Patent application number | Description | Published |
20130124583 | Presenting Metadata From Multiple Perimeters - In some implementations, a method for managing data in a user device includes pushing first metadata for a first resource in a first perimeter to a service external to the first perimeter. The first perimeter is configured to prevent external resources from accessing resources in the first perimeter. Second metadata for a second resource in a second perimeter is pushed to the external service. The external service is external to the second perimeter, the second perimeter being configured to prevent external resources from accessing resources in the second perimeter. Information is presented to the user based on a combination of the first metadata and the second metadata. | 05-16-2013 |
20130125198 | MANAGING CROSS PERIMETER ACCESS - In some implementations, a method of managing access to resources in a single device including receiving, from a first resource assigned to a first perimeter, a request to access a second resource assigned to a second perimeter different from the first perimeter. The single device includes the first perimeter and the second perimeter. Whether access to the second resource is prohibited is determined based on a management policy for the first perimeter. The management policy defining one or more rules for accessing resources assigned to the second perimeter including the second resource. | 05-16-2013 |
20140122617 | Method and Apparatus Pertaining to the Sending of Messages Lacking Identified Recipients - A control circuit detects an opportunity to send a message notwithstanding that no recipient is yet identified and identifies, without user input, a specific recipient from amongst a plurality of possible recipients of the message based, for example, on metadata regarding at least some of the possible recipients using one or more predetermined selection criteria. The control circuit can also determine a domain context for a message as corresponds to such an opportunity and use that domain context along with information corresponding to the message to query an invocation framework that cannot itself natively intuit domain context from the information. Received possible recipients can then be presented via a display to facilitate a user-based selection of one of the recipients. | 05-01-2014 |
20140122633 | Method and Apparatus Pertaining to Sharing Information Via a Private Data Area - Information is shared between processing entities that each have a corresponding private data area by placing data corresponding to information for a first one of the private data areas for a first one of the processing entities directly into a second one of the private data areas for a second one of the processing entities without placing the data in an intervening shared data area and without directly invoking a system administrator-like entity. In addition, these private data areas can be pre-populated with a plurality of directories that each have a one-to-one correspondence to a particular predetermined information recipient and then providing a link to a given one of the recipients as corresponds to a given one of the directories when information is placed in that directory to provide the corresponding predetermined information recipient with at least read access to the information. | 05-01-2014 |
20140207821 | PRESENTING METADATA FROM MULTIPLE PERIMETERS - In some implementations, a method for managing data in a user device includes pushing first metadata for a first resource in a first perimeter to a service external to the first perimeter. The first perimeter is configured to prevent external resources from accessing resources in the first perimeter. Second metadata for a second resource in a second perimeter is pushed to the external service. The external service is external to the second perimeter, the second perimeter being configured to prevent external resources from accessing resources in the second perimeter. Information is presented to the user based on a combination of the first metadata and the second metadata. | 07-24-2014 |
20140237054 | Method and Apparatus Pertaining to the Sending of Messages Lacking Identified Recipients - A control circuit detects an opportunity to send a message notwithstanding that no recipient is yet identified and identifies, without user input, a specific recipient from amongst a plurality of possible recipients of the message based, for example, on metadata regarding at least some of the possible recipients using one or more predetermined selection criteria. The control circuit can also determine a domain context for a message as corresponds to such an opportunity and use that domain context along with information corresponding to the message to query an invocation framework that cannot itself natively intuit domain context from the information. Received possible recipients can then be presented via a display to facilitate a user-based selection of one of the recipients. | 08-21-2014 |
20140280698 | Processing a Link on a Device - Systems, methods, and software can be used to process a link on a device. In some aspects, a link is received on a device. The link can be a link to content stored external to the device. The link can be selected by a user and associated with a first perimeter on the device. Based on the link and independent of user input, the device automatically determines whether to invoke an application in a second perimeter on the device to access the external content | 09-18-2014 |
20140372902 | Method and Apparatus Pertaining to History-Based Content-Sharing Recommendations - In one embodiment, an apparatus accesses a memory to obtain information regarding sharing history (as pertains, for example, to a particular user and/or device) and uses that sharing history to display at least one recommended sharing action (from amongst a plurality of available candidate sharing actions) as regards to a particular content item (such as, for example, a particular digital photograph, a video, a presentation, and so forth). This sharing history can comprise previously-selected sharing actions as correlated to content item types including shared-content recipients, corresponding temporal data, shared-content size, corresponding location data, and so forth. By one approach the apparatus itself serves to automatically track user-based content-sharing selections over time, which information is stored as the aforementioned sharing history. By one approach the user is presented with an opportunity to assert a non-specific share command that triggers the aforementioned display of one or more recommended sharing actions. | 12-18-2014 |