User controls for a computer
First Claim
1. A method for selectively limiting a user'"'"'s use of a computer, comprising:
- receiving on the computer user authorization settings for at least one user;
receiving from the user a request to perform an action on the computer; and
determining based on the user authorization settings whether the user is authorized to perform the action on the computer, and, if so, performing the action.
2 Assignments
0 Petitions
Accused Products
Abstract
This invention is directed to provide a method for enabling an administrator to monitor and selectively limit the computer functions available to a user. The method is carried out on a personal computer by an administrator, and administrator decisions can be enforced on other personal computers in a local network. The invention enables an administrator to restrict a user'"'"'s logon hours, logon duration, access to computer functions, and access to applications based on content rating. In addition, the administrator may temporarily restrict or extend normally allowed access privileges. The invention also allows for the monitoring, auditing, and reporting of a user'"'"'s computer function usage to an administrator.
95 Citations
166 Claims
-
1. A method for selectively limiting a user'"'"'s use of a computer, comprising:
-
receiving on the computer user authorization settings for at least one user;
receiving from the user a request to perform an action on the computer; and
determining based on the user authorization settings whether the user is authorized to perform the action on the computer, and, if so, performing the action. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
32. A method for selectively limiting a user'"'"'s use of a computer in a local network wherein at least one computer in the local network has a group policy object for the user, comprising:
-
receiving on the computer at least one group policy object containing user authorization settings for at least one user;
receiving from the user a request to perform an action on the computer; and
determining based on the user authorization settings whether the user is authorized to perform the action on the computer, and, if so, performing the action. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 57, 58, 59, 60, 61, 62, 126, 128)
-
-
63. A method for monitoring and selectively limiting a user'"'"'s use of a computer in a local network, wherein each computer in the local network is adapted to receive a group policy object and based thereon to selectively limit the user'"'"'s use of the computer comprising:
-
receiving user authorization settings for at least one user;
storing the user authorization settings in a group policy object; and
transmitting the group policy object to at least one computer in the local network. - View Dependent Claims (64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83)
-
-
84. A computer-readable medium containing computer executable instructions for performing a method for selectively limiting a user'"'"'s use of a computer, the method comprising:
-
receiving on the computer user authorization settings for at least one user;
receiving from the user a request to perform an action on the computer; and
determining based on the user authorization settings whether the user is authorized to perform the action on the computer, and, if so, performing the action. - View Dependent Claims (85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114)
-
-
115. A computer-readable medium containing computer executable instructions for performing a method for selectively limiting a user'"'"'s use of a computer in a local network wherein at least one computer in the local network has a group policy object for the user, the method comprising:
-
receiving on the computer at least one group policy object containing user authorization settings for at least one user;
receiving from the user a request to perform an action on the computer; and
determining based on the user authorization settings whether the user is authorized to perform the action on the computer, and, if so, performing the action. - View Dependent Claims (116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 127, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145)
-
-
146. A computer-readable medium containing computer executable instructions for performing a method for monitoring and selectively limiting a user'"'"'s use of a computer in a local network, wherein each computer in the local network is adapted to receive a group policy object and based thereon to selectively limit the user'"'"'s use of the computer, the method comprising:
-
receiving user authorization settings for at least one user;
storing the user authorization settings in a group policy object; and
transmitting the group policy object to at least one computer in the local network. - View Dependent Claims (147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159, 160, 161, 162, 163, 164, 165, 166)
-
Specification