Browse Prior Art Database

An Office Security Tool

IP.com Disclosure Number: IPCOM000121800D
Original Publication Date: 1991-Sep-01
Included in the Prior Art Database: 2005-Apr-03
Document File: 1 page(s) / 57K

Publishing Venue

IBM

Related People

Gavin, D: AUTHOR [+2]

Abstract

A program is disclosed that can be utilized to enhance office security. Security in this usage pertains to no company documents being left out on people's desks after that person has gone for the day. The program makes use of the unique uid (user id) assigned when an account is created on a Unix* (* Trademark of Unix Systems Laboratories) system.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 62% of the total text.

An Office Security Tool

      A program is disclosed that can be utilized to enhance office
security.  Security in this usage pertains to no company documents
being left out on people's desks after that person has gone for the
day.  The program makes use of the unique uid (user id) assigned when
an account is created on a Unix* (* Trademark of Unix Systems
Laboratories) system.

      Starting with a pathname for the data logging, the program
appends the current user to the sign out log (after determining that
the user is a valid user) and displays the name of the employee whose
desk needs to be checked prior to leaving the premises.

      A file of valid users is maintained, and after invoking the
program, the uid of the current user is determined. This uid is then
checked against the master list; if present, the program continues
processing.  If not present, the user is queried as to whether or not
they should be added. A negative response terminates the program, a
positive response results in a second query as to whether or not they
wish to receive the nightly log.  If a positive response is received,
the user is then prompted for an electronic mailing address.  When
finished accepting responses from the user, the program attempts to
update the master list.  If successful, the program continues
processing; if not, an error message is displayed and the program
terminates.

      Once past the verification portion of the program,  the daily
log file...