Browse Prior Art Database

A Method of customising a User Environment based on Location

IP.com Disclosure Number: IPCOM000199590D
Publication Date: 2010-Sep-10
Document File: 2 page(s) / 45K

Publishing Venue

The IP.com Prior Art Database

Abstract

Changing the functionality or application availability on a computing device based on user's actions at different locations.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 50% of the total text.

Page 1 of 2

A Method of customising a User Environment based on Location

With the introduction of laptops, computers have taken a dual role with the same machine being used for both personal and business use. This is increasing common with the introduction of laptops that allow a user to take their computer to and from their place of work. One issue with using these machines to both business and personal use is that the user environment becomes cluttered with applications and documents from both worlds being displayed in a common workspace.

    There are several tools that allows a user to management their environment. For example, virtualisation technology and dual booting provide the user with a method of installing multiple operating systems. Whilst this allows the user to keep their personal and business environment separate, it adds the complication of managing two different (or identical systems), updating it, etc; not to mention the increased resources on the computer such as disk space, etc.

    A proposed solution is to use location, obtained via GPS or other location based metrics, to customize the users environment. This allows the user to keep their environment separate whilst avoiding the maintenance with other heavyweight workarounds .

    The proposed solution would use locations obtained by any location aware devices such as GPS enabled devices - IP triangulation, RFID tags as a method of customizing the user environment. This allows the system to hide icons, applications and documents from the user or other UI modifications based on the location of the device. This offers a unique solution to a cluttered work space. It also adds a dynamic security system which will adapt the computer and onscreen content depending on the context of the computer. If the location is out of any of the appropriate zones - then a password prompt could insist until unlocked to assume a security breach, or taking your laptop to a clients location it will hide work and confidential computer content that can often be overlooked.

    Using location allows us the introduce a context to a users actions as it is fairly logical to assume that location can factor into an operators use of a device. Targeting specific locations with different configurations of the user environments allows the solution to de clutter the device, providing a more intuitive and therefore more efficient environment and not only this but add strong dynamic security policies too. The policies can be built automatically and manually depending on the user's preferences. This could also could be used to configure multiple desktop environments, providing a new desktop for each location.

    Current solutions require active user input and ignore the context of the computer, there is no secure link between the location of the system and the content that is shown , either with the aim of decluttering a user interface and hiding being aware of sensitive data but also for security reasons, i.e if the laptop was...