Dismiss
There will be a system update on Friday, May 5th, 6 PM ET. You may experience a brief service interruption.
Browse Prior Art Database

A GRAPHICAL METHOD FOR DETERMINING THE LOGGED ON USER

IP.com Disclosure Number: IPCOM000007333D
Original Publication Date: 1995-Mar-01
Included in the Prior Art Database: 2002-Mar-15
Document File: 2 page(s) / 145K

Publishing Venue

Motorola

Related People

Larry M. Peterson: AUTHOR [+3]

Abstract

Within a computer network, access to the sys- tem is typically gained through a login method. This method involves the user entering a login id and password. See Figure 1.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 68% of the total text.

Page 1 of 2

MO7WROLA Technical Developments Volume 24 March 1995

@.

A GRAPHICAL METHOD FOR DETERMINING THE LOGGED ON USER

by: Larry M. Peterson, Timothy J. Sherburne and Krsto S. Sitar

BACKGROUND method involves the user entering a login id and password. See Figure 1.

Within a computer network, access to the sys- tem is typically gained through a login method. This

Figure 1. Login Screen

  Once a user is logged into the computer system, In an effort to prevent unauthorized use of a the login id is used by the operating system to iden- computer system, many systems now employ a screen titj the user and determine his associated access locking mechanism. If the computer terminal is inac- permissions. If the user were to walk away from the tive for some period of time, the screen locks and terminal without logging out, it is possible for another the user is required to enter the valid password in user to walk up to the terminal and begin using the order to regain access to the system.
system assuming the identity of the person who
originally logged in.

20 0 Motorola. I"C, 1995

[This page contains 15 pictures or other non-text objects]

Page 2 of 2

0 M MO-OLA

Technical Developments Volume 24 March 1995

  When a user is accessing a computer terminal, or when a user terminal has become locked due to inactivity, typically the identity ofthe user who origi- nally logged into the system is not readily available. The inability to easily know who initiated the login session can be a security...