Pre-login data access
First Claim
Patent Images
1. A computer system comprising:
- a storage having at least one file;
a processor controlling a secure state and an insecure state of said system, said processor having at least one application that accesses said file while said system is in said insecure state.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and process for interacting with a system in an insecure state is described. Before logging into a secure state of a computer system, a user is able to access limited information including calendar information regarding meetings for that day and the like. In some aspects of the invention, a user may interact with a displayed note pad for receiving handwritten or typed notes. Aspects of the described system and method permit a user to quickly review or interact with a computer prior to logging into a secured state of the computer system.
-
Citations
20 Claims
-
1. A computer system comprising:
-
a storage having at least one file;
a processor controlling a secure state and an insecure state of said system, said processor having at least one application that accesses said file while said system is in said insecure state. - View Dependent Claims (2, 3)
-
-
4. A computer system comprising:
a processor controlling a secure state and an insecure state of said system, said processor having at least one application that may be run while said system is in said insecure state. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11)
-
12. A process for permitting access to information comprising the steps of:
-
resuming a system from a standby state;
while in an insecure state, retrieving from a data storage one or more files;
displaying information from said one or more files;
entering a secure state. - View Dependent Claims (13, 14)
-
-
15. A process for interacting with a computer application in an insecure state of a computer system, said computer system later being in secured state, comprising the steps of:
-
while in said insecure state, displaying a user interface relating to said application;
receiving user input with respect to said application;
temporarily storing the results of said user input;
logging into a secure state of said computer system;
while in said secure state, storing the results of said user input based on the temporary storage of said results having been entered in said insecure state. - View Dependent Claims (16, 17)
-
-
18. A process for accessing remote information for a computer system comprising the steps of:
-
while in an insecure state, connecting to an information source, said information source storing information;
while in said insecure state, providing said information to a user; and
,receiving user input to change said system from said insecure state to a secure state. - View Dependent Claims (19, 20)
-
Specification