Browse Prior Art Database

Secondary Logons

IP.com Disclosure Number: IPCOM000046570D
Original Publication Date: 1983-Aug-01
Included in the Prior Art Database: 2005-Feb-07
Document File: 1 page(s) / 12K

Publishing Venue

IBM

Related People

Kelly, KF: AUTHOR

Abstract

In a multi-terminal data processing system or network, each user is allocated address space in the memory of the host central processing unit. Access to the allocated address space is by a procedure known as "logging on" or, more simply, by the command LOGON. An address space normally will only have one user logged on. The logon normally occurs from a terminal which has been conditioned by the system to contain a fill-in-the-blanks display screen for user identification, password and other identification. In a process of terminal cloning, another terminal can be added to the address space of a primary terminal so that the cloned terminal is fully interactive with the system and has the same display screen contents as the primary terminal.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 84% of the total text.

Page 1 of 1

Secondary Logons

In a multi-terminal data processing system or network, each user is allocated address space in the memory of the host central processing unit. Access to the allocated address space is by a procedure known as "logging on" or, more simply, by the command LOGON. An address space normally will only have one user logged on. The logon normally occurs from a terminal which has been conditioned by the system to contain a fill-in-the-blanks display screen for user identification, password and other identification. In a process of terminal cloning, another terminal can be added to the address space of a primary terminal so that the cloned terminal is fully interactive with the system and has the same display screen contents as the primary terminal. There are certain applications which require many terminals to be connected to the same address space, each with a different screen or the same screen with different data. The terminals to be added may be directly allocated to the address space of the primary terminal. This process, however, removes the terminals from the system component that puts up the normal fill-in-the-blanks LOGON logo. Therefore, once the terminals have been allocated to the address space, the terminals are returned to the LOGON logo by operator or equivalent input. The by using secondary logons, the system component that controls the fill-in-the-blanks LOGON logos can pass the terminals to the address space as a secondary logon. The "env...