Controlling application features
First Claim
1. A method performed by a computing system for controlling features of a controlled application from a controlling application, comprising:
- collecting an indication of features of the controlled application into a set of tokens, wherein, each token in the set of tokens corresponds to a feature of the controlled application;
starting the controlled application;
reading configuration settings from a configuration file, the configuration settings based on one or more of;
observed past interactions of a user and the user'"'"'s network credentials;
identifying, based on the configuration settings, features of the controlled application to be disabled, wherein the identified features correspond to one or more tokens in the set of tokens;
altering the set of tokens to indicate the identified features of the controlled application to be disabled, the altering performed by removing the tokens from the set of tokens to which the identified features correspond; and
providing the altered set of tokens to the controlled application, wherein the controlled application is configured to disable at least one feature of the controlled application based on the altered set of tokens.
2 Assignments
0 Petitions
Accused Products
Abstract
A facility is provided for controlling application features. In various embodiments, the facility assembles an indication of features, starts a controlled application, and provides the assembled indication of features to the controlled application so that the controlled application can disable a feature of the controlled application. The facility can include a controlling application that is adapted for assembling a set of tokens that identify features by adding or removing tokens when a user of the controlling application selects a command associated with the controlling application, and a controlled application that, when invoked by the controlling application and provided the assembled set of tokens, controls a feature of the controlled application based on the assembled set of tokens.
-
Citations
23 Claims
-
1. A method performed by a computing system for controlling features of a controlled application from a controlling application, comprising:
-
collecting an indication of features of the controlled application into a set of tokens, wherein, each token in the set of tokens corresponds to a feature of the controlled application; starting the controlled application; reading configuration settings from a configuration file, the configuration settings based on one or more of;
observed past interactions of a user and the user'"'"'s network credentials;identifying, based on the configuration settings, features of the controlled application to be disabled, wherein the identified features correspond to one or more tokens in the set of tokens; altering the set of tokens to indicate the identified features of the controlled application to be disabled, the altering performed by removing the tokens from the set of tokens to which the identified features correspond; and providing the altered set of tokens to the controlled application, wherein the controlled application is configured to disable at least one feature of the controlled application based on the altered set of tokens. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for controlling features of a controlled application from a controlling application, comprising:
-
a processor and memory; the controlling application executed by the processor is adapted for collecting a set of tokens, when a user of the controlling application selects a command associated with the controlling application, wherein, each token in the set of tokens corresponds to a feature of the controlled application; and wherein the set of tokens are collected by removing one or more tokens from a previous set of tokens based on a determination of whether a particular function of the controlled application is irrelevant to a command currently being performed by the system, wherein the determination of whether a particular function of the controlled application is irrelevant is based on a predicted state of the system after the system complies with the command; and the controlled application, when invoked by the controlling application and provided the collected set of tokens, disables at least one feature of the controlled application based on the collected set of tokens. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-readable storage medium having computer-executable instructions that, when executed, perform a method for controlling features of a controlled application from a controlling application, the method comprising:
-
receiving from the controlling application an indication to load a component associated with the controlled application and a set of tokens, wherein the set of tokens is modified from an original set of tokens corresponding to features of the controlled application by; reading configuration settings from a configuration file; and identifying, based on the read configuration settings, one or more tokens of the set of tokens such that each identified token corresponds to one or more features of the controlled application to be enabled; determining whether the component to be loaded matches at least one of an identified one or more tokens corresponding tone or more features of the controlled application to be enabled; and only when the component to be loaded matches at least one of an identified one or more tokens, enabling the component, wherein the settings in the configuration file are based on one or more of;
observed past interactions of a user and the user'"'"'s network credentials. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method performed by a computing system for controlling features of a controlled application from a controlling application, comprising:
-
collecting an indication of features of the controlled application into a set of tokens, wherein, each token in the set of tokens corresponds to a feature of the controlled application; identifying, based on one or more of;
observed past interactions of a user and the user'"'"'s network credentials, features of the controlled application to be modified, wherein the identified features correspond to one or more tokens in the set of tokens;altering the set of tokens to indicate the identified features of the controlled application to be modified; and providing the altered set of tokens to the controlled application, wherein the controlled application is configured to modify at least one feature of the controlled application based on the altered set of tokens.
-
-
21. A method performed by a computing system for controlling features of an integrated development environment, the method comprising:
-
collecting, based on one or more of;
observed past interactions of a user and the user'"'"'s network credentials, a set of tokens corresponding to features of the integrated development environment; andproviding the collected set of tokens to the integrated development environment; wherein the integrated development environment is configured to, based on the presence or absence of tokens in the collected set of tokens, modify at least one feature of the integrated development environment, wherein the modifying comprises one of;
enabling a feature, disabling a feature, inserting code into an editor, creating or opening projects, and changing stylistic features displayed in the integrated development environment.
-
-
22. A computer-readable storage medium having computer-executable instructions that, when executed, perform operations for controlling features of a controlled application from a controlling application, the method comprising, the operations comprising:
-
collecting an indication of features of the controlled application into a set of tokens, wherein, each token in the set of tokens corresponds to a feature of the controlled application; identifying, based on one or more of;
observed past interactions of a user and the user'"'"'s network credentials, features of the controlled application to be modified, wherein the identified features correspond to one or more tokens in the set of tokens;altering the set of tokens to indicate the identified features of the controlled application to be modified; and providing the altered set of tokens to the controlled application, wherein the controlled application is configured to modify at least one feature of the controlled application based on the altered set of tokens.
-
-
23. A computer-readable storage medium having computer-executable instructions that, when executed, perform operations for controlling features of a controlled application from a controlling application, the method comprising, the operations comprising:
-
collecting, based on one or more of;
observed past interactions of a user and the user'"'"'s network credentials, a set of tokens corresponding to features of the integrated development environment; andproviding the collected set of tokens to the integrated development environment; wherein the integrated development environment is configured to, based on the presence or absence of tokens in the collected set of tokens, modify at least one feature of the integrated development environment, wherein the modifying comprises one of;
enabling a feature, disabling a feature, inserting code into an editor, creating or opening projects, and changing stylistic features displayed in the integrated development environment.
-
Specification