The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
This invention ensures any passwords that are updated after the last backup
are reapplied when the image is restored thereby ensuring the restored
image has all of the correct passwords.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
52% of the total text.
Page 1 of 1
TVT 32 - Password Metadata for System Restore to Windows With Previous Password Setting
IBM and others are investing in software to reduce trouble tickets. It is well known that image and configuration issues result in the major of all trouble tickets. Several software programs have the ability to restore the configuration or the entire image from a back-up which is typically maintained on local HDD or local network. Typically users backup images weekly (depending upon policy).
The new focus on security is enforcing period updates to passwords as an asynchronous event. When attempting to login to a service, the user is told they must change password to gain access (ATT Dialer, subscription services, etc). The service provider determines the frequency and timing of the password changes.
In this case, the user changed their password(s) since the last backup. The restored image will contain the old non working password. Even worse many users do not remember their old password due to complex rules governing password creation which makes it very difficult to remember old passwords. If you don't remember it is possible that the restored image will have no value because you can't log-on.
This invention ensures any passwords that are updated after the last backup are reapplied when the image is restored thereby ensuring the restored image has all of the correct passwords.
The first part of this invention is to track passwords and/or similar information that you want to ensure is always at the latest level. The backup application running in background constantly scans for changes in files that contain passwords/confi...