Clipboard management
First Claim
1. A user device comprising:
- at least one processor;
at least one memory comprising computer program code; and
a first application that has been provisioned by an application provisioning entity, the application provisioning entity being remote from the user device, the first application having access to a first clipboard of a first type, to which data is configured to be transferred and from which data is configured to be retrieved by a further, different, second application on the user device, wherein the first application is configured with an encryption key for a transfer of data to and a retrieval of data from a second clipboard of a second, different type, the encryption key for the first application is configured by the application provisioning entity that has provisioned the first application, the first application encrypts a data item based on the encryption key and transfers the encrypted data item to the second clipboard, wherein the first clipboard, the second clipboard, the first application, and the second application are stored in the at least one memory of the user device, the first clipboard is accessible by both the first application and the second application, and the second clipboard is accessible by the first application,wherein the first application is configured to execute in a foreground operational state or a background operational state, and in response to an indication that the first application is transiting into the background operational state, the first application is configured to associate an identifier with the encrypted data item and transfer the encrypted data item from the second clipboard to the first clipboard on a basis of a predetermined rule; and
wherein the at least one memory and the computer program code being configured to, with the at least one processor, cause the user device to control the transfer of data to and retrieval of data from the second clipboard by the first application via the encryption key.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments provide methods, devices and computer program arranged to control access to clipboards by applications. In one embodiment a user device comprises: at least one processor; and at least one memory comprising computer program code and an application that has been provisioned by an application provisioning entity, the application having access to a first clipboard of a first type, to which data can be transferred and/or from which data can be retrieved by a further, different, application on the user device, wherein the application is configured with an encryption key for the transfer of data to and/or retrieval of data from a second clipboard of a second, type, clipboard, the encryption key being associated with the application provisioning entity. The user device can control the transfer of data to and/or retrieval of data from the second clipboard by the application via the encryption key.
-
Citations
18 Claims
-
1. A user device comprising:
-
at least one processor; at least one memory comprising computer program code; and a first application that has been provisioned by an application provisioning entity, the application provisioning entity being remote from the user device, the first application having access to a first clipboard of a first type, to which data is configured to be transferred and from which data is configured to be retrieved by a further, different, second application on the user device, wherein the first application is configured with an encryption key for a transfer of data to and a retrieval of data from a second clipboard of a second, different type, the encryption key for the first application is configured by the application provisioning entity that has provisioned the first application, the first application encrypts a data item based on the encryption key and transfers the encrypted data item to the second clipboard, wherein the first clipboard, the second clipboard, the first application, and the second application are stored in the at least one memory of the user device, the first clipboard is accessible by both the first application and the second application, and the second clipboard is accessible by the first application, wherein the first application is configured to execute in a foreground operational state or a background operational state, and in response to an indication that the first application is transiting into the background operational state, the first application is configured to associate an identifier with the encrypted data item and transfer the encrypted data item from the second clipboard to the first clipboard on a basis of a predetermined rule; and wherein the at least one memory and the computer program code being configured to, with the at least one processor, cause the user device to control the transfer of data to and retrieval of data from the second clipboard by the first application via the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 18)
-
-
9. A method of controlling clipboard operations on a user device, the user device comprising a first application that has been provisioned by an application provisioning entity remote from the user device, the first application having access to a first clipboard of a first type, to which data is configured to be transferred and from which data is configured to be retrieved by a further, different, second application on the user device, wherein the first application is configured with an encryption key for a transfer of data to and a retrieval of data from a second clipboard of a second, different type, the encryption key for the first application is configured by the application provisioning entity that has provisioned the first application, the first application encrypts a data item based on the encryption key and transfers the encrypted data item to the second clipboard, the first clipboard, the second clipboard, the first application, and the second application being stored in at least one memory of the user device, the first clipboard being accessible by both the first application and the second application, the second clipboard being accessible by the first application, and
the method comprising: - controlling the transfer of data to and retrieval of data from the second clipboard by the first application via the encryption key on a basis of a predetermined criterion; and
wherein the first application is configured to execute in a foreground operational state or a background operational state, and in response to an indication that the first application is transiting into the background operational state, the method further comprising;
associating an identifier with the encrypted data item and transferring the encrypted data item from the second clipboard to the first clipboard on a basis of a predetermined rule. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
- controlling the transfer of data to and retrieval of data from the second clipboard by the first application via the encryption key on a basis of a predetermined criterion; and
-
17. A tangible, non-transitory computer-readable medium comprising a set of instructions, which, when executed by a user device, cause the user device to perform a method of controlling clipboard operations on the user device,
the user device comprising a first application that has been provisioned by an application provisioning entity remote from the user device, the first application having access to a first clipboard of a first type, to which data is configured to be transferred and from which data is configured to be retrieved by a further, different, second application on the user device, wherein the first application is configured with an encryption key for a transfer of data and a retrieval of data from a second clipboard of a second, different type, the encryption key for the first application is configured by the application provisioning entity that has provisioned the first application, the first application encrypts a data item based on the encryption key and transfers the encrypted data item to the second clipboard, the first clipboard, the second clipboard, the first application, and the second application being stored in at least one memory of the user device, the first clipboard being accessible by both the first application and the second application, the second clipboard being accessible by the first application, and wherein the first application is configured to execute in a foreground operational state or a background operational state, and in response to an indication that the first application is transiting into the background operational state, the first application is configured to associate an identifier with the encrypted data item and transfer the encrypted data item from the second clipboard to the first clipboard on a basis of a predetermined rule; - and
the user device comprising a processing system arranged to cause the user device to control the transfer of data to and retrieval of data from the second clipboard by the first application via the encryption key on a basis of a predetermined criterion.
- and
Specification