Processing

Please wait...

Settings

Settings

Goto Application

1. IN6665/CHENP/2012 - RULE BASED ASSIGNMENT OF CONTROL OF PERIPHERALS OF A COMPUTING DEVICE

Office
India
Application Number 6665/CHENP/2012
Application Date 27.07.2012
Publication Number 6665/CHENP/2012
Publication Date 10.01.2014
Publication Kind A
IPC
G06F 9/44
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
9Arrangements for program control, e.g. control units
06using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
44Arrangements for executing specific programs
G06F 13/14
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
13Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
14Handling requests for interconnection or transfer
G06F 21/04
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
04by protecting specific peripheral devices, e.g. keyboards or displays
Applicants MICROSOFT CORPORATION
Inventors CREASEY Jack
NICHOLSON Clark David
MITRA Kanchan
ELMER Robert C.
BARAT Kaushik
SRINIVASAN Jai
BEAVERS Jay Curtis
Priority Data 12839274 19.07.2010 US
61/304,077 12.02.2010 US
Title
(EN) RULE BASED ASSIGNMENT OF CONTROL OF PERIPHERALS OF A COMPUTING DEVICE
Abstract
(EN) Described herein are various techniques and principles for determining how to assign control of peripherals and assigning control of peripherals. In some embodiments determining how to assign control of peripherals comprises reviewing connections of peripherals to the computing device and evaluating rules to determine management points in the connections. In some cases the connections of peripherals to the computing device may be organized into a hierarchy corresponding to a hierarchy of physical connections of the peripherals including physical connections of peripherals located remote from the computing device and possibly connected through another computing device. When management points are identified among the connections control of peripherals associated with the management points may be assigned in the same way. For example access rights to each of the peripherals may be assigned to a same user session.
Related patent documents