Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Using 802.11B Communication Standard Method and System to Automatically Take Action on a Computer

IP.com Disclosure Number: IPCOM000127356D
Original Publication Date: 2005-Aug-25
Included in the Prior Art Database: 2005-Aug-25
Document File: 1 page(s) / 18K

Publishing Venue

IBM

Abstract

Using 802.11B communication standard Method and system to automatically take action on a computer

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 1

Using 802.11B Communication Standard Method and System to Automatically Take Action on a Computer

The security of information on individual computers is an increasing concern in business environments. Methods exist to train employees to control the security of their computer environments, but these methods depend upon fallible human beings.

The specific area of concern addressed by this patent publish focuses on ensuring that computer screens are locked when unattended -- a frequent area of security failure. While most operating systems have the ability to lock the screen given a particular time interval, it is a potential exposure to leave a computer screen unnecessarily unattended and unlocked even for a short period of time. Other than this time-out feature, no methods exist to heighten the security of individual computers via adaptive screen lock.

It is possible, then, to provide electronics working in conjunction with software such that, as an individual moves away from their computer, their screen is automatically locked or potentially powered down (or even other actions might be triggered, such as locking a hard drive or running anti-virus technologies).

A specific clip-level can be set such that, for example, as the signal strength mobves below 50%, a specific action may be taken. The MAC address could be used to identify the user upon return, and unlock the computer or suspend action as appropriate.

1