The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
A method to increase security of mobile PCs correlating to
location that is not dependent upon user adherence to security
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
59% of the total text.
Page 1 of 1
Autonomic control of Access Based on Physical Location
The usage model for Personal Computer is rapidly evolving on two fronts: mobility and connectivity. The promise of connectivity anytime and anyplace is becoming a reality. The combination of a notebook and wireless connectivity (LAN & WAN) allows a user to be connective and productive at work, home, or traveling. This ability is creating a new mobile work force.
This mobility is increasing productivity of workers, but increases the need for security. Stationary PC in locked building with controlled access behind corporate firewalls are significantly more secure than mobile laptops. Security in laptops can be increased by use of password and encryption of files. but this dependent on the user behavior to setup and maintain.
What is needed is a method to increase security of mobile PCs correlating to location that is not dependent upon user adherence to security practices.
There are vertical environments (school, data entry) where control use of the PC is tightly correlated to a physical location (class room/campus, work location) . In that different students/users can freely use PCs without need for passwords or logins. In this environment, it is important to have a deterrent to minimize theft of device.
The invention allows the administrator to setup a system access policy that is based on physical location and provide theft deterrent. The first aspect of the invention is the ability for Mobile devices to det...