US20150237110A1 - Web-Based Interaction With A Local System - Google Patents
Web-Based Interaction With A Local System Download PDFInfo
- Publication number
- US20150237110A1 US20150237110A1 US14/703,698 US201514703698A US2015237110A1 US 20150237110 A1 US20150237110 A1 US 20150237110A1 US 201514703698 A US201514703698 A US 201514703698A US 2015237110 A1 US2015237110 A1 US 2015237110A1
- Authority
- US
- United States
- Prior art keywords
- local
- web
- resource
- local resource
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
-
- G06F17/2247—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/14—Tree-structured documents
- G06F40/143—Markup, e.g. Standard Generalized Markup Language [SGML] or Document Type Definition [DTD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
-
- H04L67/42—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
Definitions
- the present disclosure generally relates to remote access interfaces and more particularly to systems, methods, and computer program products for facilitating web-based interaction with a local computer system.
- web browsers and web browser environments provide an isolated, consistent rendering and application programming interface (API) for web-based applications that does not provide access to the computing device's underlying and/or local system device drivers, services, and/or operating system APIs.
- API application programming interface
- web-based programming models provide an isolated environment in which web-based application can provide a defined set of functionality across a variety of computing device platforms. This is because if these web-based applications' software code were freely allowed to download and execute on the user's computing device, the software code could maliciously expose the memory, personal data, and/or operating system resources of the local computing device.
- these web-based applications often run in an isolated environment within the web browser environment.
- the isolated environment described above prevents web-based applications from accessing or making use of any underlying operating system services (e.g., drivers, APIs, reading and writing files, controlling input devices, etc.).
- operating system services e.g., drivers, APIs, reading and writing files, controlling input devices, etc.
- Such an isolated environment implemented by the above-mentioned web-based programming models, allows web-based applications to operate with limited, tightly-controlled resources. Thus, network access and access to the host system and operating system services are typically unavailable and/or prohibited.
- a component detects a user input made within a web-based application (i.e., client or client application).
- the client is located within a web browser environment.
- the user input indicates a user-desired action at a local system, such as taking a picture using a local system's camera.
- the local system is remotely located from the user's computing device.
- the client causes its local system interface component to transmit a request signal—based upon the user input—to the local system.
- the client receives a response signal from the local system, which contains information related to a requested action specified by the user input.
- the user input initially requests an action to be taken on local hardware and local software.
- Data is then transferred to a web-based service and a component of the client determines whether the client needs to contact a remote server. If communication with a remote server is required, a remote server interface component of the client sends a signal—containing desired information—to the remote server.
- security layers may be provided when a module determines whether the requested action—based upon the user input—is a permissible action.
- Such security layers may be implemented via a single step or multiple steps. Further, such authorization process(es) may be performed on a per-application basis, per-device basis, or “all-or-nothing” basis.
- FIG. 1 is a block diagram illustrating an interrelationship between exemplary components that facilitate web-based interaction with a local system, according to an embodiment of the present disclosure.
- FIG. 2 is a flowchart illustrating an exemplary process for facilitating web-based interaction with a local system, according to an embodiment of the present disclosure.
- FIG. 3 is a flowchart illustrating an exemplary process for facilitating web-based interaction with a local system, according to an embodiment of the present disclosure.
- FIGS. 4A-B are flowcharts illustrating exemplary processes for facilitating single-step and multi-step security methods, according to an embodiment of the present disclosure.
- FIGS. 5A-B are flowcharts illustrating exemplary processes for facilitating per-device-based and per-application-based security methods, according to an embodiment of the present disclosure.
- FIG. 6 is a flowchart illustrating an exemplary process for facilitating web-based interaction with a local system, according to an embodiment of the present disclosure.
- FIG. 7 is a block diagram of a computer system useful for implementing the present disclosure.
- FIG. 8 is a block diagram illustrating an interrelationship between exemplary components that facilitate web-based interaction with a local system, according to an embodiment of the present disclosure.
- FIG. 9 is a block diagram illustrating an interrelationship between exemplary components that facilitate web-based interaction with a local system, according to an embodiment of the present disclosure.
- the present disclosure is directed to methods, systems, and computer program products for facilitating web-based interaction with a local computer system.
- Configuration 100 depicts local system 104 containing a local web server 107 , local hardware 111 , and local software 112 accessed by a web client 102 .
- Local web server 107 communicates with local system interface 105 , local hardware 111 , and local software 112 .
- Web client 102 contains software modules for controlling operations of remote sever interface 115 and local system interface 105 .
- Remote server interface 115 communicates with remote server 114 and local system interface 105 .
- the methods, systems, and computer program products of the present disclosure provide an isolated web-based application, also referred to as web client 102 , operating within a web browser environment 103 capable of accessing local system 104 .
- Interaction is accomplished via a local system interface 105 —located within web browser environment 103 —that is located within web client 102 in communication with local web server 107 , which is located at and operated by local system 104 .
- local system is the computing device or devices that web client 102 accesses.
- local system 104 preferably includes computing devices equipped with local software 112 and/or local hardware 111 (e.g., cameras; scanners; global positioning system (GPS) antennae; motors; heat, light, motion or other sensors; etc.).
- local system 104 preferably includes computing devices capable of locally reading and writing data (e.g., media player, audio/video player, etc.).
- web client 102 communicates with remote server 114 to facilitate a web-based service, as specified by user input 101 from user 110 at a user interface screen of web client 102 .
- security layers are provided to authenticate user request (i.e., user input 101 ), thereby controlling access to local system 104 . The authentication process limits access to local system 104 via local web server 107 .
- web client 102 operates within web browser environment 103 .
- web browser environment 103 is a web browser optimized for operating on a portable electronic device (e.g., mobile phone, slate, laptop, etc.).
- web browser environment 103 operates on a stationary electronic device (e.g., standalone computing device, enterprise computing device, workstation, etc.).
- web client 102 includes one or more local system interface 105 modules and remote server interface 115 modules. These modules 105 , 115 communicate with one or more local systems 104 and remote servers 114 , respectively. Modules 105 , 115 generate and send signals in response to directives from web client 102 and receive signals from local systems 104 and remote servers 114 , respectively.
- modules 105 , 115 are portions of software code contained within web client 102 for facilitating communication with their designated targets (i.e., local systems 104 and remote servers 114 ).
- local system interface 105 and remote server interface 115 are part of an APIs designed to allow web client 102 , within web browser environment 103 , to access specific local system 104 services.
- local system interface 105 module and remote server interface 115 module may be part of web client 102 .
- local system interface 105 contains selected portions of an API required to communicate with local system 104 and/or remote server 114 . That is, when a developer has designed web client 102 to interact with only a portion of local system 104 , it is unnecessary to implement all portions of software code to communicate with local system 104 .
- web client 102 utilizes local system interface 105 to communicate with local system 104 .
- Local system interface 105 generates and transmits request signals 106 to local web server 107 , located on, and operated by, local system 104 .
- local system interface 105 provides additional APIs that facilitate interaction with local system 104 without additional developer knowledge of the local system 104 configuration (e.g., HTML, HTML5, CSS, representational state transfer web services, JavaScript, etc.).
- local web server 107 is a component of local system 104 that allows access to local hardware 111 and local software 112 of local system 104 .
- Local hardware 111 may include hardware capable of being operated at least in part by a computing device.
- Local hardware 111 may include internal and external input and output devices of local system 104 (e.g., cameras, scanners, global positioning system antennae, motors, sensors, etc.)
- local hardware 111 may include device drivers and APIs associated with the above-listed devices.
- Local software 112 may include all software capable of running on a computing device (e.g., operating system contained on local system 104 and its services, APIs, third-party application programs, other computing services, etc.).
- local software 112 includes a digital, modifiable calendar.
- local software 112 includes a service that facilitates reading and writing files contained on local hardware 111 .
- local web server 107 is a component of an operating system executing on local system 104 .
- local web server 107 may be a separate software program from the operating system, provided by the same and/or different developers of the operating system.
