Contextual Alert Of An Invasion Of A Computer System
First Claim
1. A method for providing contextual, audible feedback of an invasion of a computer system, comprising:
- detecting the invasion of the computer system;
selecting an alert tone from a plurality of alert tones based on a context of the invasion;
immediately playing the alert tone to alert of the invasion; and
logging information regarding the context of the invasion to a log file.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and computer-readable media for providing contextual feedback to a user of a computer system upon detection of an invasion of the computer system are provided herein. An invasion of the computer system is detected and a contextually appropriate alert is selected from a set of alerts. The alert is played immediately upon detection of the invasion so that the user is alerted to the invasion within close temporal proximity to the user'"'"'s action that resulted in the invasion of the computer system. In addition, details of the invasion are logged to a diagnostic log file for later use by support personnel in repairing the computer system.
-
Citations
20 Claims
-
1. A method for providing contextual, audible feedback of an invasion of a computer system, comprising:
-
detecting the invasion of the computer system; selecting an alert tone from a plurality of alert tones based on a context of the invasion; immediately playing the alert tone to alert of the invasion; and logging information regarding the context of the invasion to a log file. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for providing contextual, audible feedback of an invasion of a computer system, comprising:
-
a plurality of alert tones stored on the computer system, each of the plurality of alert tones comprising a digital recording approximating a natural utterance related to a context of an invasion of the computer system; and a detection module operative to; detect the invasion of the computer system, select an alert tone from the plurality of alert tones based on the context of the invasion, and immediately play the alert tone to alert of the invasion. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer readable storage medium having computer executable instructions stored thereon that, when executed by a computer, cause the computer to:
-
detect an unexpected or unauthorized change in a system configuration of the computer; select an alert from a plurality of alerts based on a type and a severity of the unexpected or unauthorized change in the system configuration, each of the plurality of alerts representing a contextual response that inherently indicates to a user the type and the severity of the unexpected or unauthorized change in the system configuration; immediately play the alert to alert of the unexpected or unauthorized change in the system configuration; and log information regarding the unexpected or unauthorized change in the system configuration to a log file. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification