The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Larry M. Peterson•Timothy J. Sherburne•Krsto S. Sitar
Within a computer network, access to the sys- tem is typically gained through a login method. This method involves the user entering a login id and password. See Figure 1.
Motorola Inc. March 1995
English (United States)
This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately
68% of the total text.
Page 1 of 2
MO7WROLA Technical Developments Volume 24 March 1995
A GRAPHICAL METHOD FOR DETERMINING THE LOGGED ON USER
by: Larry M. Peterson, Timothy J. Sherburne and Krsto S. Sitar
BACKGROUND method involves the user entering a login id and password. See Figure 1.
Within a computer network, access to the sys- tem is typically gained through a login method. This
Figure 1. Login Screen
Once a user is logged into the computer system, In an effort to prevent unauthorized use of a the login id is used by the operating system to iden- computer system, many systems now employ a screen titj the user and determine his associated access locking mechanism. If the computer terminal is inac- permissions. If the user were to walk away from the tive for some period of time, the screen locks and terminal without logging out, it is possible for another the user is required to enter the valid password in user to walk up to the terminal and begin using the order to regain access to the system. system assuming the identity of the person who originally logged in.
20 0 Motorola. I"C, 1995
[This page contains 15 pictures or other non-text objects]
Page 2 of 2
0 M MO-OLA
Technical Developments Volume 24 March 1995
When a user is accessing a computer terminal, or when a user terminal has become locked due to inactivity, typically the identity ofthe user who origi- nally logged into the system is not readily available. The inability to easily know who initiated the login session can be a security...