- local web server 107 accesses local hardware 111 and local software 112 via application development models that have direct knowledge of the operating system (e.g., C/C++, Win32, MFC, .NET Framework, APIs exposed through software development kits, etc.).
- local web server 107 is capable of returning response signals 109 to local system interface 105 of web client 102 . That is, local web server 107 sends signals to local hardware 111 and local software 112 , which cause local hardware 111 and local software 112 to perform the desired action, as specified by user input 101 . Local hardware 111 and local software 112 returns information—related to the desired action—to local web server 107 . Local web server 107 then generates response signals 109 containing information related to the desired action, which was carried out by local hardware 111 and local software 112 . Response signal 109 is sent by local web server 107 to local system interface 105 located at web client 102 in web browser environment 103 . These software modules allow APIs of web client 102 in web browser environment 103 to access local system 104 and utilize the local system services of local hardware 111 and local software 112 .
- a flowchart illustrating an exemplary process 200 for facilitating web-based interaction with a local system is shown.
- a user input 101 is received at web client 102 .
- user input 101 is from a user 110 indicating a desired action to initiate via the graphical user interface (GUI) of web client 102 .
- GUI graphical user interface
- user input 101 may be communicated to web client 102 by a computing device remotely located from web client 102 .
- web client 102 utilizes local system interface 105 to communicate with local system 104 . That is, local system interface 105 generates and transmits one or more request signals 106 to local web server 107 located on local system 104 .
- local web server 107 returns one or more response signals 109 to local system interface 105 of web client 102 . That is, local web server 107 causes local hardware 111 and/or local software 112 to perform the desired action, as specified by input 101 . Local hardware 111 and local software 112 returns information—related to the desired action—to local web server 107 . Local web server 107 then generates response signals 109 containing information related to the desired action, which was carried out by local hardware 111 and local software 112 .
- web client 102 may be a GPS-enabled application (executing within web browser environment 103 ) with a timer that continuously queries to obtain current GPS location via a remote (API) call to local system 104 (i.e., local hardware 111 ).
- API remote
- code implementing process 200 that facilitates web-based interaction with a local system may be part of a “standard” version of a web client 102 application that ships from a developer or may be later added as part of a update (or patch).
- a web client 102 application utilizing an embodiment the present disclosure advantageously does not need to modify the existing web browser environment 103 . That is, in an embodiment, the present disclosure does not change the way that the browser 103 interacts with local system 104 through existing web standards (e.g., HTTP, XML, RESTful services, etc.).
- the present disclosure overcomes the “sandboxing” problem—where the browser defines the local-machine API surface that web-based applications may utilize, forcing device developers to modify the browser should they wish to provide web applications access to additional hardware/software modules on local device 104 . More specifically, the sandboxing problem is overcome, in an embodiment, by leaving the browser intact and instead configuring modules 105 , 115 to provide an interface to local system 104 or remote server 114 , respectively, to expose the (additional) functionality of local hardware 111 /software 112 to the web-browser based application 102 .
- process 200 in FIG. 2 provides access to local system 104 via a representational state transfer (REST) API set.
- REST representational state transfer
- process 300 illustrates an example method of taking a picture with a web camera located within local hardware 111 , according to the present disclosure.
- a picture is saved to a web-based service.
- the user may also access a remote server 114 .
- remote server 114 is a computing device comprised of a private server, accessible by only user 110 .
- remote server 114 is a computing device comprised of one or more public servers hosting public, web-based services such as media sharing sites (e.g., FLICKR®), social media services (e.g., FACEBOOK®), remote data back-up services (e.g., DROPBOX®), and location-based services (e.g., FOURSQUARE®).
- media sharing sites e.g., FLICKR®
- social media services e.g., FACEBOOK®
- remote data back-up services e.g., DROPBOX®
- location-based services e.g., FOURSQUARE®
- step 304 web client 102 communicates with local system 104 in response to user input 101 by causing local system interface 105 to generate and transmit a request signal 106 to local web server 107 .
- step 306 in response to user input 101 of user 110 , local web server 107 receives a request signal 106 from local system interface 105 , and thereby causes the web camera—located at local hardware 111 of local system 104 —to take a picture.
- This information is collected at local web server 107 and response signal 109 —containing the information—is sent back to web client 102 .
- the only information sent back to web client 102 is the picture taken by the web camera.
- additional information concerning completion of operation(s) is contained in response signal 109 .
- only a portion of the picture is returned to web client 102 in response signal 109 .
- response signal 109 contains all, some, none, or a portion of information accessed and/or generated at local system 104 .
- step 308 web client 102 determines, based on user input 101 , whether it needs to communicate with remote server 114 —remotely located from web browser environment 103 —to save the picture to remote server 114 of a web-based service. If it is not necessary for web client 102 to communicate with remote server 114 , an output signal is sent to web client 102 indicating to user 110 that the requested action—specified by user input 101 —has been completed in step 316 . Otherwise, in step 310 , response signal 109 is transmitted from local system interface 105 to remote server interface 115 . That is, local system interface 105 module transmits at least a portion of response signal 109 containing the picture to remote server interface 115 .
- remote server interface 115 sends a signal containing the picture to remote server 114 in step 312 .
- remote server interface 115 provides additional APIs that facilitate interaction with remote server 114 ; without requiring additional developer knowledge of the configuration of remote server 114 . In an embodiment, this is accomplished by providing additional APIs for web-based development models (i.e., HTML, HTML5, CSS, RESTS, JavaScript, etc.).
- web client 102 After the picture has been saved to remote server 114 of a web-based service, web client 102 notifies user 110 that the requested action has been completed in step 314 .
- processes 400 , 410 , 500 and 510 relate to security measures for preventing unauthorized access to local system 104 .
- access is restricted to local system 104 via APIs providing access to a limited set of local hardware 111 and local software 112 .
- web client 102 determines whether the action requested by user input 101 will generate an authorized request signal 106 .
- web client 102 determines whether the action requested by user input 101 is recognized by local system interface 105 . If request signal 106 is not an authorized signal, web client 102 will not permit requested action.
- the requested action may be authorized either in a single step as in process 400 , or in multiple steps as in process 410 .
- single-step security process 400 a determination is made in step 402 as to whether permission has been granted to web client 102 to access local hardware 111 and/or local software 112 .
- permission may be granted by an administrator of a system containing web client 102 , local system 104 , and/or an operating system associated with any such computing devices.
- Permission may also be granted at an API level (e.g., oAuth or authentication using a well-known token, such as API-Key and Permission Flags, etc.).
- permissions may be determined and granted by web client 102 based upon digital signatures by the developer, which verifies web client 102 is safe to interact with certain classes of local systems 104 .
- single-step security process 400 if permission is granted for web client 102 to access local hardware 111 and/or local software 112 , local web server 107 allows access to local hardware 111 and/or local software 112 in step 404 . If web client 102 does not have permission, local web server 107 denies access to local hardware 111 and/or local software 112 in step 406 .
- web client 102 may be configured to display a permission status to user 110 via a GUI.
- multi-step security process 410 permission is provided to the user at multiple stages and/or access credentials are checked at multiple stages of communication between web client 102 and local system 104 .
- Access credentials are then provided to local web server 107 in step 416 , thereby allowing local web server 107 to access local hardware 111 and/or local software 112 in step 420 .
- the two-level authentication process is employed as follows: A first authentication level preferably includes web client 102 , wherein web client 102 files (e.g., OPC, CAB, ZIP, or EXE) are digitally signed by the developer to verify that the application is safe to run; and a second authentication level occurs at an API level (e.g., oAuth or authentication using a well-known token such as an API-Key or Permission Flags).
- an API level e.g., oAuth or authentication using a well-known token such as an API-Key or Permission Flags.
- Per-device-based security process 500 allows or denies access to specific devices in local hardware 111 .
- authentication process 500 may occur at local web server 107 which then determines at step 502 if web client 102 may access a web camera (i.e., a local hardware 111 ) on local system 104 .
- a web camera i.e., a local hardware 111
- step 504 access to the web camera in local hardware 111 is allowed only if permission has been granted. Otherwise, in step 506 , permission is denied.
- permission is granted to access: only one device in local hardware 111 ; only specific devices in local hardware 111 ; and/or only specific devices by a limited set of web clients 102 .
- per-application-based security process 510 operates in a similar fashion to per-device-based security process 500 .
- per-application-based security process 510 allows or denies access to specific applications and/or services in local software 112 .
- process 510 may determine if local web server 107 is allowed access to calendar application residing in local software 112 in step 512 . If so, process 510 proceeds to step 514 ; otherwise process 510 proceeds to step 516 .
- permission is granted to access: only one application in local software 112 ; only specific application(s), while other specific applications (e.g., operating system kernel) are excluded; and/or specific applications by a limited set of web clients 102 .
- an embodiment may verify whether local web server 107 , in response to receiving request signal 106 , is authorized to communicate with local hardware 111 and/or local software 112 .
- process 600 determines whether web client 102 desires to communicate with remote server 114 , which may be remotely located from web browser environment 103 . If step 608 is positive, local system interface 105 transmits response signal 109 —from local web server 107 —to remote server interface 115 , and remote server interface 115 sends at least a portion of response signal 109 to remote server 114 , as shown in step 610 . Otherwise, in step 612 , an output signal is sent to web client 102 indicating to user 110 that the requested action—specified by user input 101 —has been completed.
- Configuration 800 illustrates it is not necessary for all components of the present disclosure to reside at the same location. That is, in the embodiment of configuration 800 , remote server 114 is at “location 3 ” 813 (e.g., a server room in California). User input 101 is entered at web client 102 residing within web browser environment 103 at “location 1 ” 811 (e.g., a laptop computer in a coffee shop in New York City). Local system 104 is at “location 2 ” 812 (e.g., a computing device in Texas). In other exemplary embodiments, some or all of “location 1 ” 811 , “location 2 ” 812 , and “location 3 ” 813 may reside within a single address.
- configuration 900 includes specific commands that access local system 104 .
- JavaScript developers use XMLHttpRequest to local API service 903 for making calls to local web server 107 .
- This allows web client (i.e., HTML/CSS/JavaScript-based application 901 ) to access local device services (e.g., WriteFile to persist content from the running application, a camera API to capture an image from an on-device camera, GPS/Location Framework to obtain a current location, etc.).
- local device services e.g., WriteFile to persist content from the running application, a camera API to capture an image from an on-device camera, GPS/Location Framework to obtain a current location, etc.
- XMLHttpRequest to remote web service 902 and the URL http://localhost/services/camera/capture are used to obtain a photo from a web camera on local system 104 .
- a cloud hosted web service 906 e.g., the FLICKR® service from Yahoo! Inc. of Sunnyvale, Calif.
- the XMLHttpRequest to remote web service 902 uses URL http://api.flickr.com/services/upload/.
- other operating system APIs 904 and device drivers 905 may be accessed and utilized in a similar manner as described herein above.
- computing device 700 implements local system 104 (or any other component of configuration 100 ).
- Computing device 700 includes one or more processors or processing units 702 , one or more computer readable media 704 which can include one or more memory and/or storage components 706 , one or more input/output (I/O) devices 708 , and a bus 710 that allows the various components and devices to communicate with one another.
- Computer readable media 704 and/or one or more I/O devices 708 can be included as part of, or alternatively may be coupled to, computing device 700 .
- Bus 710 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor or local bus, and so forth, using a variety of different bus architectures.
- Bus 710 may include wired and/or wireless buses.
- Memory/storage component 706 represents one or more computer storage media.
- Memory and/or storage 706 may include volatile media (such as random access memory (RAM)) and/or nonvolatile media (such as read only memory (ROM), Flash memory, optical disks, magnetic disks, and so forth).
- RAM random access memory
- ROM read only memory
- Memory and/or storage 706 may include fixed media (e.g., RAM, ROM, a fixed hard drive, etc.) as well as removable media (e.g., a Flash memory drive, a removable hard drive, an optical disk, etc.).
- the techniques discussed herein may be implemented in software, with instructions executed by one or more processing units 702 . It is to be appreciated that different instructions can be stored in different components of computing device 700 , such as in a processing unit 702 , in various cache memories of a processing unit 702 , in other cache memories of device 700 (not shown), on other computer readable media, and so forth. Additionally, it is to be appreciated that the location where instructions are stored in computing device 700 may change over time.
- One or more I/O devices 708 allow a user to enter commands and information to computing device 700 , and also allow information to be presented to the user and/or other components or devices.
- input devices include a keyboard, a cursor control device (e.g., a mouse), a microphone, a scanner, and so forth.
- output devices include a display device (e.g., a monitor or projector), speakers, a printer, a network card, and so forth.
- Computer readable media may be any available medium or media that can be accessed by a computing device.
- Computer readable media may comprise “computer storage media” and “communications media.”
- Computer storage media include volatile and non-volatile, and removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data.
- Computer storage media include, but are not limited to, RAM, ROM, EEPROM, Flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, and/or any other medium which can be used to store the desired information and which can be accessed by a computer.
- Communication media typically embody computer readable instructions, data structures, program modules, or other data in a modulated data signal such as carrier wave or other transport mechanism. Communication media may also include any information delivery media.
- modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media include wired media, such as a wired network or direct-wired connection, and wireless media, such as acoustic, RF, infrared, and other wireless media. Combinations of any of the above are also included within the scope of computer readable media.
- any of the functions or techniques described herein can be implemented using software, firmware, hardware (e.g., fixed logic circuitry, system on a chip), manual processing, or a combination of these implementations.
- the terms “module” and “component” as used herein generally represent software, firmware, hardware, or combinations thereof.
- the module or component represents program code that performs specified tasks when executed on a processor (e.g., CPU or CPUs).
- the program code may be stored in one or more computer readable memory devices.
- computing device 700 may be configured as any number of computing devices such as a game console, a portable media player, a desktop, a laptop, a server, a notebook computer, a tablet computer, a PDA, a mobile computer, a smart telephone, a mobile telephone, an intelligent communications device or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Systems, methods, and computer program products for facilitating web-based interaction with a local system are disclosed. Such systems, methods, and computer program products provide an approach that allows a web client within in a web browser environment to access local hardware and local software—via a web server contained in the local system—in a local computer system. In response to a user input, the web client directs local hardware and local software to perform actions (e.g., writing files and taking pictures). Information related to such actions is returned to the web client via the local web server. The local computer system may be remotely located from the web client and such returned information may be stored and/or executed at a remote site (e.g., cloud database). Security layers may be provided to authenticate the user as well as user permissions for accessing the local computer system.
Description
- This application is a continuation of and claims the benefit of and priority to U.S. patent application Ser. No. 13/407,218 entitled “Web-Based Interaction With A Local System”, filed Feb. 28, 2012 by Michael Hall et. al., the entire contents of which are expressly incorporated by reference.
- The present disclosure generally relates to remote access interfaces and more particularly to systems, methods, and computer program products for facilitating web-based interaction with a local computer system.
- Developers typically design Internet websites to be platform agnostic. This is done using web-based programming models, such as HTML, HTML5, CSS, representational state transfer web services, JavaScript, and the like. Such agnostic platform design allows all website visitors (i.e., users) to have a consistent experience regardless of the web browser application, computer operating system, and hardware platform employed by such various users. Similarly, web-based applications (e.g., Flash games, video players, audio players, mortgage calculators, etc.) are designed such that the programming model of the web-based application has a consistent experience for all users across all computing platforms. Alternatively, the developer may choose to limit the computing platform(s) the web-based application may be accessed from (e.g., by enforcing a “smartphones only” or a “tablet computers only” policy).
