The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
Disclosed is a technique to provide calendar users with the ability to modify security access to calendar items on an individual entry basis.
English (United States)
This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately
88% of the total text.
Calendar Entry-Level Security Authorization
a technique to provide calendar users with the
ability to modify security access to calendar items on an individual
calendaring applications allow users to specify the
level of security access others have to their calendars. Access
levels vary by what the user can do with entries (view only or
modify) and the level of confidentiality the user can access. They
do not, however, allow specification of access on an entry-level
basis. That is, if a user is given
authority to look at confidential
entries, that user is free to look at all confidential entries on the
technique allows calendar owners to grant
security access on an entry-by-entry basis.
To employ this
technique, the user first selects the desired entry. The user then
chooses a "Change access" action from a menu, toolbar, or
dialog box appears that lists those with current access to the event.
If security access to the event has not been previously modified, the
list reflects information contained in the global authorization table
that the user has established. The user
is then able to specify one
or more users that are allowed to work with the item (above those
already specified in the global authorization table). The system
then adds an entry to the user's authorization table identifying the
item and those with access. The user is
also able to dele...