CLIPBOARD MANAGEMENT
First Claim
1. A user device comprising:
- at least one processor; and
at least one memory comprising computer program code and an application that has been provisioned by an application provisioning entity, the application having access to a first clipboard of a first type, to which data can be transferred and/or from which data can be retrieved by a further, different, application on the user device, wherein the application is configured with an encryption key for the transfer of data to and/or retrieval of data from a second clipboard of a second, different type, the encryption key being associated with the application provisioning entity,the at least one memory and the computer program code being configured to, with the at least one processor, cause the user device to control the transfer of data to and/or retrieval of data from the second clipboard by the application via the encryption key.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments provide methods, devices and computer program arranged to control access to clipboards by applications. In one embodiment a user device comprises: at least one processor; and at least one memory comprising computer program code and an application that has been provisioned by an application provisioning entity, the application having access to a first clipboard of a first type, to which data can be transferred and/or from which data can be retrieved by a further, different, application on the user device, wherein the application is configured with an encryption key for the transfer of data to and/or retrieval of data from a second clipboard of a second, type, clipboard, the encryption key being associated with the application provisioning entity. The user device can control the transfer of data to and/or retrieval of data from the second clipboard by the application via the encryption key.
23 Citations
21 Claims
-
1. A user device comprising:
-
at least one processor; and at least one memory comprising computer program code and an application that has been provisioned by an application provisioning entity, the application having access to a first clipboard of a first type, to which data can be transferred and/or from which data can be retrieved by a further, different, application on the user device, wherein the application is configured with an encryption key for the transfer of data to and/or retrieval of data from a second clipboard of a second, different type, the encryption key being associated with the application provisioning entity, the at least one memory and the computer program code being configured to, with the at least one processor, cause the user device to control the transfer of data to and/or retrieval of data from the second clipboard by the application via the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of controlling clipboard operations on a user device, the user device comprising an application that has been provided by an application provisioning entity, the application having access to a first clipboard of a first type, to which data can be transferred and/or from which data can be retrieved by a further, different application on the user device, wherein the application is configured with an encryption key for the transfer of data to and/or retrieval of data from a second clipboard of a second, different type, the encryption key being associated with the application provisioning entity, the method comprising:
- controlling the transfer of data to and/or retrieval of data from the second clipboard by the application via the encryption key on the basis of a predetermined criterion.
- View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
21. A computer program comprising a set of instructions, which, when executed by a user device, cause the user device to perform a method of controlling clipboard operations on the user device, the user device comprising an application that has been provided by an application provisioning entity, the application having access to a first clipboard of a first type, to which data can be transferred and/or from which data can be retrieved by a further, different application on the user device, wherein the application is configured with an encryption key for the transfer of data and/or retrieval of data from a second clipboard of a second, different type, the encryption key being associated with the application provisioning entity, the user device comprising a processing system arranged to cause the user device to control the transfer of data to and/or retrieval of data from the second clipboard by the application via the encryption key on the basis of a predetermined criterion.
Specification