Controlling user-access to computer applications
First Claim
Patent Images
1. A system to control access to computer applications, comprising:
- a control unit monitor configured to monitor requests from computer applications to display information to a user;
an identifier configured to identify a particular application that generated a particular request; and
a display inhibitor configured to prevent the display of information if the particular application is designated as prohibited.
9 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides systems and methods for controlling access to to computer applications. Briefly described in architecture, some embodiments of a system provide at least one computer application stored on a computer, and a control unit to regulate user-access to computer applications stored on the computer. In this way, the control unit prohibits the displaying of information from a computer application that has been prohibited. Other systems and methods are also provided.
124 Citations
33 Claims
-
1. A system to control access to computer applications, comprising:
-
a control unit monitor configured to monitor requests from computer applications to display information to a user;
an identifier configured to identify a particular application that generated a particular request; and
a display inhibitor configured to prevent the display of information if the particular application is designated as prohibited. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for controlling access to computer applications, comprising the steps of:
-
monitoring requests from applications to display information to a user;
determining if the user is authorized to view the information; and
displaying the information if the user is authorized. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
-
26. A computer-readable medium for storing a program that controls computer access to Internet content, the program comprising the steps of:
-
monitoring requests from applications to display information to a user;
determining if the user is authorized to view the information; and
displaying the information if the user is authorized. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33)
-
Specification