Abstract:
Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.
Abstract:
Systems and methods of sharing media content between devices are disclosed that include determining a change in presence when an electronic device is within a predetermined proximity of a display device, transmitting a notification to the electronic device within the predetermined proximity, the notification requesting input from the electronic device to accept or decline sharing media content data with the display device, and transmitting the media content data to the display device when the acceptance input is received. The display device and/or the server may determine when the electronic device is within the predetermined proximity. When the sharing of media content is accepted, media content data can be provided from the electronic device and/or a server to the display device.
Abstract:
A media store, as disclosed herein, may be composed of one or more canonical documents. Each of the canonical documents may refer to one or more of content items. Each content item may be a source file for a specific piece of content such as a movie or song. The system may represent variants of the content items as a single document, the canonical document. A user may view one or more of the content items referred to in the canonical document.
Abstract:
Methods and systems for updating components on a computing device are described herein. A computing device may perform an example method, which may include receiving, at the computing device, a notification of an update corresponding to an existing component on the computing device. Responsive to receiving the notification, the computing device may receive inputs from sensors of the computing device, which may provide information indicative of a given state of use, time of day, and location associated with the computing device. Based on a weighted combination of the inputs, the computing device may determine whether to update the existing component on the computing device and update the existing component. In some instances, the computing device may use information provided by another computing device to determine whether or not to initiate an update process.
Abstract:
Disclosed are methods, computing devices, and computer-readable mediums for transferring privacy settings. For example, a method includes determining location information indicative of a location of a computing device. Further, the method includes determining one or more applications installed on the computing device and on one or more other computing devices that are configured to access the location information. Yet further, the method includes transferring a privacy setting of the computing device to the one or more other computing devices. In addition, the method includes determining accesses of the one or more applications to the location information indicative of the location of the computing device.
Abstract:
A computing device executes one or more trusted execution environment (TEE) processes in a TEE of a processor. The one or more TEE processes cryptographically protect a secret and a policy. The policy specifies a plurality of conditions on usage of the secret. A particular non-TEE process generates a request whose fulfillment involves an action requiring use of the secret. Responsive to the request, one or more non-TEE processes determine whether a first subset of the plurality of conditions is satisfied. Responsive to the first subset of the plurality of conditions being satisfied, the one or more TEE processes determine that a second, different subset of the plurality of conditions is satisfied. Responsive to determining the second subset of the plurality of conditions is satisfied, the one or more TEE processes use the secret to perform the action.
Abstract:
Methods and systems for updating components on a computing device are described herein. A computing device may perform an example method, which may include receiving, at the computing device, a notification of an update corresponding to an existing component on the computing device. Responsive to receiving the notification, the computing device may receive inputs from sensors of the computing device, which may provide information indicative of a given state of use, time of day, and location associated with the computing device. Based on a weighted combination of the inputs, the computing device may determine whether to update the existing component on the computing device and update the existing component. In some instances, the computing device may use information provided by another computing device to determine whether or not to initiate an update process.
Abstract:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for receiving data indicating a particular language a user has associated with their user profile; identifying a different language that (i) the user has not previously associated with their user profile, and that (ii) a language recommendation engine has associated with the particular language; providing a recommendation to the user to associate the different language with their user profile; receiving, in response to the recommendation, an indication of whether to associate the different language with the user profile; and updating the user profile based on the indication.
Abstract:
Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.
Abstract:
A computing device executes one or more trusted execution environment (TEE) processes in a TEE of a processor. The one or more TEE processes cryptographically protect a secret and a policy. The policy specifies a plurality of conditions on usage of the secret. A particular non-TEE process generates a request whose fulfillment involves an action requiring use of the secret. Responsive to the request, one or more non-TEE processes determine whether a first subset of the plurality of conditions is satisfied. Responsive to the first subset of the plurality of conditions being satisfied, the one or more TEE processes determine that a second, different subset of the plurality of conditions is satisfied. Responsive to determining the second subset of the plurality of conditions is satisfied, the one or more TEE processes use the secret to perform the action.