CONTEXT-SENSITIVE COPY AND PASTE BLOCK
First Claim
1. A copy action controller comprising:
- a command detector configured to detect an automated processor-implemented copy action in response to a user command received by a computer system, the copy action comprising at least one of a cut action from a source, a copy action from the source, and a paste action to a destination;
a rule applicability determiner configured to determine, based on a first information comprising at least one of the source and the destination, whether the copy action satisfies a rule controlling the user action; and
an action implementer configured to perform at least one of blocking the copy action and transmitting a report of the copy action to an action log, in accordance with the rule.
2 Assignments
0 Petitions
Accused Products
Abstract
A cut/copy action controller includes a command detector detects a cut/copy action in response to a user command; a rule applicability determiner determines, based on the source and/or destination, whether the cut/copy action satisfies a rule controlling the user action; and blocks the cut/copy action and/or the paste action in accordance with the rules. A report of the copy action may be transmitted to a log. The cut/copy action may automatically store content to an automated processor storage location such as a clipboard of a local host. A rule generator may generate a rule such that when the recurrence information indicates low recurrence of the information associated then the rule yields the blocking of the copy action.
-
Citations
16 Claims
-
1. A copy action controller comprising:
-
a command detector configured to detect an automated processor-implemented copy action in response to a user command received by a computer system, the copy action comprising at least one of a cut action from a source, a copy action from the source, and a paste action to a destination; a rule applicability determiner configured to determine, based on a first information comprising at least one of the source and the destination, whether the copy action satisfies a rule controlling the user action; and an action implementer configured to perform at least one of blocking the copy action and transmitting a report of the copy action to an action log, in accordance with the rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification