摘要:
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing access to data on a client device. Permission indicators are associated with a sequence of instructions, and a protected activity is associated with one or more of the permission indicators and with an instruction within the sequence of instructions. The one or more permission indicators and the sequence of instructions are provided to a remote device. The remote device determines whether execution of the instruction is permitted based, at least in part, on the one or more permission indicators, and the remote device performs the protected activity if execution of the instruction is permitted.
摘要:
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing access to data on a client device. Permission indicators are associated with a sequence of instructions, and a protected activity is associated with one or more of the permission indicators and with an instruction within the sequence of instructions. The one or more permission indicators and the sequence of instructions are provided to a remote device. The remote device determines whether execution of the instruction is permitted based, at least in part, on the one or more permission indicators, and the remote device performs the protected activity if execution of the instruction is permitted.
摘要:
Systems and methods, including computer software adapted to perform certain operations, can be implemented for remotely defining security data for authorizing access to data on a client device. Permission indicators are associated with a sequence of instructions, and a protected activity is associated with one or more of the permission indicators and with an instruction within the sequence of instructions. The one or more permission indicators and the sequence of instructions are provided to a remote device. The remote device determines whether execution of the instruction is permitted based, at least in part, on the one or more permission indicators, and the remote device performs the protected activity if execution of the instruction is permitted.
摘要:
Techniques and systems are disclosed for managing computer resources available to multiple running instances of a media player program. The methods include monitoring consumption of computing resources of multiple running instances of a media player program to render respective media content in a graphical user interface of a computing device. The graphical user interface associated with an additional program configured to render additional content, different from the media content, to the graphical user interface. The additional program can be a browser. The methods further include instructing the multiple instances to reduce respective portions of the computing resources consumption upon determining that a requested increase in computer resources consumption of the media player program would cause the computer resources consumption of the media player program to exceed a first predetermined level.
摘要:
Systems and methods, including computer software adapted to perform certain operations, can be implemented for preventing content received from non-trusted sources from accessing protected data. A sequence of instructions and multiple permission indicators associated with the sequence of instructions are received. One or more of permission indicators are associated with a protected activity. An instruction within the sequence of instructions associated with the protected activity is identified. A determination is made whether execution of the identified instruction is permitted based, at least in part, on the one or more permission indicators, and the protected activity is performed if execution of the identified instruction is permitted.
摘要:
Systems and methods, including computer software adapted to perform certain operations, can be implemented for preventing content received from non-trusted sources from accessing protected data. A sequence of instructions and multiple permission indicators associated with the sequence of instructions are received. One or more of permission indicators are associated with a protected activity. An instruction within the sequence of instructions associated with the protected activity is identified. A determination is made whether execution of the identified instruction is permitted based, at least in part, on the one or more permission indicators, and the protected activity is performed if execution of the identified instruction is permitted.
摘要:
Techniques and systems are disclosed for managing computer resources available to multiple running instances of a media player program. The methods include monitoring consumption of computing resources of multiple running instances of a media player program to render respective media content in a graphical user interface of a computing device. The graphical user interface associated with an additional program configured to render additional content, different from the media content, to the graphical user interface. The additional program can be a browser. The methods further include instructing the multiple instances to reduce respective portions of the computing resources consumption upon determining that a requested increase in computer resources consumption of the media player program would cause the computer resources consumption of the media player program to exceed a first predetermined level.
摘要:
Techniques and systems are disclosed for managing computer resources available to multiple running instances of a media player program. The methods include monitoring consumption of computing resources of multiple running instances of a media player program to render respective media content in a graphical user interface of a computing device. The graphical user interface associated with an additional program configured to render additional content, different from the media content, to the graphical user interface. The additional program can be a browser. The methods further include instructing the multiple instances to reduce respective portions of the computing resources consumption upon determining that a requested increase in computer resources consumption of the media player program would cause the computer resources consumption of the media player program to exceed a first predetermined level.
摘要:
Systems and methods, including computer software adapted to perform certain operations, can be implemented for preventing content received from non-trusted sources from accessing protected data. A sequence of instructions and multiple permission indicators associated with the sequence of instructions are received. One or more of permission indicators are associated with a protected activity. An instruction within the sequence of instructions associated with the protected activity is identified. A determination is made whether execution of the identified instruction is permitted based, at least in part, on the one or more permission indicators, and the protected activity is performed if execution of the identified instruction is permitted.
摘要:
Systems and methods, including computer software adapted to perform certain operations, can be implemented for providing remotely defined security data to an application extension on a client device. A sequence of instructions and at least one permission indicator associated with the sequence of instructions are received. A first permission indicator is associated with a code extension to a software application adapted to execute at least a portion of the sequence of instructions. The code extension is adapted to perform one or more operations that supplement the operations supported by the software application. An instruction within the sequence of instructions associated with adapted for execution by the code extension and with an activity is identified. The first permission indicator is provided to the code extension. The code extension determines whether performance of the activity is permitted based, at least in part, on the first permission indicator.