Browse Prior Art Database

Method of Tying an Authentication Method to a Desktop Icon and the Actions Attempted on the Icon.

IP.com Disclosure Number: IPCOM000012771D
Original Publication Date: 2003-May-28
Included in the Prior Art Database: 2003-May-28
Document File: 1 page(s) / 40K

Publishing Venue

IBM

Abstract

Method to tie an authentication method to a desktop icon which affects the functions that can be done to or performed by the program which the icon represents on a computer system.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 56% of the total text.

Page 1 of 1

  Method of Tying an Authentication Method to a Desktop Icon and the Actions Attempted on the Icon.

Disclosed is a system which ties an authentication method to a desktop icon which invokes or allows certain functionality based on the authentication given. Currently, in most personal computer systems, when a user unlocks the system lock or screen saver, it is assumed that the user has all access to all the icons, and thus executables represented by those icons on the operating system desktop. However, in multi-user environments such as a home computer, many users of the computer need access to the computer, but not all users should have the same level of program control.

A primary example of how multiple users may affect a program is when parent or child interact with the family computer. Just in this example, one assumes that the parent is the expert who installed and configured the computer and the child is the novice user. The parent wishes to allow anyone to use the computer system and the programs represented by the icons. However, the parent wishes to prevent destructive behavior that a child might accidentally cause. An example would be the child who drags the icon into the trash or who accidentally resets the networking parameters.

What is proposed is a functional tie between the authentication upon launch of an icon/program and what functions can be performed on that icon or program. For a parent (root) authentication, the full function of a program is ena...