CN1257247A - Method and device for protecting pattern user interface central control element of computer system - Google Patents

Method and device for protecting pattern user interface central control element of computer system Download PDF

Info

Publication number
CN1257247A
CN1257247A CN99124768.XA CN99124768A CN1257247A CN 1257247 A CN1257247 A CN 1257247A CN 99124768 A CN99124768 A CN 99124768A CN 1257247 A CN1257247 A CN 1257247A
Authority
CN
China
Prior art keywords
user
coverture
obducent
control
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN99124768.XA
Other languages
Chinese (zh)
Inventor
J·L·伦茨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Publication of CN1257247A publication Critical patent/CN1257247A/en
Pending legal-status Critical Current

Links

Images

Abstract

To protect a control in a graphic user interface by making the background color of an area surrounding the control provide satisfactory contrast with optional control plane and text when control is in a protective state, and meanwhile, changing it to a color being different from a standard background color of a window and other nonprotective control. In an image display 30, a control area 32 consists of a cover 34 and a control 38 on a lower side. Here, the purpose of the cover 34 is to protect a user having authority from erroneously activating and interacting with the control 38. The cover 34 is preferably transparent (symbolized by cross hatching), and a user can see the control 38 through the cover 34. The control 38 includes information such as an alphanumeric message (e.g. an 'erase' message 40). Information for the control 38 is not limited in this way, but includes other opportunities to intelligently interact with areas on the computer screen by such a manner that the user inputs data through a keyboard.

Description

Be used for protecting the method and apparatus of the graphic user interface control of computer system
The present invention relates to the graphic user interface of computer system, relate in particular to and be used to guarantee and so mutual system and method for GUI assembly right user.
Many user friendly and familiar symbols that advanced to the use be familiar with now since the capable interface of computer industry transcendental instruction, order graphic user interface (GUI) technology of bar, drop-down menu, window etc., this technology becomes more and more popular.The thing followed is the abundant and ripe of various software controls, these software controls even their hardware copy of imitation in outward appearance and operation usually.Therefore with the three-dimensional button of true outward appearance, be with the slider bar of shade, pilot lamp, and the software controls that tolerance meter and switch etc. occur is unrare.
This imitation has greatly improved terminal user and computing machine and the mutual convenience of this hardware example, and they bring the similarity almost odd with the real hardware copy sometimes.The GUI that some are such for further simulation is true, even adds sound when the various buttons of operation or other control, as the switch ticktack, and bias light, when operating switch, change color.
But a weakness of the control of these GUI systems does not also have referred so far, promptly these controls be exposed on unconscious, unwarranted, or even in malice mutual.
Hardware, people and machine interface usually must be handled the problem for the carelessness or the operation of malice with destructive consequence that control is carried out.Example is in hardware design that control is recessed or cover transparent barriers to prevent to be not intended to the PRACTICE OF DESIGN of operation.
But, in user interface of software, also very immature to this protection of operating unintentionally of software controls.Therefore; this protection only takes to fully phase out the mode of this control with the activation of avoiding keyboard or mouse; this control state is usually indicated with the contrast of the text that reduces this control and interrelate, and for example control is grayed or deepening, makes it invalid to the user.Therefore the mechanism that is starved of a kind of maturation solves being not intended to or the problem of malicious operation software controls.
The method that solves above-described problem in known being used at present has many shortcomings, and these shortcomings are with only to cancel this control relevant by becoming ash or deepening.At first, the text that interrelates with these controls is difficult to read.And, through authorizing the value can browse a control but unalterable user can meet difficulty when obtaining the information of wanting.
Secondly, how the control state of deepening allows it reformedly indicate if not providing about a user through proper authorization.
The 3rd, the mechanism that the control of deepening itself does not provide a kind of user of making can prevent own maloperation, for example, a kind of user of permission changes the value of control, but only just allows to change after taking special significantly operation.
The 4th, the control of deepening does not provide the mechanism of the value that hide the to show user's browse controls state to prevent from not have authority.Therefore needing the state or the value that may make control improves more clearly.This is external to need one near the place of control can provide the user how can visit this control, and how the control surface provides the interface to the visual cues of the visit of control itself.And, being starved of a solution to foregoing problems, it provides under the various sights, comprises avoiding visiting unintentionally, surveys to look at but do not revise, avoid fully browsing, etc., all in identical vision imitation, and single control of may command or control combing.
When a control is in guard mode, is changed to good contrast being arranged around the background colour in a zone of this control, but is different from the standard background of window and a kind of color of any other not protected control color with any control surface and text.This color around the zone produces a kind of visual effect to control surface transparent or translucent covering.In this position, zone, the user can not select this control surface by using mouse or Tab key.Visit to control provides by one of two kinds of mechanism according to the type that the user can visit.
If the current mandate of user with this control of visit; just protected for preventing accidental operation; the edge of clicking color region and overcover causes this color region withdrawal, collapse; or disappear; in one embodiment; in the mode of animation, follow or do not follow the sound indication, expose the control that can receive user interactions that is in of not protection thus.Its objective is and liken the transparent covering of opening on the hardware control.In one embodiment, this metaphor by provide one be similar to catch the surface graphic element strengthened.This graphic element can the selected user of making can be practically from color region visually slidingsurface to visit the control under it.This reinforcement requires the user to show that with conscious actual step he or she wants and this widget interaction really.
If the current authority of not visiting this control of user, little graphic element are comprised on the color region or are positioned near the color region, for example one the small padlock icon.Click this icon and cause occurring a password zone, for example a dialog box.After importing suitable password and user name, this color region disappears or slips, and collapses, or disappears in previously described mode, thus to be in the control of preparing below user who is authorized like this or the demonstration of supvr's state of interaction.
If the user is not authorized to browse this control, the color of protected area is set to current foreground, and this control is covered.As previously described, thus the user can not select this control or with this widget interaction.Equally, as the example of describing in front, an icon can be provided, and therefore by selecting it, therefore the user who has about this access password knowledge can remove the overlay area to obtain the visit to this control.In one embodiment, this visit is provided-browsing and access and modification visit with two levels.Browsing and access will be this area change translucent or pellucidity, only be used to browse the information on the following control, will remove this zone fully and be used for user interactions and modification so that the visit fully to following control to be provided and revise visit.
In another optional embodiment of the present invention and expansion, after control is modified, this control will automatically back slide in the protection zone, so recovery and protection state automatically.And a protection zone can be used for covering one group of control of sharing identical access method.In addition, can be used for be that one or one group of control are created them and be hidden in the well and an obducent illusion of transparent entity is arranged to a kind of graphics process.
Fig. 1 is the high-level system architecture figure of a typical computer system, and the present invention can be used in this system easily.
Fig. 2-the 5th, a window list entries of the system of Fig. 1, shown make authorized user with according to the effective sequence of events of the reciprocation of control regions of the present invention.
Fig. 6 is the process flow diagram of a demonstration with reference to the sequence of events of Fig. 2-5 description.
Fig. 7-the 10th, a window list entries of the system of Fig. 1 has been described the sequence of events that is similar to Fig. 2-5, this sequence of events makes the user with effective according to the reciprocation of control regions of the present invention, wherein Guan Li user begin not to be authorized to so alternately.
Figure 11 is a process flow diagram that is described in the sequence of events that shows among Fig. 7-10.
Figure 12-the 14th, another window list entries of the system of Fig. 1 has been described the mutual of a supvr and control regions, and according to the present invention, this supvr must at first be authorized to.
Figure 15 is a process flow diagram, has shown the sequence of steps of describing in Figure 12-15 according to the present invention.
Fig. 1 has shown a computer system of preferred embodiment, and it can use improved GUI control protection system of the present invention easily.This system comprises a central processing unit (CPU) 10, ROM (read-only memory) (ROM) 11, random access storage device (RAM) 12, I/O (I/O) adapter 13, user interface adapter 18, communication adapter 14, and display adapter 19 all pass through general address/data and control path or bus interconnection.Each said elements uses classic method visit common bus, and these classic methods are ordinary skills well known in the art, and comprise such method, for each element in the system distributes special address realm, and with CPU 10 as total line traffic control.In addition, as shown in Figure 1, these peripherals as DASD 15, by adapter separately, as I/O adapter 13, are connected with common bus 16.Other peripherals as display 21, similarly uses their adapters separately, as display adapter 19, provides data stream between bus 16 and display 21 or miscellaneous equipment.Various method for user interface are provided for interconnection, and use with user interface adapter 18.User interface adapter 18 and representational user input device in the drawings, as joystick 23, mouse 25, keyboard 17, and loudspeaker and/or microphone 27 link to each other.A traditional operating system 29 that is suitable for carrying out one or more application 31 in addition is provided with system.Each this element is well-known, thereby will not describe at this.
The present invention allows the realization on any computer system and corresponding microprocessor in essence, as RS/6000 (TM), carry out the workstation and the personal computer based on RISC of the IBM Corporation of AIX (TM) and OS/2 (TM) operating system respectively, or other supplier's similar machine, comprising, for instance, a RS/6000 workstation, one 604 PowerPC (TM) risc chip.(AIX, OS/2 and PowerPC are the trade marks of IBM Corporation for RS/6000, IBM.)
Be included among the CPU10 of Fig. 1, one or more typically microprocessors are carried out the necessary system address of true(-)running for the system of Fig. 1, data, and control processing capacity.Be applied to various microprocessor Design although the present invention allows, embodiment disclosed herein adopts the form of PowerPC 604 microprocessors of IBM Corporation's manufacturing, and this microprocessor is be called as reduced instruction set computer (RISC) microprocessor a kind of.Further details about the architecture of this microprocessor and operation can be available from " PowerPC 604 microprocessor user handbooks ", number of documents MPC604UM/AD, and in November, 1994, all rights reserved in IBM Corporation.The document is incorporated herein by reference.
In situation of the present invention, the user is with the various objects on the browse displays device 21, and as cursor and last bullet or the following menu that plays, they can be handled by the method for various pointing devices such as mouse 25 and voice navigation.The program code and the application code that reside among RAM12 and/or the DASD15 will promote and activate corresponding sound order the moving on display screen 21 that the cursor response is sent microphone 27, and this program code interrelates by the device driver and the user interface adapter 18 of the pointing device relevant with operating environment 25, microphone 27.
Turn to Fig. 2-5 now, a series of representational screen input frames are described in Fig. 2-5, have shown in one embodiment of the present of invention a series of visual incidents on the display of Fig. 1.At first, in Fig. 2, such display screen can be in sight, and it is the typical case of many now available operating system and corresponding application programs based on GUI.
