Controlling user-access to computer applications
First Claim
Patent Images
1. A system to control access to computer applications, comprising:
- a processor communicating with memory;
the processor monitoring a request to launch a computer application, wherein the computer application is running on a computer operating system stored in the memory;
locally storing a user profile in the memory that is associated with a user, the user profile comprising a listing of prohibited computer applications to which access is denied;
the processor querying the user profile for the requested computer application;
if the requested computer application is not found in the user profile, then the processor launches the requested computer application, as the user is authorized to access the requested computer application;
if the requested computer application is found in the user profile, then the processor intercepts a message for opening a window associated with the requested computer application before receipt thereof by the computer operating system;
the processor prohibits opening the window associated with the requested computer application when the requested computer application is found in the user profile, thus terminating the launch of the requested computer application, as the user is not authorized to access the requested computer application; and
when the requested computer application is launched, then the processor opens the window associated with the requested computer application and presents information associated with the requested computer application.
9 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides systems and methods for controlling access to to computer applications. Briefly described in architecture, some embodiments of a system provide at least one computer application stored on a computer, and a control unit to regulate user-access to computer applications stored on the computer. In this way, the control unit prohibits the displaying of information from a computer application that has been prohibited. Other systems and methods are also provided.
154 Citations
30 Claims
-
1. A system to control access to computer applications, comprising:
-
a processor communicating with memory; the processor monitoring a request to launch a computer application, wherein the computer application is running on a computer operating system stored in the memory; locally storing a user profile in the memory that is associated with a user, the user profile comprising a listing of prohibited computer applications to which access is denied; the processor querying the user profile for the requested computer application; if the requested computer application is not found in the user profile, then the processor launches the requested computer application, as the user is authorized to access the requested computer application; if the requested computer application is found in the user profile, then the processor intercepts a message for opening a window associated with the requested computer application before receipt thereof by the computer operating system; the processor prohibits opening the window associated with the requested computer application when the requested computer application is found in the user profile, thus terminating the launch of the requested computer application, as the user is not authorized to access the requested computer application; and when the requested computer application is launched, then the processor opens the window associated with the requested computer application and presents information associated with the requested computer application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for controlling access to computer applications, comprising:
-
monitoring a request to launch a computer application, wherein the computer application is running on a computer operating system; locally storing a user profile associated with a user, the user profile comprising a listing of prohibited computer applications to which access is denied; querying the user profile for the requested computer application; if the requested computer application is not found in the user profile, then launching the requested computer application, as the user is authorized to access the requested computer application; if the requested computer application is found in the user profile, then intercepting a message for opening a window associated with the requested computer application before receipt thereof by the computer operating system; prohibiting opening the window associated with the requested computer application when the requested computer application is found in the user profile, thus terminating the launch of the requested computer application, as the user is not authorized to access the requested computer application; and when the requested computer application is launched, then opening the window associated with the requested computer application and displaying information associated with the requested computer application. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A computer-readable storage medium storing processor executable instructions for performing a method that controls access to computer applications, the method comprising:
-
monitoring a request to launch a computer application, wherein the computer application is running on a computer operating system; locally storing a user profile associated with a user, the user profile comprising a listing of prohibited computer applications to which access is denied; querying the user profile for the requested computer application; if the requested computer application is not found in the user profile, then launching the requested computer application, as the user is authorized to access the requested computer application; if the requested computer application is found in the user profile, then intercepting a message for opening a window associated with the requested computer application before receipt thereof by the computer operating system; prohibiting opening the window associated with the requested computer application when the requested computer application is found in the user profile, thus terminating the launch of the requested computer application, as the user is not authorized to access the requested computer application; and when the requested computer application is launched, then opening the window associated with the requested computer application and displaying information associated with the requested computer application. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
Specification