- Generally, web browsers and web browser environments provide an isolated, consistent rendering and application programming interface (API) for web-based applications that does not provide access to the computing device's underlying and/or local system device drivers, services, and/or operating system APIs. Rather, web-based programming models provide an isolated environment in which web-based application can provide a defined set of functionality across a variety of computing device platforms. This is because if these web-based applications' software code were freely allowed to download and execute on the user's computing device, the software code could maliciously expose the memory, personal data, and/or operating system resources of the local computing device. Thus, in order to avoid compromising the user's computing device (or even remote computing devices in network communications with the user's computing device) from unknown, untrusted, and/or untested software code, these web-based applications often run in an isolated environment within the web browser environment.
- Put another way, the isolated environment described above prevents web-based applications from accessing or making use of any underlying operating system services (e.g., drivers, APIs, reading and writing files, controlling input devices, etc.). Such an isolated environment, implemented by the above-mentioned web-based programming models, allows web-based applications to operate with limited, tightly-controlled resources. Thus, network access and access to the host system and operating system services are typically unavailable and/or prohibited.
- This summary is provided to introduce a selection of concepts. These concepts are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is this summary intended as an aid in determining the scope of the claimed subject matter.
- The present disclosure provides methods, systems, and computer program products that facilitate web-based interaction with a local computer system. In an embodiment, a component detects a user input made within a web-based application (i.e., client or client application). The client is located within a web browser environment. The user input indicates a user-desired action at a local system, such as taking a picture using a local system's camera. In an embodiment, the local system is remotely located from the user's computing device. In response to the user input, the client causes its local system interface component to transmit a request signal—based upon the user input—to the local system. The client receives a response signal from the local system, which contains information related to a requested action specified by the user input.
- In an embodiment, the user input initially requests an action to be taken on local hardware and local software. Data is then transferred to a web-based service and a component of the client determines whether the client needs to contact a remote server. If communication with a remote server is required, a remote server interface component of the client sends a signal—containing desired information—to the remote server.
- In yet another embodiment, security layers may be provided when a module determines whether the requested action—based upon the user input—is a permissible action. Such security layers (authorization process(es)) may be implemented via a single step or multiple steps. Further, such authorization process(es) may be performed on a per-application basis, per-device basis, or “all-or-nothing” basis.
- Further features and advantages of the present disclosure, as well as the structure and operation of various aspects of the present disclosure, are described in detail below with reference to the accompanying drawings.
- The features and advantages of the present disclosure will become more apparent from the detailed description set forth below when taken in conjunction with the drawings in which like reference numbers indicate identical or functionally similar elements.
-
FIG. 1 is a block diagram illustrating an interrelationship between exemplary components that facilitate web-based interaction with a local system, according to an embodiment of the present disclosure. -
FIG. 2 is a flowchart illustrating an exemplary process for facilitating web-based interaction with a local system, according to an embodiment of the present disclosure. -
FIG. 3 is a flowchart illustrating an exemplary process for facilitating web-based interaction with a local system, according to an embodiment of the present disclosure. -
FIGS. 4A-B are flowcharts illustrating exemplary processes for facilitating single-step and multi-step security methods, according to an embodiment of the present disclosure. -
FIGS. 5A-B are flowcharts illustrating exemplary processes for facilitating per-device-based and per-application-based security methods, according to an embodiment of the present disclosure. -
FIG. 6 is a flowchart illustrating an exemplary process for facilitating web-based interaction with a local system, according to an embodiment of the present disclosure. -
FIG. 7 is a block diagram of a computer system useful for implementing the present disclosure. -
FIG. 8 is a block diagram illustrating an interrelationship between exemplary components that facilitate web-based interaction with a local system, according to an embodiment of the present disclosure. -
FIG. 9 is a block diagram illustrating an interrelationship between exemplary components that facilitate web-based interaction with a local system, according to an embodiment of the present disclosure. - The present disclosure is directed to methods, systems, and computer program products for facilitating web-based interaction with a local computer system.
- Referring to
FIG. 1 , a block diagram illustrating an interrelationship between exemplary components that facilitate web-based interaction with a local system, according to various embodiments of the present disclosure, is shown.Configuration 100 depictslocal system 104 containing alocal web server 107,local hardware 111, andlocal software 112 accessed by aweb client 102.Local web server 107 communicates withlocal system interface 105,local hardware 111, andlocal software 112.Web client 102 contains software modules for controlling operations ofremote sever interface 115 andlocal system interface 105.Remote server interface 115 communicates withremote server 114 andlocal system interface 105. - In various embodiments, the methods, systems, and computer program products of the present disclosure provide an isolated web-based application, also referred to as
web client 102, operating within aweb browser environment 103 capable of accessinglocal system 104. Interaction is accomplished via alocal system interface 105—located withinweb browser environment 103—that is located withinweb client 102 in communication withlocal web server 107, which is located at and operated bylocal system 104. For the purposes of this disclosure, “local system” 104 is the computing device or devices thatweb client 102 accesses. - In an embodiment,
local system 104 preferably includes computing devices equipped withlocal software 112 and/or local hardware 111 (e.g., cameras; scanners; global positioning system (GPS) antennae; motors; heat, light, motion or other sensors; etc.). In an embodiment,local system 104 preferably includes computing devices capable of locally reading and writing data (e.g., media player, audio/video player, etc.). In an embodiment,web client 102 communicates withremote server 114 to facilitate a web-based service, as specified by user input 101 from user 110 at a user interface screen ofweb client 102. In yet another embodiment, security layers are provided to authenticate user request (i.e., user input 101), thereby controlling access tolocal system 104. The authentication process limits access tolocal system 104 vialocal web server 107. - In an embodiment,
web client 102 operates withinweb browser environment 103. In an embodiment,web browser environment 103 is a web browser optimized for operating on a portable electronic device (e.g., mobile phone, slate, laptop, etc.). In an embodiment,web browser environment 103 operates on a stationary electronic device (e.g., standalone computing device, enterprise computing device, workstation, etc.). In such an embodiment,web client 102 includes one or morelocal system interface 105 modules andremote server interface 115 modules. Thesemodules local systems 104 andremote servers 114, respectively.Modules web client 102 and receive signals fromlocal systems 104 andremote servers 114, respectively. - In an embodiment,
modules web client 102 for facilitating communication with their designated targets (i.e.,local systems 104 and remote servers 114). In an embodiment,local system interface 105 andremote server interface 115 are part of an APIs designed to allowweb client 102, withinweb browser environment 103, to access specificlocal system 104 services. In an embodiment,local system interface 105 module andremote server interface 115 module may be part ofweb client 102. In an embodiment,local system interface 105 contains selected portions of an API required to communicate withlocal system 104 and/orremote server 114. That is, when a developer has designedweb client 102 to interact with only a portion oflocal system 104, it is unnecessary to implement all portions of software code to communicate withlocal system 104. - In an embodiment,
web client 102 utilizeslocal system interface 105 to communicate withlocal system 104.Local system interface 105 generates and transmits request signals 106 tolocal web server 107, located on, and operated by,local system 104. In an embodiment,local system interface 105 provides additional APIs that facilitate interaction withlocal system 104 without additional developer knowledge of thelocal system 104 configuration (e.g., HTML, HTML5, CSS, representational state transfer web services, JavaScript, etc.). - In an embodiment,
