Browse Prior Art Database

Added Terminal Security by Using an Iconic Calendar

IP.com Disclosure Number: IPCOM000099458D
Original Publication Date: 1990-Jan-01
Included in the Prior Art Database: 2005-Mar-14
Document File: 2 page(s) / 75K

Publishing Venue

IBM

Related People

Jensen, JR: AUTHOR

Abstract

This article addresses the security risk that unattended workstations pose. An approach is suggested whereby the workstation is locked when it is left as a by product of using icons as an easy-to-use short-cut to update one's calendar.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Added Terminal Security by Using an Iconic Calendar

       This article addresses the security risk that unattended
workstations pose. An approach is suggested whereby the workstation
is locked when it is left as a by product of using icons as an
easy-to-use short-cut to update one's calendar.

      The basic problem which will be addressed is the security
exposure that results from leaving a workstation running while being
away from it. The solution that has been advanced to address this
problem is to "lock" the workstation though the use of a software
lock.  This "lock" is a special program that will not allow anything
else to be run on the workstation until a secret password has been
entered.  This does indeed solve the problem -- if the user can be
made to use it.  Herein lies the problem.  The user may not be
willing to do so, either because the "lock" program is cumbersome to
start, or because its benefits are not viewed by the individual as
being high enough for the added inconvenience incurred.

      Using such a "lock" program involves two distinct operations:
locking and unlocking.  The unlocking phase cannot really be improved
if security is to be maintained; a password of some reasonable length
must be required, or one may be able to break it though regular trial
and error.

      The locking phase, on the other hand, can be facilitated.  This
can be done using the same tools that the iconic calendar uses:  (1)
icons that are readily available at all times to (2) initiate a
specific action. Thus, if an icon is used to initiate the lock
process, all the user needs to do is to press this icon, and the
locking will be performed.

      One way this may be implemented is to have a specific "lock"
icon available on the screen.  Then, when the user wants to leave the
workstation in a secure state, all he has to do is to press this
icon, and the workstatio...