The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
This disclosure allows a temporary set of bookmarks to be created
based on user authenticated token. These bookmarks are removed when the
user logs out or his token expires .
English (United States)
This text was extracted from a PDF file.
100% of the total text.
Page 1 of 1
Temporary set of bookmarks based on user authenticated token
A typical user's browser bookmarks can often become cluttered and difficult to maintain. This disclosure allows a temporary set of bookmarks to be created based on user authenticated token. After a user authenticates himself, theses bookmarks dynamically appear in the list. Additional bookmarks can be loaded when the user is authenticated. These bookmarks are removed when the user logs out or his token expires . This provides easy of use to the user allowing these bookmarks to be available and removing his responsibility of maintaining the bookmarks.
Example: if a user logs into his companies intranet then specific company related bookmarks will dynamically appear such as a bookmark to the company's HR and phone book. If the token expires or the user logs out then the bookmarks are removed.
The user must first authenticate himself. When the user's id and password are verified then the bookmarks are downloaded from the server. These bookmarks are valid only as long as the user authenticated token is valid. If the user logs out or his token expires then bookmarks will be removed.
Disclosed by International Business Machines Corporation