Method of controlling an internet web browser in the absence of key activity on a computer
First Claim
Patent Images
1. A method of controlling an Internet Web Browser active on a computer, the method comprising the steps of:
- (a) monitoring a mouse or keyboard of the computer for actuation of a key thereof;
(b) determining a duration of no key actuation;
(c) comparing the duration of no key actuation to a predetermined duration; and
(d) in response to the duration of no key actuation equaling or exceeding the predetermined duration, causing an Internet Web Browser active on the computer to connect to a predetermined Internet Web Page.
3 Assignments
0 Petitions
Accused Products
Abstract
A mouse and/or keyboard of a computer is monitored for actuation of a key thereof. A duration of no key actuation is determined and the duration is compared to a predetermined duration. In response to the duration of no key actuation equaling or exceeding the predetermined duration, an Internet Web Browser active on the computer is caused to retrieve a predetermined Internet Web Page from the Internet.
36 Citations
21 Claims
-
1. A method of controlling an Internet Web Browser active on a computer, the method comprising the steps of:
-
(a) monitoring a mouse or keyboard of the computer for actuation of a key thereof;
(b) determining a duration of no key actuation;
(c) comparing the duration of no key actuation to a predetermined duration; and
(d) in response to the duration of no key actuation equaling or exceeding the predetermined duration, causing an Internet Web Browser active on the computer to connect to a predetermined Internet Web Page. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
receiving in the computer the predetermined duration and a uniform resource locator (URL) corresponding to the predetermined Internet Web Page; and
storing the predetermined duration and the URL.
-
-
3. The method as set forth in claim 2, wherein further including the steps of:
-
retrieving the stored URL;
supplying the URL to the Internet Web Browser; and
in response to the Internet Web Browser receiving the URL, supplying the URL to the Internet.
-
-
4. The method as set forth in claim 1, wherein step (a) includes the steps of:
-
establishing in the computer a flag and a timer for tracking the duration of no key actuation;
initializing the flag to a de-asserted state; and
in response to actuation of a key, asserting the flag and initializing the timer.
-
-
5. The method as set forth in claim 4, wherein step (b) includes the steps of:
-
maintaining the flag in the de-asserted state in the absence of the actuation of a key; and
incrementing the timer when the flag is de-asserted.
-
-
6. The method as set forth in claim 5, wherein step (c) includes the step of comparing a value of the timer to the predetermined duration.
-
7. The method as set forth in claim 6, wherein step (d) includes the steps of:
-
in response to the value of the timer equaling or exceeding the predetermined duration, retrieving the stored URL;
supplying the URL to the Internet Web Browser; and
in response to receiving the URL, the Internet Web Browser supplies the URL to the Internet.
-
-
8. The method as set forth in claim 1, further including the step of initializing the timer after each key actuation.
-
9. The method as set forth in claim 1, wherein the key actuation is directed to the Internet Web Browser.
-
10. A method of controlling a computer comprising the steps of:
-
(a) receiving in the computer a first idle time and a first uniform resource locator (URL) corresponding to an Internet Web Page;
(b) in response to receiving the first idle time and the first URL, establishing a flag and a timer;
(c) setting the flag to an asserted state and initializing the timer when a key of a keyboard and/or a mouse of the computer is actuated;
(d) setting the flag to a de-asserted state in response to no actuation of a key of the keyboard and/or the mouse for a delay interval after the flag is set to the asserted state;
(e) incrementing the timer when the flag is in the de-asserted state;
(f) comparing a value of the timer with the first idle time; and
(g) supplying the first URL to an Internet Web Browser when the value of the timer equals or exceeds the first idle time. - View Dependent Claims (11, 12, 13, 14, 15)
receiving in the computer a second idle time;
comparing a value time the timer with the second idle time; and
supplying the first URL to the Internet Web Browser when the value time of the timer equals or exceeds the second idle time.
-
-
12. The method as set forth in claim 10, further comprising the steps of:
-
receiving in the computer a second URL;
comparing a value of the timer with the first idle time; and
supplying the second URL to the Internet Web Browser when the value of the timer equals or exceeds the first idle time.
-
-
13. The method as set forth in claim 10, further comprising the steps of:
-
receiving in the computer a second idle time and a second URL;
comparing a value of the timer with the second idle time; and
supplying the second URL to the Internet Web Browser when the value of the timer equals or exceeds the second idle time.
-
-
14. The method as set forth in claim 13, wherein in response to receiving the second idle time and/or the second URL, the computer displays on a display a notice indicative of the first idle time and the first URL being stored in the computer.
-
15. The method as set forth in claim 10, wherein step (g) includes the steps of:
-
in response to receiving the first URL, an active Internet Web Browser supplies the URL to the Internet; and
in the absence of an active Internet Web Browser, the attempted supply of the first URL thereto is disregarded.
-
-
16. A method of controlling an Internet Web Browser displayed on a display of a computer, the method comprising the steps of:
-
(a) initiating on a computer a user interface process which receives an idle time and a uniform resource locator (URL) corresponding to an Internet Web Page, which stores the URL and the idle time in the computer and which initiates a system monitoring process; and
(b) initiating on the computer a system hook process which asserts a flag when a key of a mouse or keyboard of the computer is actuated, wherein the system monitoring process;
initiates a timer and the flag;
detects the state of the flag;
de-asserts the flag when it is asserted;
increments the timer when the flag is de-asserted; and
causes an active Internet Web Browser to supply the URL to the Internet when the value of the timer equals or exceeds the idle time. - View Dependent Claims (17, 18, 19, 20, 21)
receiving the idle time and the URL in a dialog box;
in response to actuation of a button in the dialog box when the system monitoring process is active, supplying to a display of the computer a notice that indicates that the system monitoring process is active;
in response to actuation of the button in the dialog box when the system monitoring process is not active, spawning the system monitoring process and configuring the computer to initiate the system monitoring process upon start-up of the computer.
-
-
18. The method as set forth in claim 16, wherein the system monitoring process initializes the timer each time the flag is asserted.
-
19. The method as set forth in claim 16, wherein:
-
upon initially receiving the idle time and the URL, the user interface process spawns the system monitoring process; and
upon receiving a replacement idle time and/or a replacement URL, the user interface process stores the replacement idle time and/or URL in the computer.
-
-
20. The method as set forth in claim 17, wherein in response to actuation of another button in the dialog box, terminating the system monitoring process and configuring the computer to not initiate the system monitoring process upon start-up of the computer.
-
21. The method as set forth in claim 16, wherein:
-
the user interface process initiates the system monitoring process;
the user interface process and the system monitoring process communicate via an inter-process communication link therebetween;
the system monitoring process causes the system hook process to initialize; and
the system monitoring process and the Internet Web Browser communicate via an inter-process communication link therebetween.
-
Specification