Class / Patent application number | Description | Number of patent applications / Date published |
715743000 | Access rights to interactive controls | 33 |
20080235596 | METHOD AND SYSTEM FOR MANAGING A REMOTE CONTROL SESSION - A method and system for managing a remote control session (RCS) during which control of input mechanisms of authorized users for manipulating a shared computer screen is time-sliced among the authorized users. No more than one authorized user has control of the input mechanisms at each time during the RCS. Each authorized user is able to view the shared portion of the computer screen throughout the RCS and has been assigned a priority, a control time slice (CTS), and an inactivity threshold. Sole control of the input mechanisms is provided to a first authorized user who requested control of the input mechanisms. Sole control of the input mechanisms is transferred from the first authorized user to a second authorized user who requested control of the input mechanisms. The first and second authorized user are each scheduled to have sole control of the input mechanisms for a specified time duration. | 09-25-2008 |
20090070684 | Social Network Site Including Contact-Based Recommendation Functionality - Particular embodiments of the present invention are related to a social network site with enhanced user interaction functionality. In particular implementations, a method includes accessing a list of contacts that are connected to an owner of a personal page of a social network; identifying one or more contact pairs from the list, wherein the contacts in each contact pair are not connected to each other; computing an affinity score for each identified contact pair; randomly selecting one or more of the contact pairs based on corresponding affinity scores; providing a friend connector user interface module to the owner of the personal page, wherein the friend connector user interface prompts the owner to invite the contacts of the selected contact pair to establish a connection association relative to the social network; and conditionally transmitting an invitation to the contacts of the contact pair based on one or more actions of the owner relative to the friend connector interface. | 03-12-2009 |
20090100346 | SYSTEM AND METHOD FOR VERIFYING ACCESS TO CONTENT - A method and computer program product for receiving an indication of an email being generated for at least one recipient. The email is analyzed to determine if the email includes at least one link to a piece of content on a remote content resource. If the email includes at least one link to a piece of content on a remote content resource, the at least one recipient is analyzed to determine if the at least one recipient has sufficient rights to access the piece of content on the remote content resource. | 04-16-2009 |
20100185953 | METHOD FOR SECURING AN INTERFACE BETWEEN A USER AND AN APPLICATION, CORRESPONDING SYSTEM, TERMINAL AND COMPUTER PROGRAM PRODUCT - An interface securing method between a user and a non certified application running on an electronic device and providing at least one view to be rendered on a screen, and a view comprising or associated to at least one interface control component. The method implements, prior to rendering a view: analysis of the interface control components of the view, so as to detect at least one interface control component that could pose a security problem, called a suspicious component; and if at least one suspicious component is detected, restriction or invalidation of the functions of at least one input control component, distinct from the at least one suspicious component and able to allow the information to be provided by the user to the application. | 07-22-2010 |
20100251132 | INFORMATION PROCESSING APPARATUS, IMAGE FORMING SYSTEM, AND RECORDING MEDIUM - An information processing apparatus includes a user authentication unit, a display-object-parts presenting section, a parts-selection-instruction accepting section, a layout-instruction accepting section, an action setting section, and a generating section. The user authentication unit permits an authenticated user to create screen data of a display screen. The display-object-parts presenting section presents display object parts to be displayed in the display screen. The parts-selection-instruction accepting section accepts, from the authenticated user, an instruction to select display object parts from the presented display object parts. The layout-instruction accepting section accepts an instruction to place the selected display object parts in the display screen from the authenticated user. The action setting section sets actions corresponding to indicated display object parts in association with the display object parts. The generating section generates the screen data on the basis of the instructions and the setting. | 09-30-2010 |
20110029887 | Social Utility Grid - Information is gathered regarding a first party. Social relationships between the first party and other parties are determined by transforming the gathered information into the social relationships. Relationship types of the social relationships between the first party and the other parties are determined by transforming the gathered information into the relationship types. Relationship strengths of the social relationships between the first and the other parties are determined by transforming the gathered information into the relationship strengths. The social utility grid is generated based on the social relationships between the first party and the other parties, the relationship types of the social relationships, and the relationship strengths of the social relationships. | 02-03-2011 |
