Shared session techniques
First Claim
1. A method comprising:
- initiating a first user login session as running in a context of a first user profile of a first user with an operating system of a computing device;
creating, by the operating system, a shadow login session upon initiation of the first user login session and in the absence of a request to run the first user login session in a context of a second user profile of a second user;
after creating the shadow login session, receiving, by the operating system, a request to run the first user login session in the context of the second user profile of the second user;
securely verifying credentials associated with the second user profile received as part of the request and, responsive to the verifying, receiving user settings for the second user to associate the second user profile with the shadow login session; and
associating the second user profile, by the operating system, with the shadow login session without switching between logins, such that interaction of the second user with the operating system is associated with the second user profile and interaction of the first user with the operating system is associated with the first user profile.
2 Assignments
0 Petitions
Accused Products
Abstract
Data sharing session techniques are described. In one or more implementations, a first user login session is initiated as running in a context of a first user profile of a first user with an operating system of a computing device. A request is received by the operating system to run the first user login session in a context of a second user profile of a second user. The second user profile is associated by the operating system with a shadow login session created within the first user login session of the operating system of the computing device such that interaction of the second user with the operating system is associated with the second user profile and interaction of the first user with the operating system is associated with the first user profile.
-
Citations
11 Claims
-
1. A method comprising:
-
initiating a first user login session as running in a context of a first user profile of a first user with an operating system of a computing device; creating, by the operating system, a shadow login session upon initiation of the first user login session and in the absence of a request to run the first user login session in a context of a second user profile of a second user; after creating the shadow login session, receiving, by the operating system, a request to run the first user login session in the context of the second user profile of the second user; securely verifying credentials associated with the second user profile received as part of the request and, responsive to the verifying, receiving user settings for the second user to associate the second user profile with the shadow login session; and associating the second user profile, by the operating system, with the shadow login session without switching between logins, such that interaction of the second user with the operating system is associated with the second user profile and interaction of the first user with the operating system is associated with the first user profile. - View Dependent Claims (2, 3, 4)
-
-
5. A memory device having program instructions stored thereon that, upon execution by a processor of a computer system, cause the computer system to:
-
create a shadow login session upon initiation of a first user login session in a context of a first user profile of a first user with an operating system of the computing device; receive a request to run the first user login session in the context of a second user profile of a second user; securely verify credentials associated with the second user profile received as part of the request and, responsive to the verifying, receive user settings for the second user to associate the second user profile with the shadow login session; and associate the second user profile with the shadow login session without switching between logins, wherein interaction of the second user with the operating system is associated with the second user profile and interaction of the first user with the operating system is associated with the first user profile. - View Dependent Claims (6, 7, 8)
-
-
9. A computer system, comprising:
-
a processor; and a memory coupled to the processor, the memory having program instructions stored thereon that, upon execution by the, cause the computer system to; create a shadow login session upon initiation of a first user login session in a context of a first user profile in the absence of a request to run the first user login session in a context of a second user profile of a second user; receive a request to run the first user login session in the context of a second user profile of a second user; securely verify credentials associated with the second user profile received as part of the request and, responsive to the verifying, receive user settings for the second user to associate the second user profile with the shadow login session; and associate the second user profile with the shadow login session without switching between logins, wherein interaction of the second user with the operating system is associated with the second user profile and interaction of the first user with the operating system is associated with the first user profile. - View Dependent Claims (10, 11)
-
Specification