local web server 107 is a component oflocal system 104 that allows access tolocal hardware 111 andlocal software 112 oflocal system 104.Local hardware 111 may include hardware capable of being operated at least in part by a computing device.Local hardware 111 may include internal and external input and output devices of local system 104 (e.g., cameras, scanners, global positioning system antennae, motors, sensors, etc.) In an embodiment,local hardware 111 may include device drivers and APIs associated with the above-listed devices.Local software 112 may include all software capable of running on a computing device (e.g., operating system contained onlocal system 104 and its services, APIs, third-party application programs, other computing services, etc.). In an embodiment,local software 112 includes a digital, modifiable calendar. In yet another embodiment,local software 112 includes a service that facilitates reading and writing files contained onlocal hardware 111. - In an embodiment,
local web server 107 is a component of an operating system executing onlocal system 104. In an embodiment,local web server 107 may be a separate software program from the operating system, provided by the same and/or different developers of the operating system. In an embodiment,local web server 107 accesseslocal hardware 111 andlocal software 112 via application development models that have direct knowledge of the operating system (e.g., C/C++, Win32, MFC, .NET Framework, APIs exposed through software development kits, etc.). - In an embodiment,
local web server 107 is capable of returningresponse signals 109 tolocal system interface 105 ofweb client 102. That is,local web server 107 sends signals tolocal hardware 111 andlocal software 112, which causelocal hardware 111 andlocal software 112 to perform the desired action, as specified by user input 101.Local hardware 111 andlocal software 112 returns information—related to the desired action—tolocal web server 107.Local web server 107 then generates response signals 109 containing information related to the desired action, which was carried out bylocal hardware 111 andlocal software 112.Response signal 109 is sent bylocal web server 107 tolocal system interface 105 located atweb client 102 inweb browser environment 103. These software modules allow APIs ofweb client 102 inweb browser environment 103 to accesslocal system 104 and utilize the local system services oflocal hardware 111 andlocal software 112. - Referring to
FIG. 2 , a flowchart illustrating anexemplary process 200 for facilitating web-based interaction with a local system, according to an embodiment of the present disclosure, is shown. Instep 202, a user input 101 is received atweb client 102. In an embodiment, user input 101 is from a user 110 indicating a desired action to initiate via the graphical user interface (GUI) ofweb client 102. (As will be appreciated by those skilled in the relevant art(s) after reading the description herein, user input 101 may be communicated toweb client 102 by a computing device remotely located fromweb client 102.) - In
step 204,web client 102 utilizeslocal system interface 105 to communicate withlocal system 104. That is,local system interface 105 generates and transmits one or more request signals 106 tolocal web server 107 located onlocal system 104. - Then, in
step 206,local web server 107 returns one or more response signals 109 tolocal system interface 105 ofweb client 102. That is,local web server 107 causeslocal hardware 111 and/orlocal software 112 to perform the desired action, as specified by input 101.Local hardware 111 andlocal software 112 returns information—related to the desired action—tolocal web server 107.Local web server 107 then generates response signals 109 containing information related to the desired action, which was carried out bylocal hardware 111 andlocal software 112. - As will be appreciated by those skilled in the relevant art(s) after reading the description herein, “user input 101” as described herein may also be a non-user initiated action. That is, for example,
web client 102 may be a GPS-enabled application (executing within web browser environment 103) with a timer that continuously queries to obtain current GPS location via a remote (API) call to local system 104 (i.e., local hardware 111). - As will be apparent to one skilled in the relevant art(s) after reading the description herein, code implementing process 200 (and processes 300-600 described below), that facilitates web-based interaction with a local system may be part of a “standard” version of a
web client 102 application that ships from a developer or may be later added as part of a update (or patch). Further, aweb client 102 application utilizing an embodiment the present disclosure advantageously does not need to modify the existingweb browser environment 103. That is, in an embodiment, the present disclosure does not change the way that thebrowser 103 interacts withlocal system 104 through existing web standards (e.g., HTTP, XML, RESTful services, etc.). Thus, the present disclosure overcomes the “sandboxing” problem—where the browser defines the local-machine API surface that web-based applications may utilize, forcing device developers to modify the browser should they wish to provide web applications access to additional hardware/software modules onlocal device 104. More specifically, the sandboxing problem is overcome, in an embodiment, by leaving the browser intact and instead configuringmodules local system 104 orremote server 114, respectively, to expose the (additional) functionality oflocal hardware 111/software 112 to the web-browser basedapplication 102. - In one embodiment,
process 200 inFIG. 2 provides access tolocal system 104 via a representational state transfer (REST) API set. - Referring to
FIG. 3 , a flowchart illustrating an exemplary process for facilitating web-based interaction with a local system, according to an embodiment of the present disclosure, is shown. More specifically,process 300 illustrates an example method of taking a picture with a web camera located withinlocal hardware 111, according to the present disclosure. - In
step 302, in response to a user input 101 accepted atweb client 102 withinweb browser environment 103, a picture is saved to a web-based service. In an embodiment, in addition to communicating withlocal system 104, the user may also access aremote server 114. In an embodiment,remote server 114 is a computing device comprised of a private server, accessible by only user 110. In one embodiment,remote server 114 is a computing device comprised of one or more public servers hosting public, web-based services such as media sharing sites (e.g., FLICKR®), social media services (e.g., FACEBOOK®), remote data back-up services (e.g., DROPBOX®), and location-based services (e.g., FOURSQUARE®). - In
step 304,web client 102 communicates withlocal system 104 in response to user input 101 by causinglocal system interface 105 to generate and transmit arequest signal 106 tolocal web server 107. - In
step 306, in response to user input 101 of user 110,local web server 107 receives arequest signal 106 fromlocal system interface 105, and thereby causes the web camera—located atlocal hardware 111 oflocal system 104—to take a picture. This information is collected atlocal web server 107 and response signal 109—containing the information—is sent back toweb client 102. In an embodiment, the only information sent back toweb client 102 is the picture taken by the web camera. In an embodiment, additional information concerning completion of operation(s) is contained inresponse signal 109. In yet another embodiment, only a portion of the picture is returned toweb client 102 inresponse signal 109. Similarly, for embodiments where a requested action does not involve taking a picture, (e.g., determining a location oflocal system 104, reading and/or writing a file, and/or utilizinglocal hardware 111 output devices)response signal 109 contains all, some, none, or a portion of information accessed and/or generated atlocal system 104. - In
step 308,web client 102 determines, based on user input 101, whether it needs to communicate withremote server 114—remotely located fromweb browser environment 103—to save the picture toremote server 114 of a web-based service. If it is not necessary forweb client 102 to communicate withremote server 114, an output signal is sent toweb client 102 indicating to user 110 that the requested action—specified by user input 101—has been completed instep 316. Otherwise, instep 310,response signal 109 is transmitted fromlocal system interface 105 toremote server interface 115. That is,local system interface 105 module transmits at least a portion ofresponse signal 109 containing the picture toremote server interface 115. - In response,
remote server interface 115 sends a signal containing the picture toremote server 114 instep 312. In an embodiment,remote server interface 115 provides additional APIs that facilitate interaction withremote server 114; without requiring additional developer knowledge of the configuration ofremote server 114. In an embodiment, this is accomplished by providing additional APIs for web-based development models (i.e., HTML, HTML5, CSS, RESTS, JavaScript, etc.). After the picture has been saved toremote server 114 of a web-based service,web client 102 notifies user 110 that the requested action has been completed instep 314. - Referring to
FIGS. 4A-B and 5A-B, flowcharts illustrating exemplary processes for facilitating single-step and multi-step security methods, according to embodiments of the present disclosure, are shown. That is, processes 400, 410, 500 and 510 relate to security measures for preventing unauthorized access tolocal system 104. In an embodiment, access is restricted tolocal system 104 via APIs providing access to a limited set oflocal hardware 111 andlocal software 112. In an embodiment,web client 102 determines whether the action requested by user input 101 will generate an authorizedrequest signal 106. In an embodiment,web client 102 determines whether the action requested by user input 101 is recognized bylocal system interface 105. Ifrequest signal 106 is not an authorized signal,web client 102 will not permit requested action. - The requested action may be authorized either in a single step as in
