Restricting user access on shared computer
First Claim
1. A method for restricting, based on predefined user profile information, access to software executing on a computing device of a user, the method comprising:
- intercepting input data from a user input device, the input data representing a position on a screen associated with a selected icon;
comparing the input data with a list of restrictions in the user profile information to determine if an action associated with the input data is prohibited;
passing the input data to the software for execution when the action associated with the input data is not prohibited; and
rendering a message indicating that the position is restricted when the input data is prohibited.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for restricting, based on predefined user profile information, access to software executing on a computing device of a user. The method comprises the following steps. Input data is intercepted from a user input device. The input data is compared with a list of restrictions in the user profile information to determining if an action associated with the input data is prohibited. The input data is passed to the software for execution only if the action associated with the input data is not prohibited. A method for restricting, based on predefined user profile information, access to notifications generated for a user is also provided.
13 Citations
13 Claims
-
1. A method for restricting, based on predefined user profile information, access to software executing on a computing device of a user, the method comprising:
-
intercepting input data from a user input device, the input data representing a position on a screen associated with a selected icon; comparing the input data with a list of restrictions in the user profile information to determine if an action associated with the input data is prohibited; passing the input data to the software for execution when the action associated with the input data is not prohibited; and rendering a message indicating that the position is restricted when the input data is prohibited. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer-readable medium having stored thereon instructions for restricting, based on predefined user profile information, access to software executing on a computing device of a user, the instructions, when executed by a processor, operable to:
-
intercept input data from a user input device, the input data representing a position on a screen associated with a selected icon; compare the input data with a list of restrictions in the user profile information to determining if an action associated with the input data is prohibited; pass the input data to the software for execution when the action associated with the input data is not prohibited; and render a message indicating that the position is restricted when the input data is prohibited. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium having stored thereon instructions for restricting, based on predefined user profile information, access to notifications generated for a user, the instructions, when executed by a processor of a device, operable to:
-
monitor, on the device, the notifications for the user; compare, on the device, the notifications with a list of restrictions in the user profile information set for a user of the device by a person other than the user, to determine if an action associated with the notification is prohibited; supress, on the device, the notification when the action associated with the notification is prohibited; and render the notification on the device when the action associated with the notification is not prohibited. - View Dependent Claims (12, 13)
-
Specification