In screen display, control regions 32 comprises coverture 34 and following control 38, is further described (see figure 5).In the embodiment that is discussed, the purpose of coverture 34 is that the user that prevents to have authority activates unintentionally to control 38 or mutual.As seeing in Fig. 2, coverture 34 is transparent (by intersecting the shadow representation of placing), sees following control 38 thereby allow the user to see through coverture.As hope, this control will comprise such as the information of digital alphabet information (for example " deletion " information 40).But, the present invention does not think so limited, part as control 38, be not only a controls tab such as " deletion ", " closing " etc., can also comprise the zone that makes the terminal user can insert information, slider bar, or other has an opportunity by using key in data the user, mutual with pointing device, or a zone of similar approach and computer screen is mutual intelligently.
Forward Fig. 3 now to, a traditional cursor 37 is shown, and it can move by pointing device.A problem of prior art GUI system is that the user may by mistake click control regions 38, causes a computer operation thus, and in fact, such click or mutual with other of pointing device, or even a keyboard input, be an accident.The present invention partly, attempts to address this problem.Therefore a purpose of coverture 34 is, because its transparency, what meaning allows terminal user's browse controls 38 is, and prevents simultaneously under the situation that does not have additional obvious action by traditional keyboard input or pointing device 36 movable and these widget interactions.
Fig. 3 attempts to show that when the user wanted with control 38 alternately, the user at first was put into cursor on the coverture 34 with pointing device and clicks, and causes the elimination of coverture 34 to be used for alternately to expose following control 38 thus.Should be pointed out that in Fig. 3 cursor 36 is placed in a zonule in control regions 32 lower right corner.Though dispensable, a realization of the present invention will only provide on the coverture 34 or its a relatively little zone of vicinity can be activated to cause protective cover 34 to be removed.This is in order to guarantee that the keeper has taked very clear and definite action to want with control 38 mutual.
Along with the terminal user is so mutual with coverture 34, therefore coverture 34 is removed, thus with the user with it alternant way show following control 38 (Fig. 5).(be positioned at the cursor 36 on the coverture 34 by click) behind such user action; perhaps; more accurately; intention causes coverture 34 removed special areas; protective cover is provided animation, thereby makes the user can actually see that coverture 34 is better scheme by removing from control 38.Therefore,,, can see that in fact coverture 34 is shown with a kind of intermediateness if this characteristic is implemented with reference to figure 4, this state be coverture 34 by animation ground like this from the process that covers control 38 fully and remove gradually.After this removal process is finished, therefore control 38 will be exposed as shown in Figure 5 fully, prepare and user interactions.Should be pointed out that the user activates it then or by clicking control 38, perhaps by clicking or deletion radio button clauses and subclauses (radio button entry), at the area exposed input information, or similar approach with and the information that interrelates of control 38 and zone alternately.
With prevent with control 38 accidents allow alternately and simultaneously the user be familiar with control 38 purpose need consistent, should be understood that, coverture 34 is preferably transparent, thereby it can be found out it is a coverture by the terminal user, sees and browses label or the necessary zone of out of Memory that interrelates with control 38 and allow the user to see through coverture 34 simultaneously.Therefore, in one embodiment, this coverture can be a slightly coverture of shade simply, and conduct requires, and control 38 itself only comprises the part of coverture 34, and different patterns or color are arranged, and it is in sight to see through coverture 34.Than with user interactions coverture 34 automatically or at once being removed better, if be required, the user can be required coverture 34 from being removed practically on the control 38 of its protection.This can be by requiring user's moving cursor 36 practically, thereby cause the corresponding of coverture 34 to be moved, and realizes up to being enough to expose control 38.This protection that another extra level is provided with prevent user and control 38 be not intended to mutual (otherwise; possibility is owing to the click of the accident on coverture 34 allows), this layer protection removed coverture 34 practically and realized by moving cursor 36 by requiring the user.This has guaranteed that the user is the state that places user action to be received and to come into force control 38 for his or her wish really.
Forward Fig. 6 now to, described herein is a representational process flow diagram of the sequence just described.This sequence will be realized with program code, causes the GUI of the system of Fig. 1 to react in the mode of just having described thus.Should be appreciated that this characteristic can be implemented in the operating system of Fig. 1 itself, perhaps, be implemented in alternatively one or more need application with the protected user interactions of mode described in.
Fig. 6 is the process flow diagram of front with reference to the action sequence of the invention of Fig. 2-5 description, and it will be used the program code of the system of Fig. 1 to realize.At first, detect the user to the obducent action of control, 41.System will cause coverture to be removed from control then, and 43, show that control prepared and user interactions.Should emphasize that this will be implemented in mode animation or at once.The user then with widget interaction, shown in reference numerals 45, this coverture will be put on the control 49 once more then.
In above-described realization, a potential hypothesis is arranged with reference to figure 1-6, the keeper is certified, promptly has the coverture of causing 34 and is removed, thereby make control 38 be in the authority of the state of preparation and user interactions.But, should be appreciated that this may not be hoped.Replacedly, in one embodiment of the present of invention that reference Fig. 7-11 describes, suppose to exist a kind of situation, the keeper should not be allowed to such visit and not pass through authenticating step with control 38 alternately.
