Browse Prior Art Database

Method of Enabling the User to Secure any Objects on the Desktop

IP.com Disclosure Number: IPCOM000112036D
Original Publication Date: 1994-Apr-01
Included in the Prior Art Database: 2005-Mar-26
Document File: 2 page(s) / 46K

Publishing Venue

IBM

Related People

Weber, OW: AUTHOR [+2]

Abstract

Prior art enables users to secure workstations or pre-specified objects on their desktop by associating certain locking mechanisms with certain objects or applications. However, the user needs a method to secure objects dynamically, even if said objects were not previously associated with any locking sequence. A method is needed to allow the user to hide any object dynamically, based upon some currently displayed matter of that application.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 65% of the total text.

Method of Enabling the User to Secure any Objects on the Desktop

      Prior art enables users to secure workstations or pre-specified
objects on their desktop by associating certain locking mechanisms
with certain objects or applications.  However, the user needs a
method to secure objects dynamically, even if said objects were not
previously associated with any locking sequence.  A method is needed
to allow the user to hide any object dynamically, based upon some
currently displayed matter of that application.

      This system provides the user with the ability to hide any
object on the desktop at any time by specifying a predicate whereby
all applications satisfying said predicate are automatically and
immediately secured.  For example, a user is in a mail application,
typing a confidential note, when another person enters the office.
The mail application is not registered with any locking program, so
the user has no way to automatically secure the application being
used.  With this system, when the other person enters the office, the
user only has to voice the command, "hide confidential", for example.
The system searches all open applications for the word
"confidential", and it automatically hides all those application
objects, including Joe's mail application since his memo contained
the word "confidential".  When the other person leaves, the user can
restore hidden objects with a special command.

      An alternative embodiment allows the user to...