Browse Prior Art Database

Using RF Technology to Manage Display Functions

IP.com Disclosure Number: IPCOM000038310D
Original Publication Date: 2005-Jan-31
Included in the Prior Art Database: 2005-Jan-31
Document File: 1 page(s) / 27K

Publishing Venue

IBM

Abstract

Frequently people have items displaying on their computer screens that they don't want others to see. We disclose the use of RFID technology to drive what is displayed on a screen in both an affirmative and negative way. With this technology, when an unauthorized viewer comes in proximity to a computing device displaying a document, the computing device would react appropriately to prevent disclosure of sensitive data.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 92% of the total text.

Page 1 of 1

Using RF Technology to Manage Display Functions

Frequently people have items displaying on their computer screens that they don't want others to see. For example, managers may have personnel records up or a customer may have sensitive data displayed on their screen, when a subordinate or customer walks into their cube or office, the manager is left trying to hide the screen or to close the application in order for it to not be seen. Usually it is too late by the time the person has entered the office.

We disclose the use of RFID technology to drive what is displayed on a screen in both an affirmative and negative way. Existing technology already exists, for example, to allow screenlock to be triggered by the absence of a specific RFID tag. We disclose allowing users and/or adminisrators to configure what is displayed on a screen based on the presence and absence of specific RFIDs. For example, if a document is marked as 'secret', then anytime a person wearing a badge (RFID tag) with a non-secret level security clearance comes within the specified distance of the machine, the secret document would disappear. Anyone having secret or higher security RFID tags would be allowed the potential to view the document. Users could customize their machines to allow for the immediate closing or minimizing of applications when anyone walks into their office. For example, a user may decide that anytime anyone walks into their cube, all browsers should be minimized. Other action...