Turn to Fig. 7 now, and compare, should be pointed out that a locking mechanisms 42 has been provided at wherein, represent by a padlock or similar thing with Fig. 2.The user makes cursor 36 activate coverture 34 or control surface among Fig. 3, and similarly, as shown in Figure 8, by pointing device, the user can make cursor 37 and this locking mechanisms 42 mutual, for example by clicking it.In response, an authentification of user subwindow 44 (Fig. 9) can appear.In this subwindow 44, it is mutual to identify that he or she should be allowed to control 38 that the keeper is prompted to import the information of requirement.Therefore, in realization shown in Figure 9, the user is prompted to import a user name and password with account executive of enough authorities, thereby makes the user can be mutual with control 38.In the specific implementation of this alternative, for mutual with control 38, the terminal user can be required to provide so his or her password, and is relevant with action, and this action and terminal user interrelate.But, in the present embodiment, also fully considered according to the present invention, such authentication step of describing with reference to Fig. 7-11 can attempt to guarantee the evaluation to supvr itself, has change or deletes another user's account number or the authority of the information that other and control regions 32 interrelate thereby examine this keeper.In case keeper or user provide the necessary information by 44 promptings of authentification of user subwindow, therefore control 38 will become in the mode similar to the step of description among Fig. 2-6 and can be used for alternately, as shown in figure 10.Therefore, in case the user provides the information of prompting in subwindow 44, coverture 36 can automatically be removed from control 38 (both can be in the mode of animation, also can be) in automatic mode, perhaps, replacedly, this user or keeper process authentication, the mode that is allowed to describe with the front is manually removed coverture 36 from control 38 with pointing device and cursor 37.
Figure 11 is the process flow diagram of an explanation with reference to a series of incidents of Fig. 7-10 description, and it can be realized with program code in the system of Fig. 1.At first, program code is with the action of sense terminals user to locking mechanism, 51.The user will import and system receives this input then, and wherein input is user authentication information (for example, password, etc.), and 53.System will cause the coverture on the control to disappear then, and 55, once more, mode that both can animation, also mode automatically.User and widget interaction then, this is detected by system alternately simultaneously, and 57.At last, coverture is placed on the control once more, and 59.
In addition, another embodiment of the present invention is shown in Figure 12-14.In this example, suppose that at first the terminal user may not have the mutual administration authority of the mandate of browse controls or status information and control and control regions 32.In this case, control regions 38 can be placed a coverture 36 thereon once more, and this coverture will operate in the manner described before.But, should be pointed out that the information (for example, shown in the reference numerals 46 of Fig. 7) about administration authority is hidden by the zone 48 of a deepening.This will be by Figure 12 the zone 48 of deepening further be familiar with.Should point out further that in the situation of Fig. 2, the lock device 50 that adds that is associated with the masked areas 48 of administration authority information 46 and deepening is provided, this adds lock device and can represent padlock with one.In case the keeper with add lock device 50 mutual (with Fig. 7 in similar mode), for example, click and the part that adds the zone that lock device 50 interrelates, and with Administrator account's password authentication (similar) to the step of describing with reference to figure 9, it should be noted that, coverture 48 is removed in Figure 13, therefore exposes the administration authority information that this keeper has.In the situation of Figure 13, should be pointed out that according to control regions 32, this specific keeper through authentication may be only about the browse right of control regions 32.But, in interchangeable embodiment, as shown in figure 14, because coverture 34 (Fig. 2) has been removed to expose control 38, control regions 32 can be mutual with this keeper, thereby the Administrator account who means the authentication of process that this is specific provides the modification authority for this keeper, so he or she can be mutual with control 38 in the manner described before.
Figure 15 is a process flow diagram, it can be realized by the program code similar to the program code of the process flow diagram of realizing Fig. 6 and Figure 11, therefore this chain of events can produce by operating system, and wherein one or more application are just carried out on the operation system of computer of Fig. 1.
The process flow diagram of Figure 15 has shown the sequence of steps of above describing with reference to figure 11-14, and it can realize with program code in the system of Fig. 1 that wherein the input of the keeper through confirming needs.At first, the equipment that the keeper locks in the system is activated and detects 61.Keeper's authorization message is transfused to and is detected by system then, and 63.Then, response management person input is judged whether this keeper has to browse or revise authority, shown in judge module 65.If have only browse right to be identified, the keeper browses the information of wanting that is allowed by system, 67 then.On the other hand, if the keeper has the modification authority, flow process enters the right branch of module 65, so protective cover is removed from control.The keeper then can with widget interaction, 71, protective cover covers control, 73 once more then.
Should be appreciated that and to carry out various modifications to the preferred embodiments of the present invention meeting under the prerequisite of true spirit of the present invention from top description.The purpose of description here just is used for demonstration, and it should not be interpreted as restriction.Scope of the present invention only should be limited by the literal of following claim.