20110029888 | CONTROL SERVER AND DISPLAY SCREEN CONTROL SYSTEM OF MULTI-FUNCTIONAL PERIPHERAL - An initial screen is displayed on the display portion of a multi-functional peripheral based on a usage history of a user to secure convenience of the user and the user is prevented from unconsciously using a charged application. An authentication server stores usage history information of function of a multi-functional peripheral capable of executing a function of an external application for each user, stores usage fee information of the external application, extracts a predetermined function out of functions used by a user based on information of the user who logs in the multi-functional peripheral, transmits control information for displaying a screen of the function to the multi-functional peripheral in the case where the predetermined function is free, and transmits the control information for displaying a predetermined alternative screen in stead of the screen of the function to the multi-functional peripheral in the case where the predetermined function is charged. | 02-03-2011 |
20110083081 | SYSTEMS AND METHODS FOR ALLOWING A USER TO CONTROL THEIR COMPUTING ENVIRONMENT WITHIN A VIRTUAL COMPUTING ENVIRONMENT - The present invention provides systems and methods for allowing a user to control their computing environment within a virtual computing environment. Specifically, various systems and methods as provided by the present invention allow for users to configure their computing environment within a virtual computing environment based on changing locations within a single computing session. Depending on the embodiment, the system and method may be used for sessions provided by an application control environment or a virtual computing environment. Embodiments of the invention allow for user control of the computing environment based on user policy rules. These user policy rules may be used to implement access control on users of the computing session. | 04-07-2011 |
20110138297 | METHOD, APPARATUS AND SYSTEM FOR MANAGEMENT OF INFORMATION CONTENT FOR ENHANCED ACCESSIBILITY OVER WIRELESS COMMUNICATION NETWORKS - Information content is managed in a network-based communication system by providing a first web site accessible to a user of the system. The first web site is configured to permit the user to designate at least one data source. A second web site is generated that is accessible independently of the first web site via one or more mobile devices over a wireless network of the communication system, with the second web site being configured to receive data automatically from the data source designated by the user at the first web site. The first and second web sites may comprise respective content management and mobile web sites, or other types of web-based interfaces. Other aspects of the invention relate to permitting a first user to designate a plurality of other users that will share access to content with the first user via the second web site, in accordance with accessibility rules established by the first user via the first web site. | 06-09-2011 |
20110173545 | THIRD PARTY CONTROL OF LOCATION INFORMATION ACCESS - Controlling access to location information by entities hosted by an execution extension environment. After receiving a request from the entity for location information associated with a computing device, access rights of the entity for the requested location information are accessed. A request is sent to another computing device to determine whether to authorize access by the entity to the requested location information. Based on a response from the other computing device, access to the requested location information is enabled. | 07-14-2011 |
20110197142 | Display multi-layers list item in web-browser with supporting of concurrent multi-users - Computer user working environment has been evolved from punch card & paper tape to mouse click native window based in past few decades. This invention takes the course of this continuing evolution and creating a web based computer user work environment for a control management station and its associated systems on the network crossing Intranet, Internet or LAN. Therefore, users can access and manage the control management station and all its associated system through web browser on any other systems or devices. | 08-11-2011 |
20110231777 | SHARING OF INFORMATION ASSOCIATED WITH EVENTS - Techniques are provided that allow users to collaborate in relationship to data views, application displays, applications or events. A user can type in a text view related to a specific view in an application display, and the information is shared with other users that take part in sharing that view. A user that expresses an interest in an event is notified about the event and has the capability to interact, in relation to the event, with other users (e.g. by text). The particular form of interaction (and sharing) can be selectively specified. This interaction is comparable to a dynamic bulletin board where the subject is event driven, and where a user can specify who are allowed to participate. In the case of an event interest(s), users specify their interest (e.g. in other user application events or system events) and the system automatically alerts them to the occurrence of the event. | 09-22-2011 |
20110239125 | USING MULTIPLE DISPLAY SERVERS TO PROTECT DATA - A first display server and a second display server execute on a processing device. The first display server provides a secure environment for data presented in first application windows of the first display server and the second display server provides an unsecure environment for data presented in second application windows of the second display server. The processing device receives at least one user command to copy data from one of the first application windows of the first display server to one of the second application windows of the second display server. The processing device prompts a user to perform an authentication upon receiving the at least one user command. In response to the user successfully performing the authentication, data is copied from said one of the first application windows to said one of the second application windows. | 09-29-2011 |
