The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Method to tie an authentication method to a desktop icon which
affects the functions that can be done to or performed by the program which
the icon represents on a computer system.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
56% of the total text.
Page 1 of 1
Method of Tying an Authentication Method to a Desktop Icon and the Actions Attempted on the Icon.
Disclosed is a system which ties an authentication method to a desktop icon which invokes or allows certain functionality based on the authentication given. Currently, in most personal computer systems, when a user unlocks the system lock or screen saver, it is assumed that the user has all access to all the icons, and thus executables represented by those icons on the operating system desktop. However, in multi-user environments such as a home computer, many users of the computer need access to the computer, but not all users should have the same level of program control.
A primary example of how multiple users may affect a program is when parent or child interact with the family computer. Just in this example, one assumes that the parent is the expert who installed and configured the computer and the child is the novice user. The parent wishes to allow anyone to use the computer system and the programs represented by the icons. However, the parent wishes to prevent destructive behavior that a child might accidentally cause. An example would be the child who drags the icon into the trash or who accidentally resets the networking parameters.
What is proposed is a functional tie between the authentication upon launch of an icon/program and what functions can be performed on that icon or program. For a parent (root) authentication, the full function of a program is ena...