PRIVATE AND PUBLIC APPLICATIONS
First Claim
1. A method performed by one or more processors executing on a computer system, the method comprising:
- designating an application on the computer system for private functionality or public functionality;
enforcing a security wall with respect to the application if the application is designated for private functionality, wherein enforcing the security wall includes preventing access to the application until a security input is received; and
providing access to the application if the application is designated for public functionality, wherein providing access to the application includes allowing a user to access the application without receiving the security input from the user.
1 Assignment
0 Petitions
Accused Products
Abstract
Designating applications for public access or private access on a computing device is disclosed. An application on the computing device is designated for private functionality or public functionality. A security wall is enforced with respect to the application if the application is designated for private functionality, wherein enforcing the security wall includes preventing access to the application until a security input is received. Access to the application is provided if the application is designated for public functionality, wherein providing access to the application includes allowing a user to access the application without receiving the security input from the user.
105 Citations
20 Claims
-
1. A method performed by one or more processors executing on a computer system, the method comprising:
-
designating an application on the computer system for private functionality or public functionality; enforcing a security wall with respect to the application if the application is designated for private functionality, wherein enforcing the security wall includes preventing access to the application until a security input is received; and providing access to the application if the application is designated for public functionality, wherein providing access to the application includes allowing a user to access the application without receiving the security input from the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer program product tangibly embodied in a computer-readable storage medium, the computer program product including instructions that, when executed, perform the following operations:
-
determining that a first functionality of an application is designated for public functionality and a second functionality of the application is designated for private functionality; providing access to the first functionality of the application, wherein providing access to the first functionality of the application includes allowing a user to access the first functionality of the application without receiving a security input from the user; and enforcing a security wall with respect to the second functionality of the application, wherein enforcing the security wall includes preventing access to the second functionality of the application until the security input is received. - View Dependent Claims (13, 14, 15)
-
-
16. A system comprising:
-
a computer-readable storage medium operable to store instructions of an application; a security wall module operable to enforce a security wall with respect to the application if the application is designated for private functionality, wherein enforcing the security wall includes preventing access to the application until a security input is received, the security wall module further operable to provide access to the application if the application is designated for public functionality, wherein providing access to the application includes allowing a user to access the application without receiving the security input from the user. - View Dependent Claims (17, 18, 19, 20)
-
Specification