process 400, or in multiple steps as inprocess 410. Where single-step security process 400 is utilized, a determination is made instep 402 as to whether permission has been granted toweb client 102 to accesslocal hardware 111 and/orlocal software 112. In alternate embodiments, permission may be granted by an administrator of a system containingweb client 102,local system 104, and/or an operating system associated with any such computing devices. Permission may also be granted at an API level (e.g., oAuth or authentication using a well-known token, such as API-Key and Permission Flags, etc.). In an alternate embodiment, permissions may be determined and granted byweb client 102 based upon digital signatures by the developer, which verifiesweb client 102 is safe to interact with certain classes oflocal systems 104. - In single-
step security process 400, if permission is granted forweb client 102 to accesslocal hardware 111 and/orlocal software 112,local web server 107 allows access tolocal hardware 111 and/orlocal software 112 instep 404. Ifweb client 102 does not have permission,local web server 107 denies access tolocal hardware 111 and/orlocal software 112 instep 406. In an embodiment,web client 102 may be configured to display a permission status to user 110 via a GUI. - In
multi-step security process 410, permission is provided to the user at multiple stages and/or access credentials are checked at multiple stages of communication betweenweb client 102 andlocal system 104. When at least two steps are utilized to ensure security oflocal system 104 is not compromised, it is first determined whetherweb client 102 has permission to accesslocal system 104 instep 412. If permission is not granted,local web server 107 denies access tolocal hardware 111 and/orlocal software 112 instep 418. Where permission is granted forweb client 102 to accesslocal hardware 111 and/orlocal software 112,local web server 107 allows access tolocal hardware 111 and/orlocal software 112 instep 414. Access credentials are then provided tolocal web server 107 instep 416, thereby allowinglocal web server 107 to accesslocal hardware 111 and/orlocal software 112 instep 420. In such an embodiment, the two-level authentication process is employed as follows: A first authentication level preferably includesweb client 102, whereinweb client 102 files (e.g., OPC, CAB, ZIP, or EXE) are digitally signed by the developer to verify that the application is safe to run; and a second authentication level occurs at an API level (e.g., oAuth or authentication using a well-known token such as an API-Key or Permission Flags). - Referring to
FIGS. 5A-B , authentication may be handled at least in part on a per-device-basis and/or a per-application-basis, respectively. Per-device-basedsecurity process 500 allows or denies access to specific devices inlocal hardware 111. For example,authentication process 500 may occur atlocal web server 107 which then determines atstep 502 ifweb client 102 may access a web camera (i.e., a local hardware 111) onlocal system 104. Instep 504, access to the web camera inlocal hardware 111 is allowed only if permission has been granted. Otherwise, instep 506, permission is denied. In alternate embodiments, permission is granted to access: only one device inlocal hardware 111; only specific devices inlocal hardware 111; and/or only specific devices by a limited set ofweb clients 102. - In an embodiment, per-application-based
security process 510 operates in a similar fashion to per-device-basedsecurity process 500. However, per-application-basedsecurity process 510 allows or denies access to specific applications and/or services inlocal software 112. For example,process 510 may determine iflocal web server 107 is allowed access to calendar application residing inlocal software 112 instep 512. If so,process 510 proceeds to step 514; otherwise process 510 proceeds to step 516. In alternate embodiments, permission is granted to access: only one application inlocal software 112; only specific application(s), while other specific applications (e.g., operating system kernel) are excluded; and/or specific applications by a limited set ofweb clients 102. - Various embodiments of the present disclosure utilize some or all of the above-described security processes. When determining whether
web client 102 has permission to perform a specific task, an embodiment may verify whetherlocal web server 107, in response to receivingrequest signal 106, is authorized to communicate withlocal hardware 111 and/orlocal software 112. - Referring now to
FIG. 6 , a flowchart illustrating anexemplary process 600 for facilitating web-based interaction with a local system, according to an embodiment of the present disclosure, is shown. Inprocess 600, steps 602-606 are executed in a similar fashion to steps 202-206 described above, respectively. Then, instep 608,process 600 determines whetherweb client 102 desires to communicate withremote server 114, which may be remotely located fromweb browser environment 103. Ifstep 608 is positive,local system interface 105 transmitsresponse signal 109—fromlocal web server 107—toremote server interface 115, andremote server interface 115 sends at least a portion ofresponse signal 109 toremote server 114, as shown instep 610. Otherwise, instep 612, an output signal is sent toweb client 102 indicating to user 110 that the requested action—specified by user input 101—has been completed. - Referring now to
FIG. 8 , a block diagram illustrating an interrelationship between exemplary components that facilitate web-based interaction with a local system, according to an embodiment of the present disclosure, is shown.Configuration 800 illustrates it is not necessary for all components of the present disclosure to reside at the same location. That is, in the embodiment ofconfiguration 800,remote server 114 is at “location 3” 813 (e.g., a server room in California). User input 101 is entered atweb client 102 residing withinweb browser environment 103 at “location 1” 811 (e.g., a laptop computer in a coffee shop in New York City).Local system 104 is at “location 2” 812 (e.g., a computing device in Texas). In other exemplary embodiments, some or all of “location 1” 811, “location 2” 812, and “location 3” 813 may reside within a single address. - Referring to
FIG. 9 , a block diagram illustrating an interrelationship between exemplary components that facilitate web-based interaction with a local system, according to an embodiment of the present disclosure, is shown. That is,configuration 900 includes specific commands that accesslocal system 104. In an embodiment, JavaScript developers use XMLHttpRequest tolocal API service 903 for making calls tolocal web server 107. This allows web client (i.e., HTML/CSS/JavaScript-based application 901) to access local device services (e.g., WriteFile to persist content from the running application, a camera API to capture an image from an on-device camera, GPS/Location Framework to obtain a current location, etc.). In such an embodiment, XMLHttpRequest to remote web service 902 and the URL http://localhost/services/camera/capture are used to obtain a photo from a web camera onlocal system 104. To upload a captured picture to a cloud hosted web service 906 (e.g., the FLICKR® service from Yahoo! Inc. of Sunnyvale, Calif.), the XMLHttpRequest to remote web service 902 uses URL http://api.flickr.com/services/upload/. In alternate embodiments, otheroperating system APIs 904 and device drivers 905 may be accessed and utilized in a similar manner as described herein above. - Referring now to
FIG. 7 , a block diagram of an example computing device (or computer system) 700 that can be configured to implement various aspects of time-managing emails, in accordance with one or more embodiments of the present disclosure, is shown. In an embodiment,computing device 700 implements local system 104 (or any other component of configuration 100). -
Computing device 700 includes one or more processors orprocessing units 702, one or more computerreadable media 704 which can include one or more memory and/or storage components 706, one or more input/output (I/O)devices 708, and abus 710 that allows the various components and devices to communicate with one another. Computerreadable media 704 and/or one or more I/O devices 708 can be included as part of, or alternatively may be coupled to,computing device 700.Bus 710 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor or local bus, and so forth, using a variety of different bus architectures.Bus 710 may include wired and/or wireless buses. - Memory/storage component 706 represents one or more computer storage media. Memory and/or storage 706 may include volatile media (such as random access memory (RAM)) and/or nonvolatile media (such as read only memory (ROM), Flash memory, optical disks, magnetic disks, and so forth). Memory and/or storage 706 may include fixed media (e.g., RAM, ROM, a fixed hard drive, etc.) as well as removable media (e.g., a Flash memory drive, a removable hard drive, an optical disk, etc.).
- The techniques discussed herein may be implemented in software, with instructions executed by one or
more processing units 702. It is to be appreciated that different instructions can be stored in different components ofcomputing device 700, such as in aprocessing unit 702, in various cache memories of aprocessing unit 702, in other cache memories of device 700 (not shown), on other computer readable media, and so forth. Additionally, it is to be appreciated that the location where instructions are stored incomputing device 700 may change over time. - One or more I/
O devices 708 allow a user to enter commands and information tocomputing device 700, and also allow information to be presented to the user and/or other components or devices. Examples of input devices include a keyboard, a cursor control device (e.g., a mouse), a microphone, a scanner, and so forth. Examples of output devices include a display device (e.g., a monitor or projector), speakers, a printer, a network card, and so forth. - Various techniques may be described herein in the general context of software or program modules. Generally, software includes routines, programs, objects, components, data structures, and so forth that perform particular tasks or implement particular abstract data types. An implementation of these modules and techniques may be stored on or transmitted across some form of computer readable media. Computer readable media may be any available medium or media that can be accessed by a computing device. By way of example, and not limitation, computer readable media may comprise “computer storage media” and “communications media.”
