to the selected application may be displayed in a manner to indicate that the selected application is enabled for execution. By way of example,
[0075] It is noted that the manner in which application identifier(s) are displayed are not limited to the techniques described above with reference to
[0076] In accordance with one or more examples, in response to determining that the application is not associated with the user, the user is enabled to install the application on the computing device. For example, with reference to
[0077] In an example in which an integrated list is used to display application identifier(s) (as described above with reference to
[0078] In examples, an application may be enabled for execution without installation on a computing device in many ways. For instance,
[0079] Flowchart 1100 begins with step 1102. In step 1102, state information associated with the selected application is retrieved from the portable storage device. For example, with reference to
[0080] At step 1104, the selected application is executed based on the retrieved state information without installation on the computing device. For example, with reference to
[0081] In examples, application association module 711 (as described above with reference to
[0082] Flowchart 1300 begins with step 1302. At step 1302, a first user identifier utilized to log into the computing device is compared with a second user identifier associated with the application. For example, with reference to
[0083] At step 1304, a determination is made that the application is associated with the user when the first user identifier and the second user identifier match. For example, with reference to
[0084] At step 1306, a determination is made that the application is not associated with the user when the first user identifier and the second user identifier do not match. For example, with reference to
[0085]
[0086] Flowchart 1500 begins with step 1502. In step 1502, a determination is made that a resource package is required to execute the application on the computing device. For example, computing device 1618 may not be fully compatible with application 1612. For instance, computing device 1618 may have a different processing architecture than another computing device (e.g., computing device 302, as shown in
[0087] With reference to
[0088] At step 1606, the resource package is retrieved form a remote data store 1606. For example, with reference to
[0089] At step 1506, the application is executed based on the resource package. For example, with reference to
[0090]
[0091] Flowchart 1700 begins with step 1702. At step 1702, it is determined that an application is encrypted. For example, with reference to
[0092] At step 1704, a determination is made as to whether the user has a license to execute the application. For example, with reference to
[0093] At step 1706, the user is prompted to purchase the license and a cryptographic key is retrieved after the license has been purchased. For example, with reference to
[0094] At step 1708, a cryptographic key is retrieved and the encrypted application is decrypted using the cryptographic key. For example, with reference to
III. Example Mobile and Stationary Device
[0095] First computing device 102, operating system 108, portable application installer 110, second computing device 118, operating system 122, portable application loader 124, portable storage device 304, installer module 306, encryption module 308, portable application installer 310, state manager 320, application detector 702, user interface 706, application execution enabler 708, application association module 711, application installer 717, portable application loader 724, application execution enabler 1208, state manager 1210, application execution module 1220, deployment manager 1602, application execution enabler 1608, application execution module 1620, decryption module 1802, user interface 1806, application execution enabler 1808, flowchart 200, flowchart 400, flowchart 600, flowchart 1000, flowchart 1300, flowchart 1500, and/or flowchart 1700 may be implemented in hardware, or hardware with any combination of software and/or firmware, including being implemented as computer program code configured to be executed in one or more processors and stored in a computer readable storage medium, or being implemented as hardware logic/electrical circuitry, such as being implemented together in a system-on-chip (SoC). The SoC may include an integrated circuit chip that includes one or more of a processor (e.g., a microcontroller, microprocessor, digital signal processor (DSP), etc.), memory, one or more communication interfaces, and/or further circuits and/or embedded firmware to perform its functions.
[0096]
[0097] For instance, components 1902 of mobile device 1902 are examples of components that may be included in first computing device 102, second computing device 118, computing device 302, computing device 718, computing device 1218, computing device 1618, and/or computing device 1818, in mobile device examples. Any number and combination of the features/elements of components 1902 may be included in a mobile device example, as well as additional and/or alternative features/elements, as would be known to persons skilled in the relevant art(s). Such features/elements may also be included in stationary device examples.
[0098] Mobile device 1902 can include a controller or processor referred to as processor circuit 1910 for performing such tasks as signal coding, image processing, data processing, input/output processing, power control, and/or other functions. Processor circuit 1910 is an electrical and/or optical circuit implemented in one or more physical hardware electrical circuit device elements and/or integrated circuit devices (semiconductor material chips or dies) as a central processing unit (CPU), a microcontroller, a microprocessor, and/or other physical hardware processor circuit. Processor circuit 1910 may execute program code stored in a computer readable medium, such as program code of one or more applications 1914, operating system 1912, any program code stored in memory 120, etc. Operating system 1912 can control the allocation and usage of the components 102 and support for one or more application programs 1514 (a.k.a. applications, apps, etc.). Application programs 1914 can include common mobile computing applications (e.g., email applications, calendars, contact managers, web browsers, messaging applications) and any other computing applications (e.g., word processing applications, mapping applications, media player applications).
[0099] As illustrated, mobile device 1902 can include memory 1920. Memory 1920 can include non-removable memory 1922 and/or removable memory 1924. The non-removable memory 1922 can include RAM, ROM, flash memory, a hard disk, or other well-known memory storage technologies. The removable memory 1924 can include flash memory or a Subscriber Identity Module (SIM) card, which is well known in GSM communication systems, or other well-known memory storage technologies, such as smart cards. The memory 1920 can be used for storing data and/or code for running the operating system 1912 and the applications 1914. Example data can include web pages, text, images, sound files, video data, or other data sets to be sent to and/or received from one or more network servers or other devices via one or more wired or wireless networks. Memory 1920 can be used to store a subscriber identifier, such as an International Mobile Subscriber Identity (IMSI), and an equipment identifier, such as an International Mobile Equipment Identifier (IMEI). Such identifiers can be transmitted to a network server to identify users and equipment.
[0100] A number of programs may be stored in memory 1920. These programs include operating system 1912, one or more application programs 1914, and other program modules and program data. Examples of such application programs or program modules may include, for example, computer program logic (e.g., computer program code or instructions) for implementing, operating system 108, portable application installer 110, operating system 122, portable application loader 124, portable storage device 304, portable application installer 310, installer module 302, encryption module 306, state manager 308, application detector 702, user interface 706, application execution enabler 708, application association module 711, application installer 717, portable application loader 724, application execution enabler 1208, state manager 1210, application execution module 1220, application execution enabler 1608, deployment manager 1062, application execution module 1620, application execution enabler 1808, decryption module 1802, user interface 1806, flowchart 200, flowchart 400, flowchart 600, flowchart 1000, flowchart 1300, flowchart 1500, and/or flowchart 1700 (including any suitable step of flowcharts 200, 400, 600, 1000, 1300, 1500, and 1700), and/or further examples described herein.
[0101] Mobile device 1902 can support one or more input devices 1930, such as a touch screen 1932, microphone 1934, camera 1936, physical keyboard 1938 and/or trackball 1940 and one or more output devices 1950, such as a speaker 1952 and a display 1954. Touch screens, such as touch screen 1932, can detect input in different ways. For example, capacitive touch screens detect touch input when an object (e.g., a fingertip) distorts or interrupts an electrical current running across the surface. As another example, touch screens can use optical sensors to detect touch input when beams from the optical sensors are interrupted. Physical contact with the surface of the screen is not necessary for input to be detected by some touch screens. For example, the touch screen 1932 may be configured to support finger hover detection using capacitive sensing, as is well understood in the art. Other detection techniques can be used, as already described above, including camera-based detection and ultrasonic-based detection. To implement a finger hover, a user's finger is typically within a predetermined spaced distance above the touch screen, such as between 0.1 to 0.25 inches, or between 0.0.25 inches and 0.05 inches, or between 0.0.5 inches and 0.75 inches or between 0.75 inches and 1 inch, or between 1 inch and 1.5 inches, etc.
[0102] The touch screen 1932 is shown to include a control interface 1992 for illustrative purposes. The control interface 1992 is configured to control content associated with a virtual element that is displayed on the touch screen 1932. In an example, the control interface 1992 is configured to control content that is provided by one or more of applications 1914. For instance, when a user of the mobile device 1902 utilizes an application, the control interface 1992 may be presented to the user on touch screen 1932 to enable the user to access controls that control such content. Presentation of the control interface 1992 may be based on (e.g., triggered by) detection of a motion within a designated distance from the touch screen 1932 or absence of such motion. Examples for causing a control interface (e.g., control interface 1992) to be presented on a touch screen (e.g., touch screen 1932) based on a motion or absence thereof are described in greater detail below.
[0103] Other possible output devices (not shown) can include piezoelectric or other haptic output devices. Some devices can serve more than one input/output function. For example, touch screen 1932 and display 1954 can be combined in a single input/output device. The input devices 1930 can include a Natural User Interface (NUI). An NUI is any interface technology that enables a user to interact with a device in a natural manner, free from artificial constraints imposed by input devices such as mice, keyboards, remote controls, and the like. Examples of NUI methods include those relying on speech recognition, touch and stylus recognition, gesture recognition both on screen and adjacent to the screen, air gestures, head and eye tracking, voice and speech, vision, touch, gestures, and machine intelligence. Other examples of a NUI include motion gesture detection using accelerometers/gyroscopes, facial recognition, 3D displays, head, eye, and gaze tracking, immersive augmented reality and virtual reality systems, all of which provide a more natural interface, as well as technologies for sensing brain activity using electric field sensing electrodes (EEG and related methods). Thus, in one specific example, the operating system 1912 or applications 1914 can comprise speech-recognition software as part of a voice control interface that allows a user to operate the device 1500 via voice commands. Further, mobile device 1902 can comprise input devices and software that allows for user interaction via a user's spatial gestures, such as detecting and interpreting gestures to provide input to a gaming application.
[0104] Wireless modem(s) 1960 can be coupled to antenna(s) (not shown) and can support two-way communications between processor circuit 1910 and external devices, as is well understood in the art. The modem(s) 1960 are shown generically and can include a cellular modem 1966 for communicating with the mobile communication network 1904 and/or other radio-based modems (e.g., Bluetooth 1964 and/or Wi-Fi 1962). Cellular modem 1966 may be configured to enable phone calls (and optionally transmit data) according to any suitable communication standard or technology, such as GSM, 3G, 4G, 5G, etc. At least one of the wireless modem(s) 1960 is typically configured for communication with one or more cellular networks, such as a GSM network for data and voice communications within a single cellular network, between cellular networks, or between the mobile device and a public switched telephone network (PSTN).
[0105] Mobile device 1902 can further include at least one input/output port 1980, a power supply 1982, a satellite navigation system receiver 1984, such as a Global Positioning System (GPS) receiver, an accelerometer 1986, and/or a physical connector 1990, which can be a USB port, IEEE 1394 (FireWire) port, and/or RS-232 port. The illustrated components 1902 are not required or all-inclusive, as any components can be not present and other components can be additionally present as would be recognized by one skilled in the art.
[0106]
[0107] As shown in
[0108] System 2000 also has one or more of the following drives: a hard disk drive 2014 for reading from and writing to a hard disk, a magnetic disk drive 2016 for reading from or writing to a removable magnetic disk 2018, and an optical disk drive 2020 for reading from or writing to a removable optical disk 2022 such as a CD ROM, DVD ROM, BLU-RAY disk or other optical media. Hard disk drive 2014, magnetic disk drive 2016, and optical disk drive 2020 are connected to bus 2006 by a hard disk drive interface 2024, a magnetic disk drive interface 2026, and an optical drive interface 2028, respectively. The drives and their associated computer-readable media provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for the computer. Although a hard disk, a removable magnetic disk and a removable optical disk are described, other types of computer-readable memory devices and storage structures can be used to store data, such as flash memory cards, digital video disks, random access memories (RAMs), read only memories (ROM), and the like.
