Changing user identities without closing applications
First Claim
1. A method comprising:
- a. running a first application and a second application on a computer system using a current identity of a user of the computer system, the current identity defining a plurality of work-environment settings, the current identity being used by both the first application and the second application, the current identity being a first identity, the first and second applications running substantially simultaneously on a multitasking computer system;
b. receiving a request to change the current identity;
c. obtaining permission from the first application and the second application to change the current identity; and
d. changing the current identity so that the first application uses a second identity rather than the first identity without closing the first application, and so that the second application uses the second identity rather than the first identity without closing the second application.
2 Assignments
0 Petitions
Accused Products
Abstract
An operating system registry contains multiple “identities.” One of these identities is designated the current identity. An application executing on a multitasking computer system uses information stored in the current identity to configure the application, for example to provide a user-specific user interface. When an application opens, it registers with an identity manager using objects known as “connection points.” To switch identities, a user supplies the name of an identity to switch to. The identity manager then uses the registered connection points to query each of the applications for permission to switch identities. If all the registered connection points grant permission to switch identities, then the identity manager switches the current identity by changing information in the registry. The identity manager then notifies all applications, via their registered connection points, that a change to the registry has been made so that the applications can take appropriate action.
-
Citations
12 Claims
-
1. A method comprising:
-
a. running a first application and a second application on a computer system using a current identity of a user of the computer system, the current identity defining a plurality of work-environment settings, the current identity being used by both the first application and the second application, the current identity being a first identity, the first and second applications running substantially simultaneously on a multitasking computer system;
b. receiving a request to change the current identity;
c. obtaining permission from the first application and the second application to change the current identity; and
d. changing the current identity so that the first application uses a second identity rather than the first identity without closing the first application, and so that the second application uses the second identity rather than the first identity without closing the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
i. obtaining permission from the first application via a first connection point; and
ii. obtaining permission from the second application via a second connection point.
-
-
7. The method of claim 1, further comprising:
-
e. creating a first connection point for communication with the first application;
f. opening a first window corresponding to the first connection point;
g. creating a second connection point for communication with the second application;
h. opening a second window corresponding to the second connection point;
i. sending to the first window a first message requesting permission to change identities, the permission obtained in (c) from the first application being received via the first window; and
j. sending to the second window a second message requesting permission to change identities, the permission obtained in (c) from the second application being received via the second window.
-
-
8. A computer-readable medium having computer-executable instructions for performing the steps of:
-
a. querying a first application for permission to switch identities of a user of a computer system, the first application using a first identity of a user of the computer system, the first identity being a part of a registry, the first identity being first values of work-environment settings;
b. querying a second application for permission to switch identities, the second application using the first identity, the first and second applications executing substantially simultaneously on a multitasking computer system; and
c. if both the first application and the second application grant permission to change identities, modifying the registry such that the first application uses a second identity of a user of the computer system rather than the first identity and such that the second application uses the second identity rather than the first identity, the first and second applications switching from using the first identity to using the second identity without either the first application or the second application being closed, the second identity being a part of the registry, the second identity being second values of work-environment settings. - View Dependent Claims (9, 10, 11, 12)
a. notifying the first application via the first connection point that the registry has been modified; and
b. notifying the second application via the second connection point that the registry has been modified.
-
Specification