Protectable expressions in objects having authorable behaviors and appearances
First Claim
1. A method of preventing unauthorized access to a property of a shape object in a computer drawing program comprising:
- assigning a value to a protection property for a property of a shape object, wherein the value signifies the intent to prevent access to the property;
assigning a password to the shape object thereby resulting in the shape object being password protected, wherein access to the property of a password protected shape object is not permitted.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, apparatus, and article of manufacture for executing intelligent shape programming in a computer within a CAD application program, wherein elements of the intelligent shape can be protected from unauthorized use and modification. The intelligent shape comprises several objects for use in connecting, manipulating, displaying, mapping, protecting, and otherwise creating a new component or modifying an existing one. To provide for the protection of a shape, the intelligent shape programming provides for the user of a protection object that comprises a read-write shape identification and a set password method. The set password method is utilized to assign a password to each shape that is combined with the shape identification such that the shape becomes password protected. Once password protected, properties and expressions of the shape cannot be modified, changed, deleted, etc. and the protection status of the shape cannot be changed. To provide for the protection of individual properties and expressions of a shape, a boolean protection property for each property/expression of a shape is maintained in an expressions object. When the protection property is set to TRUE (and the shape is password protected), the expression/property cannot be changed, modified, accessed, deleted, assigned, etc. Accordingly, an author supplied password is utilized to prevent unauthorized access and protect the author'"'"'s investment in creating and defining the shape.
62 Citations
53 Claims
-
1. A method of preventing unauthorized access to a property of a shape object in a computer drawing program comprising:
-
assigning a value to a protection property for a property of a shape object, wherein the value signifies the intent to prevent access to the property;
assigning a password to the shape object thereby resulting in the shape object being password protected, wherein access to the property of a password protected shape object is not permitted. - View Dependent Claims (2, 3, 4)
-
-
5. A method of preventing unauthorized access to a property of a shape object in a computer drawing program comprising:
-
(a) receiving a request for access to a property of a shape object, (b) rejecting the requested access when;
(i) the property has a corresponding protection property that signifies the intent to present access to the property; and
(ii) the shape object has been assigned a password thereby resulting in the shape object being password protected. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of preventing unauthorized access to a property of a shape object in a computer drawing program comprising:
-
providing a protection property for a property of a shape object, wherein a value of the protection property signifies the intent to prevent access to the property; and
providing a method that assigns a password to the shape object thereby resulting in the shape object being password protected, wherein access to the property of a password protected shape object is not permitted. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer-implemented system for preventing unauthorized access to a property of a shape object in a computer drawing program comprising:
-
(a) a computer;
(b) a computer drawing program executing on the computer, the computer drawing program comprising;
(i) a protection property for a property of a shape object, wherein a value of the protection property signifies the intent to prevent access to the property;
(ii) a method for assigning a password to the shape object thereby resulting in the shape object being password protected, wherein access to the property of a password protected shape object is not permitted. - View Dependent Claims (20, 21, 22)
-
-
23. A computer-implemented system for preventing unauthorized access to a property of a shape object in a computer drawing program comprising:
-
(a) a computer;
(b) a computer drawing program executing on the computer, the computer drawing program comprising;
(i) a shape object having a property;
(ii) a protection property for the property;
(iii) a method for receiving a request for access to the property of the shape object;
(iv) a method for rejecting the requested access when;
(1) a value of the protection property signifies the intent to prevent access to the property; and
(2) the shape object has been assigned a password thereby resulting in the shape object being password protected. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. An article of manufacture comprising a computer program carrier readable by a computer and embodying one or more instructions executable by the computer to perform a method for preventing unauthorized access to a property of a shape object in a computer drawing program, the method comprising:
-
assigning a value to a protection property for a property of a shape object, wherein the value signifies the intent to prevent access to the property;
assigning a password to the shape object thereby resulting in the shape object being password protected, wherein access to the property of a password protected shape object is not permitted. - View Dependent Claims (33, 34, 35)
-
-
36. An article of manufacture comprising a computer program carrier readable by a computer and embodying one or more instructions executable by the computer to perform a method for preventing unauthorized access to a property of a shape object in a computer drawing program, the method comprising:
-
(a) receiving a request for access to a property of a shape object, (b) rejecting the requested access when;
(i) the property has a corresponding protection property that signifies the intent to prevent access to the property; and
(ii)) the shape object has been assigned a password thereby resulting in the shape object being password protected. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. An article of manufacture comprising a computer program carrier readable by a computer and embodying one or more instructions executable by the computer to perform a method for preventing unauthorized access to a property of a shape object in a computer drawing program, the method comprising:
-
providing a protection property for a property of a shape object, wherein a value of the protection property signifies the intent to prevent access to the property; and
providing a method that assigns a password to the shape object thereby resulting in the shape object being password protected, wherein access to the property of a password protected shape object is not permitted. - View Dependent Claims (46, 47, 48, 49)
-
-
50. A data structure used to prevent unauthorized access to a property of a shape object, the data structure comprising:
a shape object that has a property, a value for a protection property of the property that signifies the intent to prevent access to the property, and a password assigned to the shape object that prevents access to the property. - View Dependent Claims (51, 52, 53)
Specification