20110252333 | Method And System For Role-Based Access Control To A Collaborative Online Legal Workflow Tool - A computer system and method for distributed legal workflow security provides role-based access control to a collaborative online workflow tool. The system includes a computer network having one or more computers operably programmed and configured to receive input defining computer system access privileges for a plurality of distributed legal workflow participants. The system receives input associating one or more legal workflow role types defined by users with one or more of the distributed legal workflow participants to define the role-based access. Permission privileges are input and associated with a plurality of legal workflow graphical interface functions based on the one or more legal workflow role types. Based on the permission privileges associated with the role type of the participant, the system provides legal workflow graphical interface functionality to the one or more distributed legal workflow participants. | 10-13-2011 |
20130139065 | Employee information mobile application - An application software designed to run on the popular mobile operating systems can be used by employees of a business to exchange messages with other employees, schedule work time and time-off and trade work days or work shift assignments. The mobile application allows efficient employee interaction with minimal intervention by management. | 05-30-2013 |
20130198646 | METHOD AND SYSTEM FOR PROTECTING USER CHOICES - A system, method, and computer-accessible medium for protecting user choice settings are provided. The system and method provide an application programming interface that uses a security subsystem to unlock, write, and relock the user choice settings to insure that the user's choices are enforced and respected by the applications that attempt to change them in a manner that is verifiable and transparent to the user. The user is notified whenever a change to their user choice settings is made. | 08-01-2013 |
20130239011 | Multi-User Decomposition of Design Space Models - A method for collaborative CAx editing may include enabling a user to define a partitioning constraint for a design space and partitioning the design space into editing regions according to the partitioning constraint and assigning users to specific editing regions. The method may also include displaying a feature tree, enabling a user to select and lock a selected feature for editing by a specified user, enabling the specified user to edit the selected feature and blocking access from other users to the selected feature. An apparatus corresponding to the above method is also disclosed herein. | 09-12-2013 |
20130311896 | METHODS, SYSTEMS, AND COMPUTER PROGRAM PRODUCTS FOR PROTECTING INFORMATION ON A USER INTERFACE BASED ON A VIEWABILITY OF THE INFORMATION - Methods, systems, and computer program products for protecting information on a user interface based on a viewability of the information are disclosed. According to one method, a viewing position of a person other than a user with respect to information on a user interface is identified. An information viewability threshold is determined based on the information on the user interface. Further, an action associated with the user interface is performed based on the identified viewing position and the determined information viewability threshold. | 11-21-2013 |
20130311897 | IMAGE EDITING METHOD, IMAGE EDITING DEVICE, AND COMPUTER READABLE MEDIUM FOR STORING IMAGE EDITING PROGRAM - An image editing method comprises: a step of acquiring identification information on each of a plurality of operation instruction units for instructing editing of an image, a step of automatically selecting one or more images for editing from a group of images to classify the one or more images into a group of usable images based on the identification information, a step of determining a right to edit reaching contents of processing which each operation instruction unit is authorized to perform against each image in the group of usable images, and a step of performing editing processing on an image to be edited in the group of usable images based upon the determined right to edit according to an editing instruction supplied from each operation instruction unit. | 11-21-2013 |
20140026064 | VIRTUAL WORLD TELEPORTATION - The present invention is directed to teleporting avatars between disparate virtual worlds. A system is disclosed that includes a facility for creating a persona profile for an avatar in a first virtual world when the avatar wants to be teleported out of the first virtual world; a facility for transferring persona profiles to and from a disparate virtual world; and a facility for instantiating an inbound avatar based on a received persona profile. Persona profiles may include, e.g., rendering information, trait information, and inventory information. | 01-23-2014 |
20140115490 | MULTI-USER PROCESS MANAGEMENT - In general, this disclosure describes techniques for managing user profiles and associated processes of a multi-user computing device. For example, a computing device executes processes associated with a plurality of active user profiles of the computing device, and determines that an aggregate memory allocation of the plurality of active user profiles exceeds a threshold. Responsive to the determining, the computing device selects an active user profile for which to stop activity and automatically stops the activity associated with the selected active user profile. | 04-24-2014 |
20140129954 | Tailored System Management Interface - Processes and techniques for tailoring operations management in a system are described. The processes and techniques allow a user to customize operations management based on the user's function within a system and the particular tasks that the user wishes to accomplish. Simplified user interfaces can be created by scoping the interfaces based on user profiles, preferences and system components. | 05-08-2014 |
