USING OBJECT BASED SECURITY FOR CONTROLLING OBJECT SPECIFIC ACTIONS ON A SURFACE BASED COMPUTING DEVICE
First Claim
Patent Images
1. A method for controlling behavior of software objects used on a surface based computing device comprising:
- associating software objects with behavior tokens, which control an extent that users are able to manipulate said software objects using a surface based computing device, wherein different manipulations of said software objects are based upon a set of users proximate to the surface based computing device;
automatically detecting a presence of at least one user proximate to the surface based computing device;
determining at least one of an identity and a privilege group for each detected user, which is used when evaluating an extent that said software objects are able to be manipulated;
receiving an attempt to perform an operation against one of the software objects using the surface based computing device;
ascertaining a set of manipulation rights for the software object based upon details specified within a behavioral token associated with the software object and based upon a set of users proximate to the surface based computing device;
applying said ascertained manipulation rights; and
selectively permitting execution of operations associated with the received attempt in accordance with the applied rights.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention discloses a solution for object level security on a surface based computing device that includes software objects and behavior tokens. The behavior tokens can control an extent that users are able to manipulate the software objects using the surface based computing device. Different levels of control can be established on an object-by-object basis for different users. The extent users are able to manipulate the software objects can also depends upon set of users proximate to the surface based computing device.
-
Citations
20 Claims
-
1. A method for controlling behavior of software objects used on a surface based computing device comprising:
-
associating software objects with behavior tokens, which control an extent that users are able to manipulate said software objects using a surface based computing device, wherein different manipulations of said software objects are based upon a set of users proximate to the surface based computing device; automatically detecting a presence of at least one user proximate to the surface based computing device; determining at least one of an identity and a privilege group for each detected user, which is used when evaluating an extent that said software objects are able to be manipulated; receiving an attempt to perform an operation against one of the software objects using the surface based computing device; ascertaining a set of manipulation rights for the software object based upon details specified within a behavioral token associated with the software object and based upon a set of users proximate to the surface based computing device; applying said ascertained manipulation rights; and selectively permitting execution of operations associated with the received attempt in accordance with the applied rights. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for controlling software object behavior on a surface based computing device comprising:
-
detecting a set of users proximate to surface based computing device; determining privileges that said set of users have for using software objects via the surface based computing device; and dynamically adjusting usages rules for the software objects in accordance with the determined privileges. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for object level security on a surface based computing device comprising:
-
a set of one or more software objects stored on a machine readable medium accessible by a surface based computing device; a set of one or more behavior tokens stored on a machine readable medium accessible by a surface based computing device, wherein said behavior tokens control an extent that users are able to manipulate said software objects using said surface based computing device, wherein different levels of control are established on an object-by-object basis for different users, wherein the extent users are able to manipulate said software objects depends upon set of users proximate to the surface based computing device. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification