×

Clipboard management

  • US 10,255,446 B2
  • Filed: 07/07/2015
  • Issued: 04/09/2019
  • Est. Priority Date: 01/08/2013
  • Status: Active Grant
First Claim
Patent Images

1. A user device comprising:

  • at least one processor;

    at least one memory comprising computer program code; and

    a first application that has been provisioned by an application provisioning entity, the application provisioning entity being remote from the user device, the first application having access to a first clipboard of a first type, to which data is configured to be transferred and from which data is configured to be retrieved by a further, different, second application on the user device, wherein the first application is configured with an encryption key for a transfer of data to and a retrieval of data from a second clipboard of a second, different type, the encryption key for the first application is configured by the application provisioning entity that has provisioned the first application, the first application encrypts a data item based on the encryption key and transfers the encrypted data item to the second clipboard, wherein the first clipboard, the second clipboard, the first application, and the second application are stored in the at least one memory of the user device, the first clipboard is accessible by both the first application and the second application, and the second clipboard is accessible by the first application,wherein the first application is configured to execute in a foreground operational state or a background operational state, and in response to an indication that the first application is transiting into the background operational state, the first application is configured to associate an identifier with the encrypted data item and transfer the encrypted data item from the second clipboard to the first clipboard on a basis of a predetermined rule; and

    wherein the at least one memory and the computer program code being configured to, with the at least one processor, cause the user device to control the transfer of data to and retrieval of data from the second clipboard by the first application via the encryption key.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×