20140136983 | SHARING ANNOTATIONS OF DIGITAL ITEMS - A user may make a digital item available to other users of a computer network, such as an instant messaging system, a chat environment, or a subscription-based computer network. Examples of digital items that may be shared with other users include digital representations of graphic images, photographs, audio segments, songs, video segments, movies, and text (such as lists of favorites (e.g., a list of favorite books, a list of favorite movies, and a list of favorite places to visit)). On-line presence information is provided to indicate the on-line presence of users with whom a digital item has been shared, may be shared or is being shared. For instance, an indication of the on-line or offline status of a user with whom an item has been shared or is being shared may be presented. | 05-15-2014 |
20140245166 | ARTWORK ECOSYSTEM - A computer-implemented method performed at a computer system including one or more processors and memory storing one or more programs for execution by the one or more processors, wherein the computer system hosts a media management system. The computer system receives a selection of a media content item from a plurality of media content items stored on the computer system and an intended display device from a mobile computing device associated with a user of the media management system. The server then transmits the selected media content item to a physical display device associated with the media management system for presentation. | 08-28-2014 |
20150339465 | ACCESS CONTROL FOR MULTI-USER CANVAS - A method includes tracking user interaction with a multi-user canvas via a user device, and establishing an exclusive access zone for the user based on the tracked user interaction. | 11-26-2015 |
20150350463 | PHOTO PROCESSING KIOSK - A photo processing kiosk displays a catalog of photo enhancement items. In response to a user selection of a first photo enhancement item, detailed information of the first photo enhancement item is displayed, including a first button to associate a photo from the user with the first photo enhancement item. In response to an activation of the first button, a user agreement is displayed and the user is prompted to accept terms of the user agreement in order to acquire the first photo enhancement item. A signal is received via a second button displayed with the user agreement indicating an acceptance of the user agreement. In response to the signal indicating a user acceptance of the user agreement, a photo processing operation is performed on an image received from the user by integrating the image with the first photo enhancement item, generating a photo enhancement product. | 12-03-2015 |
20150356310 | APPLICATION SOFTWARE SERVICE SYSTEM FOR CONTROLLING UI ACCESS ACCORDING TO USER LEVEL AND METHOD THEREOF - Disclosed is a technology for controlling UI access to application software according to user's levels. The method for controlling UI access according to users' levels is characterized in providing a user with differentiated UI information according to user levels based on user-level-specific UI data in which UI information about functions to which access is allowed among functions provided by the application software is defined according to types of users. | 12-10-2015 |
20160034182 | TOOLBAR DASHBOARD FUNCTIONALITY - A system described herein includes a receiver component that receives an indication that a user has selected a first selectable buttontab in a toolbar installed in a client application. The system further includes a display component that causes a dashboard to be displayed on a display device in response to receipt of the indication that the user has selected the buttontab. The dashboard includes a content window that displays content and the buttontab, wherein the dashboard is a seamless visual combination of the buttontab and the content window. | 02-04-2016 |
20160036817 | Protected Graphical User Interface for Role-Based Application and Data Access - Methods, systems, and computer program products for a protected graphical user interface for role-based application and data access are provided herein. A method for controlling access on an endpoint device to at least a portion of an application includes obtaining a default configuration indicating whether one or more widget functions associated with the application are enabled in a graphical user interface; modifying one or more of the widget functions in the default configuration to a disabled status in the graphical user interface based on a privilege configuration; determining if one or more user click events generated using the graphical user interface are associated with a widget function having the disabled status; and preventing the user click events having the disabled status from being provided to an operating system for further processing, wherein at least one of the steps is carried out by a computing device. | 02-04-2016 |
20160134721 | Providing A Persona-Based Application Experience - Technologies are described herein for providing a persona-based application experience. A query for a location of a persona package is received from a virtualization client. When the query is received, a current persona of a user requesting execution of a virtualized application is determined. The location of the persona package corresponding to the current persona of the user is determined. The location of the persona package is sent to the virtualization client in response to the query. The virtualization client is configured to execute the virtualized application adapted to the persona package. | 05-12-2016 |
20160147427 | THIN CLIENT COMPUTING DEVICE TASKBAR AND WIDGETS - In one example in accordance with the present disclosure, a method is provided. The method includes accessing, via a thin client computing device, an administrator-mode interface, where the administrator-mode interface is accessible by selection of an icon within a taskbar, and where the administrator-mode interface is the only interface to access the thin client computing device settings. The method additionally includes selecting, via the administrator-mode interface, a plurality of widgets to be displayed within the single taskbar during a user-mode interface, and configuring the type of content provided by at least one of the plurality of widgets | 05-26-2016 |
20160154557 | METHOD TO FETCH FUNCTIONALITY ACROSS APPLICATIONS | 06-02-2016 |
20160205081 | HIERARCHICAL DATA SECURITY | 07-14-2016 |