RESTRICTING USER ACCESS ON SHARED COMPUTER
First Claim
1. A method for restricting, based on predefined user profile information, access to software executing on a computing device of a user, the method comprising the steps of:
- intercepting input data from a user input device;
comparing the input data with a list of restrictions in the user profile information to determining if an action associated with the input data is prohibited; and
passing the input data to the software for execution only if the action associated with the input data is not prohibited.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for restricting, based on predefined user profile information, access to software executing on a computing device of a user. The method comprises the following steps. Input data is intercepted from a user input device. The input data is compared with a list of restrictions in the user profile information to determining if an action associated with the input data is prohibited. The input data is passed to the software for execution only if the action associated with the input data is not prohibited. A method for restricting, based on predefined user profile information, access to notifications generated for a user is also provided.
-
Citations
25 Claims
-
1. A method for restricting, based on predefined user profile information, access to software executing on a computing device of a user, the method comprising the steps of:
-
intercepting input data from a user input device; comparing the input data with a list of restrictions in the user profile information to determining if an action associated with the input data is prohibited; and passing the input data to the software for execution only if the action associated with the input data is not prohibited. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 18, 19, 20, 21, 22)
-
-
12. A non-transitory computer-readable medium having stored thereon instructions for restricting, based on predefined user profile information, access to software executing on a computing device of a user, the instructions, when executed by a processor, operable to:
-
intercept input data from a user input device; compare the input data with a list of restrictions in the user profile information to determining if an action associated with the input data is prohibited; and pass the input data to the software for execution only if the action associated with the input data is not prohibited. - View Dependent Claims (13, 14, 15, 16, 17, 25)
-
-
23. A non-transitory computer-readable medium having stored thereon instructions for restricting, based on predefined user profile information, access to notifications generated for a user, the instructions, when executed by a processor, operable to:
-
monitor the notifications for the user; compare the notifications with a list of restrictions in the user profile information to determining if an action associated with the input data is prohibited; and suppress the notification if the action associated with the input data is prohibited. - View Dependent Claims (24)
-
Specification