Browse Prior Art Database

Mechanism to Secure Desktop Objects on a Single Command

IP.com Disclosure Number: IPCOM000111996D
Original Publication Date: 1994-Apr-01
Included in the Prior Art Database: 2005-Mar-26
Document File: 2 page(s) / 72K

Publishing Venue

IBM

Related People

Johnson, WJ: AUTHOR [+4]

Abstract

The advent in multimedia technology provides mechanisms to present a multiplicity of objects and/or their ICON representation on a desktop. This includes objects from textual to audio and video segments. Often times, users have objects on their desktop that contain materials of confidential or proprietary nature. For example, an attorney is viewing a document related to a criminal case e.g., a surveillance video segment and a report from a private investigator; or a manager is drafting or viewing an employee Performance Plan when an unexpected person walks into the room. In both cases the objects on the desktop are exposed to the persons other than the owner. Also, any immediate reaction from the owner/user may offend the other party e.g., attempt to close the ICONs, turning off the screen, etc.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Mechanism to Secure Desktop Objects on a Single Command

      The advent in multimedia technology provides mechanisms to
present a multiplicity of objects and/or their ICON representation on
a desktop.  This includes objects from textual to audio and video
segments.  Often times, users have objects on their desktop that
contain materials of confidential or proprietary nature.  For
example, an attorney is viewing a document related to a criminal case
e.g., a surveillance video segment and a report from a private
investigator; or a manager is drafting or viewing an employee
Performance Plan when an unexpected person walks into the room.  In
both cases the objects on the desktop are exposed to the persons
other than the owner.  Also, any immediate reaction from the
owner/user may offend the other party e.g., attempt to close the
ICONs, turning off the screen, etc. Taking any of these actions by
the owner or user make the desktop unavailable for further use.  This
is not a convenient method, especially if the 2 parties happen to
have a need to access the system e.g., go over another document or
refer to an inbasket mail item.  A mechanism is desired to
temporarily hide (make invisible) a single or group of objects or
mute or pause a video/audio segment via a single command or signals
from the users.

      The method described in this article is a mechanism that
provides services for temporarily hiding objects that are being
displayed/played on adesktop using a single command or signal.  This
includes hiding an object(s) or pausing or muting audio/video
segments that currently are being displayed/played.  In addition,
this mechanism provides a "Profile" to register the objects to be
monitored and their associated action(s).  This method provides a
mechanism whereby a single or group of objects on a desktop are
temporarily and logi...