Method and system for restricting use of a clipboard application
First Claim
Patent Images
1. A method for restricting use of a clipboard application, the method comprising:
- determining whether a copy selection associated with designated content of a source file being displayed by a first source application has been made;
storing the designated content to the clipboard application;
receiving a copy command associated with the copy selection, the copy command including a flag or indicator associated with a user;
authenticating the user based upon the received flag or indicator; and
determining whether the source file is a secured file, wherein the secured file includes a header having a file key available to the authenticated user, and wherein the secured file cannot be accessed without the file key.
6 Assignments
0 Petitions
Accused Products
Abstract
Techniques and mechanisms for controlling copying of content from a secured file or secured document are disclosed. In one embodiment, the techniques or mechanisms operate to control clipboard usage such that content from a secured document of one application is not able to be copied to another application or a different document of another application by way of a clipboard. According to another embodiment, alternate content is copied to another application or a different document of another application instead of the content from the secured document.
788 Citations
28 Claims
-
1. A method for restricting use of a clipboard application, the method comprising:
-
determining whether a copy selection associated with designated content of a source file being displayed by a first source application has been made; storing the designated content to the clipboard application; receiving a copy command associated with the copy selection, the copy command including a flag or indicator associated with a user; authenticating the user based upon the received flag or indicator; and determining whether the source file is a secured file, wherein the secured file includes a header having a file key available to the authenticated user, and wherein the secured file cannot be accessed without the file key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for restricting use of a clipboard application, the method comprising:
-
receiving a copy selection associated with designated content of a source file being displayed by a first source application; receiving a copy command associated with the copy selection, the copy command including a flag or indicator associated with a user; authenticating the user based upon the received flag or indicator; and determining whether the source file is a secured file, wherein the secured file includes a header having a file key available to the authenticated user, and wherein the secured file cannot be accessed without the file key, wherein said determining is performed by one or more computing devices. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23)
-
-
24. A non-transitory computer readable medium having instructions stored thereon for restricting the use of a clipboard application, the instructions comprising:
-
instructions to receive a copy selection associated with designated content of a source file being displayed by a first source application; instructions to receive a copy command associated with the copy selection, the copy command including a flag or indicator associated with a user; instructions to authenticate the user based upon the received flag or indicator; and instructions to determine whether the source file is a secured file, wherein the secured file includes a header having a file key available to the authenticated user, and wherein the secured file cannot be accessed without the file key. - View Dependent Claims (25, 26, 27, 28)
-
Specification