Claims (30)

1. the method for the control regions of a graphic user interface (GUI) that is used for managing computer system comprising:
Show said control regions;
Alternately show a coverture that has with respect to first and second positions of said control regions, prevent and allow the mutual of user and said zone respectively.
2. the method for claim 1 comprises with pointing device and move said coverture between said first and second position.
3. the method for claim 2 wherein comprises said obducent moving:
With said equipment by one movably cursor contact said coverture; And
With said cursor from first position to the second position, or move said coverture to first position from second position.
4. the method for claim 2 wherein comprises said obducent moving:
Said coverture moves on to the action of the animation of described second position from described first position on said GUI, comprises observable position therebetween.
5. the method for claim 4, wherein said control regions has defined an information area; And
Said coverture is transparent, thus when coverture first or allow the said information of user's perception during the second place.
6. the method for claim 5, wherein said user interactions is selected from:
Import said information;
Delete said information;
Or change said information.
7. the method for claim 6, wherein said coverture are shown and interrelate with locking mechanisms that the user can activate, alternately allow or refusal to this obducent said moving.
8. the method for claim 7 further comprises:
Activate said locking mechanisms; And
Import a password, thereby allow said obducent moving.
9. the method for claim 8 further comprises:
Show a keeper zone that comprises keeper's locking mechanisms;
Activate said keeper's locking mechanisms; And
Import an administrator password, thereby allow first kind of state, wherein keeper thereby can cause said obducent moving and said user interactions with said pointing device.
10. the method for claim 9, wherein administrator password's input, thus allow second kind of state, refuse said user interactions and only allow the user said information perception.
11. be used for managing the device of control regions of the graphic user interface (GUI) of a computer system, comprise:
Be used to show the device of said control regions;
Be used for alternately showing a coverture that has with respect to first and second positions of said control regions, prevent and allow the mutual device in user and said zone respectively.
12. the device of claim 11 comprises being used to use pointing device to move said obducent device between said first and second positions.
13. the device of claim 12 wherein is used for moving said obducent device and comprises:
Be used to use said equipment by one movably cursor contact said obducent device; And
Be used to use said cursor from first position to the second position, or move said obducent device to first position from second position.
14. the device of claim 12 wherein is used for moving said obducent device and comprises:
Be used on said GUI said coverture moves on to described second position from described first position animation action, comprise the device of observable position therebetween.
15. the device of claim 14, wherein said control regions has defined an information area; And
Said coverture is transparent, thus when coverture first or allow the said information of user's perception during the second place.
16. the device of claim 15, wherein said user interactions is selected from:
Import said information;
Delete said information;
Or change said information.
17. the device of claim 16, wherein said coverture are shown and interrelate with locking mechanisms that the user can activate, alternately allow or refusal to this obducent said moving.
18. the device of claim 17 further comprises:
Be used to activate the device of said locking mechanisms; And
Be used to import a password, thereby allow said obducent mobile device.
19. the device of claim 18 further comprises:
Be used to show a device that comprises the keeper zone of keeper's locking mechanisms;
Be used to activate the device of said keeper's locking mechanisms; And
Be used to import an administrator password, thereby allow the device of first kind of state, wherein keeper thereby can cause said obducent moving and said user interactions with said pointing device.
20. the device of claim 19, wherein said device is used for the user password of input manager, thereby allows second kind of state, refuses said user interactions and only allows the user to said information perception.
21. computer program comprises the medium that the computing machine of the program code devices with embedding media can be used, this program code devices is used for the control regions of the graphic user interface (GUI) of managing computer system, comprising:
Be used to show the program code devices of said control regions;
Be used for alternately showing a coverture that has with respect to first and second positions of said control regions, prevent and allow the mutual program code devices in user and said zone respectively.
22. the computer program of claim 21 comprises being used to use pointing device to move said obducent program code devices between said first and second positions.
23. the computer program of claim 22 wherein is used for moving said obducent program code devices and comprises:
Be used to use said equipment by one movably cursor contact said obducent program code devices; And
Be used to use said cursor from first position to the second position, or move said obducent program code devices to first position from second position.
24. the computer program of claim 21 wherein is used for moving said obducent program code devices and comprises:
Be used to be implemented in said GUI and go up said coverture moves to described second position from described first position animation action, comprise the program code devices of observable position therebetween.
25. the computer program of claim 24, wherein said control regions has defined an information area; And
Said coverture is transparent, thus when coverture first or allow the said information of user's perception during the second place.
26. the computer program of claim 25, wherein said user interactions is selected from:
Import said information;
Delete said information;
Or change said information.
27. the computer program of claim 26, wherein said coverture are shown and interrelate with locking mechanisms that the user can activate, alternately allow or refusal to this obducent said moving.
28. the computer program of claim 27 further comprises:
Be used to activate the program code devices of said locking mechanisms; And
Be used to enter password, thereby allow program code devices said obducent shift action.
29. the computer program of claim 28 further comprises:
Be used to show a program code devices that comprises the keeper zone of keeper's locking mechanisms;
Be used to activate the program code devices of said keeper's locking mechanisms; And
Be used for input manager person's password, thereby allow the program code devices of first kind of state, wherein keeper thereby can cause said obducent moving and said user interactions with said pointing device.
30. the computer program of claim 29, wherein said program code devices is used to import said administrator password, thereby allows second kind of state, refuses said user interactions and only allows the user to said information perception.
CN99124768.XA 1998-12-16 1999-12-09 Method and device for protecting pattern user interface central control element of computer system Pending CN1257247A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US21332598A 1998-12-16 1998-12-16
US09/213,325 1998-12-16

Publications (1)

Publication Number Publication Date
CN1257247A true CN1257247A (en) 2000-06-21

Family

ID=22794663

Family Applications (1)

Application Number Title Priority Date Filing Date
CN99124768.XA Pending CN1257247A (en) 1998-12-16 1999-12-09 Method and device for protecting pattern user interface central control element of computer system

Country Status (3)

Country Link
JP (1) JP2000181597A (en)
CN (1) CN1257247A (en)
SG (1) SG87065A1 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100407091C (en) * 2005-10-28 2008-07-30 腾讯科技(深圳)有限公司 Protection method of operation interface
CN100414486C (en) * 2002-12-31 2008-08-27 施克莱无线公司 Multiple input foci
CN101702126B (en) * 2009-12-04 2012-11-28 金蝶软件(中国)有限公司 Graphical interface editing method and device thereof
CN101821707B (en) * 2007-09-04 2012-12-12 苹果公司 Application menu user interface
CN101635629B (en) * 2008-07-21 2013-02-20 李晓东 Secure password authentication method
CN103279345A (en) * 2013-05-28 2013-09-04 星云融创(北京)信息技术有限公司 Method and device for locking page element
US8619038B2 (en) 2007-09-04 2013-12-31 Apple Inc. Editing interface
WO2014083378A1 (en) * 2012-11-29 2014-06-05 Hewlett-Packard Development Company, L.P. Image analysis
US9335924B2 (en) 2006-09-06 2016-05-10 Apple Inc. Touch screen device, method, and graphical user interface for customizing display of content category icons
CN106547461A (en) * 2015-09-23 2017-03-29 小米科技有限责任公司 A kind of operation processing method, device and equipment
US9619143B2 (en) 2008-01-06 2017-04-11 Apple Inc. Device, method, and graphical user interface for viewing application launch icons
US9733812B2 (en) 2010-01-06 2017-08-15 Apple Inc. Device, method, and graphical user interface with content display modes and display rotation heuristics
US9772751B2 (en) 2007-06-29 2017-09-26 Apple Inc. Using gestures to slide between user interfaces
CN107646120A (en) * 2015-05-22 2018-01-30 微软技术许可有限责任公司 Interactive command row for content creating
US9933913B2 (en) 2005-12-30 2018-04-03 Apple Inc. Portable electronic device with interface reconfiguration mode
US9933937B2 (en) 2007-06-20 2018-04-03 Apple Inc. Portable multifunction device, method, and graphical user interface for playing online videos
WO2018205548A1 (en) * 2017-05-12 2018-11-15 武汉斗鱼网络科技有限公司 Dialog box control display method and device, readable storage medium, and user terminal
CN109216235A (en) * 2017-07-05 2019-01-15 株式会社迪思科 Processing unit (plant)
US10254949B2 (en) 2007-01-07 2019-04-09 Apple Inc. Portable multifunction device, method, and graphical user interface supporting user navigations of graphical objects on a touch screen display
US10313505B2 (en) 2006-09-06 2019-06-04 Apple Inc. Portable multifunction device, method, and graphical user interface for configuring and displaying widgets
US10846459B2 (en) 2015-05-22 2020-11-24 Microsoft Technology Licensing, Llc Unified messaging platform and interface for providing user callouts
US10897441B2 (en) 2015-05-22 2021-01-19 Microsoft Technology Licensing, Llc Unified messaging platform for displaying attached content in-line with e-mail messages