- “Computer storage media” include volatile and non-volatile, and removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules, or other data. Computer storage media include, but are not limited to, RAM, ROM, EEPROM, Flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, and/or any other medium which can be used to store the desired information and which can be accessed by a computer.
- “Communication media” typically embody computer readable instructions, data structures, program modules, or other data in a modulated data signal such as carrier wave or other transport mechanism. Communication media may also include any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example and not limitation, communication media include wired media, such as a wired network or direct-wired connection, and wireless media, such as acoustic, RF, infrared, and other wireless media. Combinations of any of the above are also included within the scope of computer readable media.
- Generally, any of the functions or techniques described herein can be implemented using software, firmware, hardware (e.g., fixed logic circuitry, system on a chip), manual processing, or a combination of these implementations. The terms “module” and “component” as used herein generally represent software, firmware, hardware, or combinations thereof. In the case of a software implementation, the module or component represents program code that performs specified tasks when executed on a processor (e.g., CPU or CPUs). The program code may be stored in one or more computer readable memory devices. The features of the present disclosure described herein are platform-independent, meaning that the techniques may be implemented on a variety of commercial computing platforms having a variety of processors.
- As will be apparent to one skilled in the relevant art(s) after reading the description herein,
computing device 700 may be configured as any number of computing devices such as a game console, a portable media player, a desktop, a laptop, a server, a notebook computer, a tablet computer, a PDA, a mobile computer, a smart telephone, a mobile telephone, an intelligent communications device or the like. - While various aspects of the present disclosure have been described above, it should be understood that they have been presented by way of example and not limitation. It will be apparent to persons skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the present disclosure. Thus, the present disclosure should not be limited by any of the above described exemplary aspects, but should be defined only in accordance with the following claims and their equivalents.
- In addition, it should be understood that the figures in the attachments, which highlight the structure, methodology, functionality, and advantages of the present disclosure, are presented for example purposes only. The present disclosure is sufficiently flexible and configurable, such that it may be implemented in ways other than that shown in the accompanying figures.
- Further, the purpose of the foregoing Abstract is to enable the U.S. Patent and Trademark Office and the public generally and especially the scientists, engineers and practitioners in the relevant art(s) who are not familiar with patent or legal terms or phraseology, to determine quickly from a cursory inspection the nature and essence of this technical disclosure. The Abstract is not intended to be limiting as to the scope of the present disclosure in any way.
Claims (20)
1. At a computer system, the computer system including a local web client operating within a web browser environment at the computer system and including a local web server operating in association with an operating system of the computer system, the web browser environment in a sandbox, the sandbox preventing issuance of local resource commands to directly control local resources at the computer system, a method for web-based acquisition of data from a local resource at the computer system, the method executing on at least one processor of the computer system, the method comprising:
using a selected portion of a communication Application Programming Interface (API) to communicate a web protocol request signal to the local web server, the local web server including an interface for translating between web protocol signals and corresponding local resource commands, the local resource commands for controlling the local resource to acquire data in accordance with received web protocol request signals; and
receiving a web protocol response signal from the local web server, the web protocol response signal responsive to the web protocol request, the web protocol response signal containing acquired data that was acquired by the local web server, the local web server having acquired the acquired data by issuing the corresponding local resource commands to the local resource to control the local resource to perform the specified action at the local resource.
2. The method of claim 1 , further comprising:
receiving input, the input directed to a web-based service running within the web browser environment, the input instructing the web-based service to acquire data from the local resource by performing a specified action, the web-based service including the selected portion of the communication Application Programming Interface (API).
3. The method of claim 2 , wherein receiving input comprises receiving input requesting that data be acquired from a local resource for delivery to a remote server; and further comprising:
a local system interface transferring the acquired data within the sandbox to a remote system interface of the web client, the remote system interface configured to exchange data with remote servers; and
the remote system interface sending the acquired data to the remote server.
4. The method of claim 2 , further comprising presenting, at a user interface screen, an output based upon the input and at least a portion of the information contained in the web protocol response signal.
5. The method of claim 1 , further comprising determining whether the web client desires to communicate with a remote server remotely located from web browser environment.
6. The method of claim 1 , further comprising:
a local system interface transmitting the web protocol response signal to a remote server interface operating within the web browser environment; and
the remote server interface sending the web protocol response signal, from the web client, to the remote server so as to supplement the functionality of the remote server with the functionality of the local resource.
7. The method of claim 1 , wherein receiving a web protocol response signal comprises receiving a web protocol response containing data acquire by issuing a local resource command to a local hardware resource.
8. The method of claim 1 , wherein receiving a web protocol response signal comprises receiving a web protocol response containing data acquire by issuing a local resource command to a local software resource.
9. At a computer system, the computer system including a local web client operating within a web browser environment at the computer system and including a local web server operating in association with an operating system of the computer system, the web browser environment in a sandbox, the sandbox preventing issuance of local resource commands to directly control local resources at the computer system, a method for web-based acquisition of data from a local resource at the computer system, the method executing on at least one processor of the computer system, the method comprising:
receiving a web protocol request signal from the local web client, the web protocol request communicated using a selected portion of a communication Application Programming Interface (API);
using an interface to translate between the web protocol request signal and a corresponding local resource command, the local resource command for controlling the local resource to acquire data in accordance with received web protocol request signals;
acquiring the data by issuing the corresponding local resource command to the local resource to control the local resource to perform a specified action at the local resource; and
sending a web protocol response signal containing the acquired data to the local web client, the web protocol response signal responsive to the web protocol request signal.
10. The method of claim 9 , further comprising determining that the local web client has permission to access the local resource.
11. The method of claim 9 , further comprising determining that the local web server is capable of accessing the local resource.
12. The method of claim 9 , wherein acquiring the data comprises issuing a local resource command to a local hardware resource to control the local hardware resource to perform a specified action.
13. The method of claim 9 , wherein acquiring the data comprises issuing a local resource command to a local software resource to control the local software resource to perform a specified action.
14. A system, the system comprising
one or more processors;
system memory;
one or more additional local resources;
a web browser environment in a sandbox, the sandbox preventing issuance of local resource commands to directly control the one or more additional local resources;
a local web server operating in association with an operating system of the system; and
a local web client operating within the web browser environment, the local web client configured to:
use a selected portion of a communication Application Programming Interface (API) to communicate a web protocol request signal to the local web server, the local web server including an interface for translating between web protocol signals and corresponding local resource commands, the local resource commands for controlling a local resource to acquire data in accordance with received web protocol request signals, the local resource from among the one or more additional local resources; and
receive a web protocol response signal from the local web server, the web protocol response signal responsive to the web protocol request, the web protocol response signal containing acquired data that was acquired by the local web server, the local web server having acquired the acquired data by issuing the corresponding local resource commands to the local resource to control the local resource to perform the specified action at the local resource.
15. The system of claim 14 , wherein the local web client is further configured to receive input from a remote server interface within the web browser environment, the input indicating that a remote server is requesting data from the local resource.
16. The system of claim 15 , wherein the local web client is further configured to receive forward the acquired data to the remote server.
17. The system of claim 14 , wherein the local web client is further configured to, subsequent to receiving the web protocol response signal, present output based upon the acquired data at a user interface screen.
18. A system, the system comprising
one or more processors;
system memory;
one or more additional local resources;
a web browser environment in a sandbox, the sandbox preventing issuance of local resource commands to directly control the one or more additional local resources;
a local web client operating within the web browser environment;
a local web server operating in association with an operating system of the system, the local web server configured to:
receive a web protocol request signal from the local web client
use an interface to translate between the web protocol request signal and a corresponding local resource command, the local resource command for controlling a local resource to acquire data in accordance with received web protocol request signals, the local resource selected from among the one or more additional local resources;
acquire data by issuing the corresponding local resource command to the local resource to control the local resource to perform a specified action at the local resource; and
send a web protocol response signal containing the acquired data to the local web client, the web protocol response signal responsive to the web protocol request signal.
