The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
The disclosed system allows for computer users to control access
to files/folders based on time. Users will be able to specify different
privileges based on pre-specified time blocks.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
83% of the total text.
Page 1 of 1
Restricting Access Privileges to Files based on Time Schedules
Disclosed is a system designed to add to the power a user is given in being able to restrict ace privileges to files based on time.
Many times, one would like to allow a network user to have access to a file/folder for only a specified period of time (e.g., for a specified block of time, for a specified repeating block of time, etc.) From there, the user would like to be able to further specify what type of privileges a user can have during the block of time specified (e.g., write/read). The proposed system aims to add this functionality to current operating systems.
Incorporated into the operating system will be the ability for a network admin to restrict access to a network user based on a block of time. For instance, an admin will be able to specify that they only want a certain user to be able to access a certain folder during a specific a specific block of time (e.g., on August 17 from 1-5 pm). Also, the admin will be able to specify access for repeating blocks (e.g., every Wednesday or every last day of the month from 5-6 pm).
From there, the user will be able to specify even further that during specified blocks, what type of write/read access privileges should occur. For instance, let us say that we have a network directory that we only want people to read from 8am to 10pm. During this time, the operating system will automatically mark this directory with read-only privileges. Now from 10pm til...