[0109] A number of program modules may be stored on the hard disk, magnetic disk, optical disk, ROM, or RAM. These program modules include an operating system 2030, one or more application programs 2032, other program modules 2034, and program data 2036. In accordance with various examples, the program modules may include computer program logic that is executable by processing unit 2002 to perform any or all of the functions and features of first computing device 102, second computing device 118, computing device 302, computing device 718, computing device 1118, computing device 1618, and/or computing device 1818. The program modules may also include computer program logic that, when executed by processing unit 1802, causes processing unit 1802 to perform any of the steps of any of flowchart 200, flowchart 400, flowchart 600, flowchart 1000, flowchart 1300, flowchart 1500, and/or flowchart 1700, as described above.
[0110] A user may enter commands and information into system 2000 through input devices such as a keyboard 2038 and a pointing device 2040 (e.g., a mouse). Other input devices (not shown) may include a microphone, joystick, game controller, scanner, or the like. In one example, a touch screen is provided in conjunction with a display 2044 to allow a user to provide user input via the application of a touch (as by a finger or stylus for example) to one or more points on the touch screen. These and other input devices are often connected to processing unit 2002 through a serial port interface 2042 that is coupled to bus 2006, but may be connected by other interfaces, such as a parallel port, game port, or a universal serial bus (USB). Such interfaces may be wired or wireless interfaces.
[0111] Display 2044 is connected to bus 2006 via an interface, such as a video adapter 1846. In addition to display 2044, system 2000 may include other peripheral output devices (not shown) such as speakers and printers.
[0112] System 2000 is connected to a network 2048 (e.g., a local area network or wide area network such as the Internet) through a network interface 2050, a modem 2052, or other suitable means for establishing communications over the network. Modem 2052, which may be internal or external, is connected to bus 2006 via serial port interface 2042.
[0113] As used herein, the terms computer program medium, computer-readable medium, and computer-readable storage medium are used to generally refer to memory devices or storage structures such as the hard disk associated with hard disk drive 2014, removable magnetic disk 2018, removable optical disk 2022, as well as other memory devices or storage structures such as flash memory cards, digital video disks, random access memories (RAMs), read only memories (ROM), and the like. Such computer-readable storage media are distinguished from and non-overlapping with communication media (do not include communication media). Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave. The term modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wireless media such as acoustic, RF, infrared and other wireless media. Examples are also directed to such communication media.
[0114] As noted above, computer programs and modules (including application programs 2032 and other program modules 2034) may be stored on the hard disk, magnetic disk, optical disk, ROM, or RAM. Such computer programs may also be received via network interface 2050, serial port interface 2042, or any other interface type. Such computer programs, when executed or loaded by an application, enable system 2000 to implement features of examples discussed herein. Accordingly, such computer programs represent controllers of the system 2000. Examples are also directed to computer program products comprising software stored on any computer useable medium. Such software, when executed in one or more data processing devices, causes a data processing device(s) to operate as described herein. Examples may employ any computer-useable or computer-readable medium, known now or in the future. Examples of computer-readable mediums include, but are not limited to memory devices and storage structures such as RAM, hard drives, floppy disks, CD ROMs, DVD ROMs, zip disks, tapes, magnetic storage devices, optical storage devices, MEMs, nanotechnology-based storage devices, and the like.
IV. Examples
[0115] In one example, a method comprises: determining that a portable storage device coupled with a computing device stores an application configured on the portable storage device for execution on the computing device without requiring installation on the computing device; in response to said determining, displaying a user-selectable application identifier for the application to a user of the computing device; detecting that a user has selected the user-selectable application identifier; in response to said detecting, determining whether the application is associated with the user; and in response to determining that the application is associated with the user, enabling the application for execution on the computing device without installation on the computing device.
[0116] In an example, the enabling comprises: retrieving state information associated with the selected application from the portable storage device; and executing the selected application based on the retrieved state information without installation on the computing device.
[0117] In an example, in response to determining that the application is not associated with the user, enabling the user to install the application on the computing device.
[0118] In an example, the determining whether the application is associated with the user comprises: comparing first user identifier utilized to log into the computing device with a second user identifier associated with the application; determining that the application is associated with the user when the first user identifier and the second user identifier match; and determining that the application is not associated with the user when the first user identifier and the second user identifier do not match.
[0119] In an example, the enabling comprises: determining that a resource package is required to execute the application on the computing device; retrieving the resource package from a data source remotely located from the portable storage device; and executing the application based on the resource package.
[0120] In an example, the resource package comprises at least one of: a language resource package; a graphics resource package; a user interface resource package; or an architecture-specific resource package.
[0121] In an example, the enabling comprises: determining that the application is encrypted; determining whether the user has a license to execute the application; in response to determining that the user has the license, retrieving a cryptographic key and decrypting the encrypted application using the cryptographic key; and in response to determining that the user does not have the license, prompting the user to purchase the license and retrieving the cryptographic key after the license has been purchased.
[0122] In another example, a system in a computing device comprises: an application detector configured to determine that a portable storage device coupled with a computing device stores an application configured on the portable storage for execution on the computing device without requiring installation on the computing device; a user interface configured to, in response to a determination that the portable storage device stores the application, display a user-selectable application identifier for the application to a user of the computing device, the user interface further configured to detect that a user has selected the user-selectable application identifier; an application association module configured to determine whether the application is associated with the user; and an application execution enabler configured to, in response to a determination that the application is associated with the user, enable the application for execution on the computing device without installation on the computing device.
[0123] In an example, the application execution enabler comprises: a state manager configured to retrieve state information associated with the selected application from the portable storage device in response to a determination that the application is associated with the user; an application execution module configured to execute the selected application based on the retrieved state information without installation on the computing device in response to the determination that the application is associated with the user.
[0124] In an example, the application association module is configured to determine whether the application is associated with the user by: comparing a first user identifier utilized to log into the computing device is the same as a second user identifier associated with the application; determining that the application is associated with the user when the first user identifier and the second user identifier match; and determining that the application is not associated with the user when the first user identifier and the second user identifier do not match.
[0125] In an example, the application execution enabler comprises: a deployment manger configured to: determine that a resource package is required to execute the application on the computing device; and retrieve the resource package from a data source remotely located from the portable storage device; wherein the application execution module is configured to execute the application based on the resource package.
[0126] In an example, the resource package comprises at least one of: a language resource package; a graphics resource package; a user interface resource package; or an architecture-specific resource package.
[0127] In an example, the application execution enabler comprises: an decryption module configured to: determine that the application is encrypted; determine whether the user has a license to execute the application; in response to a determination that the user has the license, retrieve a cryptographic key and decrypt the encrypted application using the cryptographic key; and in response to a determination that the user does not have the license, prompt the user to purchase the license and retrieve the cryptographic key after the license has been purchased.
[0128] In another example, a method comprises; installing an application on a portable storage device; storing state information of the application obtained during execution of the application to the portable storage device; and encrypting the application and the state information using at least one first cryptographic key.
[0129] In an example, the method further comprises: storing installation files utilized to install the application on a computing device on the portable storage device; and encrypting the installation files using a second cryptographic key.
[0130] In an example, the at least one first cryptographic key is a user-specific cryptographic key.
[0131] In an example, the second cryptographic key is a license-specific cryptographic key.
[0132] In another example, a system in a computing device comprises: an application installer configured to install an application on a portable storage device; a state manager configured to store state information of the application obtained during execution of the application to the portable storage device; and an encryption module configured to encrypt the application and the state information using at least one first cryptographic key.
[0133] In an example, the application installer is further configured to store installation files utilized to install the application on a computing device on the portable storage device, and wherein the encryption module is configured to encrypt the installation files using a second cryptographic key.
[0134] In an example, the at least one first cryptographic key is a user-specific cryptographic key.
[0135] In an example, the second cryptographic key is a license-specific cryptographic key.
V. Conclusion
[0136] While various examples of the present invention have been described above, it should be understood that they have been presented by way of example only, and not limitation. It will be understood by those skilled in the relevant art(s) that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined in the appended claims. Accordingly, the breadth and scope of the present invention should not be limited by any of the above-described exemplary examples, but should be defined only in accordance with the following claims and their equivalents.