19. The system of claim 18 , wherein the local web server being configured to acquire data comprises the local web server being configured to acquire data by issuing a local resource command to a local hardware resource to control the local hardware resource to perform a specified action.
20. The system of claim 18 , wherein the local web server being configured to acquire data comprises the local web server being configured to acquire data by issuing a local resource command to a local software resource to control the local software resource to perform a specified action.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/703,698 US20150237110A1 (en) | 2012-02-28 | 2015-05-04 | Web-Based Interaction With A Local System |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/407,218 US9032303B2 (en) | 2012-02-28 | 2012-02-28 | Web-based interaction with a local system |
US14/703,698 US20150237110A1 (en) | 2012-02-28 | 2015-05-04 | Web-Based Interaction With A Local System |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/407,218 Continuation US9032303B2 (en) | 2012-02-28 | 2012-02-28 | Web-based interaction with a local system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150237110A1 true US20150237110A1 (en) | 2015-08-20 |
Family
ID=49004682
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/407,218 Expired - Fee Related US9032303B2 (en) | 2012-02-28 | 2012-02-28 | Web-based interaction with a local system |
US14/703,698 Abandoned US20150237110A1 (en) | 2012-02-28 | 2015-05-04 | Web-Based Interaction With A Local System |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/407,218 Expired - Fee Related US9032303B2 (en) | 2012-02-28 | 2012-02-28 | Web-based interaction with a local system |
Country Status (1)
Country | Link |
---|---|
US (2) | US9032303B2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150142873A1 (en) * | 2012-05-31 | 2015-05-21 | Siemens Aktiengesellschaft | Communication Between Two Clients Via A Server |
US11531747B2 (en) | 2019-09-16 | 2022-12-20 | Beijing Didi Infinity Technology And Development Co., Ltd. | Method for exchanging data between a web browser and an application |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9262593B2 (en) * | 2012-06-25 | 2016-02-16 | Microsoft Technology Licensing, Llc | Client services for web-based applications |
US8984598B2 (en) * | 2012-06-27 | 2015-03-17 | International Business Machines Corporation | Web-based security proxy for computing system environment scanning |
CN103902866A (en) * | 2012-12-25 | 2014-07-02 | 鸿富锦精密工业(深圳)有限公司 | File protection system and method |
US20140201619A1 (en) * | 2013-01-11 | 2014-07-17 | Beijing Lenovo Software Ltd. | Method And Device For Implementing Local Operation On Web Page |
US9473562B2 (en) | 2013-09-12 | 2016-10-18 | Apple Inc. | Mediated data exchange for sandboxed applications |
JP6471698B2 (en) * | 2014-02-06 | 2019-02-20 | ソニー株式会社 | Information processing apparatus, information processing method, program, and server |
US10356155B2 (en) * | 2014-04-30 | 2019-07-16 | Suse Llc | Service onboarding |
KR102379101B1 (en) * | 2014-07-03 | 2022-03-24 | 에이블 월드 인터내셔널 리미티드 | Method for operating tool in working environment and machine using such method |
US9626157B2 (en) | 2014-07-03 | 2017-04-18 | Able World International Limited | Method of projecting a workspace and system using the same |
SG11201610924QA (en) * | 2014-07-03 | 2017-02-27 | Able World Internat Ltd | Combinatory working method for standardized elements in personal workspace, and computer program product and system using said method |
US10860346B2 (en) * | 2017-08-15 | 2020-12-08 | Sap Se | Server-side internationalization framework for web applications |
US10931675B2 (en) * | 2018-04-10 | 2021-02-23 | Microsoft Technology Licensing, Llc | Local API access authorization |
CN113079216B (en) * | 2021-04-08 | 2022-07-19 | 深圳市腾讯网络信息技术有限公司 | Cloud application implementation method and device, electronic equipment and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090282474A1 (en) * | 2008-05-08 | 2009-11-12 | Google Inc. | Method for safely executing an untrusted native code module on a computing device |
US20100057834A1 (en) * | 2008-08-29 | 2010-03-04 | Macken Luke J | Method and System for Facilitating Client Server Interaction |
US20100146523A1 (en) * | 2008-12-05 | 2010-06-10 | Tripod Ventures Inc./ Entreprises Tripod Inc. | Browser environment application and local file server application system |
US20100153948A1 (en) * | 2008-12-11 | 2010-06-17 | Ghost, Inc. | Combined web and local computing environment |
US8478798B2 (en) * | 2008-11-10 | 2013-07-02 | Google Inc. | Filesystem access for web applications and native code modules |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1835507A (en) * | 2005-03-17 | 2006-09-20 | 国际商业机器公司 | Method for the server side processing of user interactions with a web-browser |
US8706801B2 (en) * | 2009-07-20 | 2014-04-22 | Facebook, Inc. | Rendering a web page using content communicated to a browser application from a process running on a client |
US20130091197A1 (en) * | 2011-10-11 | 2013-04-11 | Microsoft Corporation | Mobile device as a local server |
US9128513B2 (en) * | 2012-02-08 | 2015-09-08 | Qualcomm Incorporated | Display of an online catalog for concurrent downloading of files |
-
2012
- 2012-02-28 US US13/407,218 patent/US9032303B2/en not_active Expired - Fee Related
-
2015
- 2015-05-04 US US14/703,698 patent/US20150237110A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090282474A1 (en) * | 2008-05-08 | 2009-11-12 | Google Inc. | Method for safely executing an untrusted native code module on a computing device |
US20100057834A1 (en) * | 2008-08-29 | 2010-03-04 | Macken Luke J | Method and System for Facilitating Client Server Interaction |
US8478798B2 (en) * | 2008-11-10 | 2013-07-02 | Google Inc. | Filesystem access for web applications and native code modules |
US20100146523A1 (en) * | 2008-12-05 | 2010-06-10 | Tripod Ventures Inc./ Entreprises Tripod Inc. | Browser environment application and local file server application system |
US20100153948A1 (en) * | 2008-12-11 | 2010-06-17 | Ghost, Inc. | Combined web and local computing environment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150142873A1 (en) * | 2012-05-31 | 2015-05-21 | Siemens Aktiengesellschaft | Communication Between Two Clients Via A Server |
US9667743B2 (en) * | 2012-05-31 | 2017-05-30 | Siemens Aktiengesellschaft | Communication between two clients via a server |
US11531747B2 (en) | 2019-09-16 | 2022-12-20 | Beijing Didi Infinity Technology And Development Co., Ltd. | Method for exchanging data between a web browser and an application |
Also Published As
Publication number | Publication date |
---|---|
US20130227424A1 (en) | 2013-08-29 |
US9032303B2 (en) | 2015-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9032303B2 (en) | Web-based interaction with a local system | |
US12069097B2 (en) | System and method for geofencing | |
US9275221B2 (en) | Context-aware permission control of hybrid mobile applications | |
US10623410B2 (en) | Multi-level, distributed access control between services and applications | |
US10579442B2 (en) | Inversion-of-control component service models for virtual environments | |
US11924210B2 (en) | Protected resource authorization using autogenerated aliases | |
US20140089914A1 (en) | Cross system installation of web applications | |
CN107533618B (en) | Protecting data from unauthorized access | |
US10757088B2 (en) | YARN REST API protection | |
KR102516696B1 (en) | Third-party access of end-user device assets | |
WO2021201922A1 (en) | Context based data leak prevention of sensitive information | |
KR20150004817A (en) | User interface web services | |
US20230056056A1 (en) | Secure visual and computational boundary for a subset of resources on a computing machine | |
US10599878B2 (en) | Using decoy icons to prevent unwanted user access to applications on a user computing device | |
US8474013B2 (en) | Securely managing password access to a computer system | |
US10025574B1 (en) | Packaged installation file based on automatic detection of device capabilities |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |