Browse Prior Art Database

Getting Information for Validating User-Entered Data Via Linked List

IP.com Disclosure Number: IPCOM000111497D
Original Publication Date: 1994-Feb-01
Included in the Prior Art Database: 2005-Mar-26
Document File: 2 page(s) / 50K

Publishing Venue

IBM

Related People

McGuill III, AL: AUTHOR [+3]

Abstract

Disclosed is a method for obtaining the information necessary to validate data entered by a user within a graphical user interface. When one routine (calling routine) calls another routine (called routine) to validate this data, it sends the following information:

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 56% of the total text.

Getting Information for Validating User-Entered Data Via Linked List

Disclosed is a method for obtaining the information necessary to
validate data entered by a user within a graphical user interface.
When one routine (calling routine) calls another routine (called
routine) to validate this data, it sends the following information:

o   An unsigned short value where the high byte defines the type of
    the validation and the low byte is defined by the calling routine
    (application).

o   The data that the user typed.  A single character when typing in
    the control and the whole string when the user exits the control.

o   The position of the character in the input string or 0 if the
    whole string is sent.

o   A pointer to an error code variable defining a return code to the
    calling routine.

      The called routine must know which control it is being called
for in order to properly validate the incoming data.  In order to
identify which control, it must have a unique ID.  The ID must be
contained in the low order byte of the above mentioned unsigned short
value.  The control can be uniquely identified if the control ID and
the ID of the notebook page on which this control resides are given.
Since both of these values will not fit in the low byte of the
unsigned short value, another way to uniquely identify the control
using the low byte was developed.

      For each type of validation, a global variable is kept with the
next av...