Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Window Tailoring by Access Level

IP.com Disclosure Number: IPCOM000099525D
Original Publication Date: 1990-Jan-01
Included in the Prior Art Database: 2005-Mar-15
Document File: 3 page(s) / 98K

Publishing Venue

IBM

Related People

Jaaskelainen, W: AUTHOR [+4]

Abstract

When a list of elements, such as files, documents, or members, is presented to a user via a screen display, processing time can be saved and the user interface improved by using Windows, tailored by Security Access Level, to control processing.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 54% of the total text.

Window Tailoring by Access Level

       When a list of elements, such as files, documents, or
members, is presented to a user via a screen display, processing time
can be saved and the user interface improved by using Windows,
tailored by Security Access Level, to control processing.

      As part of list display processing, a list of legal actions is
constructed based on the user's Security Access Level.  The list of
legal actions is displayed in a Window superimposed on the display
screen.  In order to perform an action, the user takes the following
steps:

      1.   Position the cursor next to the element to be processed.
    2.   "Pop up" the legal commands.
    3.   Position the cursor next to the desired legal command.
    4.   Press enter.
    The user is guided toward entering correct commands and avoids
the irritants associated with entering incorrect commands, and also
avoids the time wasted by invalid requests.  The user's actions are
better controlled by the application, since the entire repertoire of
available commands is concealed from users with low-grade access
authority.

      As long as the user is issuing commands via the Processing
Window, most of the authorization/validation normally associated with
the display can be omitted because all of the commands in the window
have been predetermined to be valid for this user.  (Security
checking will still be performed at some control point, such as a
Service Machine,...