Browse Prior Art Database

Iconic Video Surveillance Mechanism

IP.com Disclosure Number: IPCOM000105205D
Original Publication Date: 1993-Jun-01
Included in the Prior Art Database: 2005-Mar-19
Document File: 1 page(s) / 43K

Publishing Venue

IBM

Related People

Jackson, NM: AUTHOR [+3]

Abstract

This invention employs a method by which user actions on specified icons activate a video camera. This video camera can be the conventional camera used for sending multimedia messages, or the video camera can be used for the exclusive purpose of recording specified desktop graphical actions. The invention employs a registration service whereby a user can register icons which should activiate a specified video camera. In addition, a user can define a macro by which the specified action will not be conducted unless the video camera is activated. For example,

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 79% of the total text.

Iconic Video Surveillance Mechanism

       This invention employs a method by which user actions on
specified icons activate a video camera.  This video camera can
be the conventional camera used for sending multimedia messages,
or the video camera can be used for the exclusive purpose of
recording specified desktop graphical actions.  The invention
employs a registration service whereby a user can register icons
which should activiate a specified video camera.  In addition, a
user can define a macro by which the specified action will not
be conducted unless the video camera is activated.  For example,

       For example,
the user may have a particular file where he/she would like to
be notified when the file is deleted.  This invention will allow
the user to register such action of deletion with the icon.
When the file is deleted, the video camera will be activated to
record the action.  That is, record the user who is deleting the
file.  The information will be digitized and stored in a
repository by which a user can subsequently view who is carrying
out the action of deletion.  A monitoring service would invoke
the video camera upon a registered icon or a registered series
of actions being conducted within the desktop environment.
These actions can be defined in a keyboard, voice recognition,
mouse or any other input mechanism which can register events.
In addition, a specified delay time will be associated with each
particular event.  For example, th...