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100440189C (en) * 2003-06-04 2008-12-03 无敌科技(西安)有限公司 Language studying system combining graphic depiction and its operational method
EP2757452A4 (en) 2011-09-16 2015-08-05 Information processing device having unlocking function
KR102013940B1 (en) * 2012-12-24 2019-10-21 삼성전자주식회사 Method for managing security for applications and an electronic device thereof
JP6300112B2 (en) * 2015-06-05 2018-03-28 株式会社ダイフク Touch panel for manual operation of mechanical equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5107443A (en) * 1988-09-07 1992-04-21 Xerox Corporation Private regions within a shared workspace
JP2525546B2 (en) * 1992-09-08 1996-08-21 インターナショナル・ビジネス・マシーンズ・コーポレイション Graphic resource editor
US5745714A (en) * 1996-07-19 1998-04-28 International Business Machines Corporation Method and system in a data processing system for the association and display of a plurality of objects

Cited By (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100414486C (en) * 2002-12-31 2008-08-27 施克莱无线公司 Multiple input foci
CN100407091C (en) * 2005-10-28 2008-07-30 腾讯科技(深圳)有限公司 Protection method of operation interface
US10359907B2 (en) 2005-12-30 2019-07-23 Apple Inc. Portable electronic device with interface reconfiguration mode
US11650713B2 (en) 2005-12-30 2023-05-16 Apple Inc. Portable electronic device with interface reconfiguration mode
US9933913B2 (en) 2005-12-30 2018-04-03 Apple Inc. Portable electronic device with interface reconfiguration mode
US10884579B2 (en) 2005-12-30 2021-01-05 Apple Inc. Portable electronic device with interface reconfiguration mode
US11449194B2 (en) 2005-12-30 2022-09-20 Apple Inc. Portable electronic device with interface reconfiguration mode
US10915224B2 (en) 2005-12-30 2021-02-09 Apple Inc. Portable electronic device with interface reconfiguration mode
US11029838B2 (en) 2006-09-06 2021-06-08 Apple Inc. Touch screen device, method, and graphical user interface for customizing display of content category icons
US10778828B2 (en) 2006-09-06 2020-09-15 Apple Inc. Portable multifunction device, method, and graphical user interface for configuring and displaying widgets
US11736602B2 (en) 2006-09-06 2023-08-22 Apple Inc. Portable multifunction device, method, and graphical user interface for configuring and displaying widgets
US9335924B2 (en) 2006-09-06 2016-05-10 Apple Inc. Touch screen device, method, and graphical user interface for customizing display of content category icons
US11240362B2 (en) 2006-09-06 2022-02-01 Apple Inc. Portable multifunction device, method, and graphical user interface for configuring and displaying widgets
US10313505B2 (en) 2006-09-06 2019-06-04 Apple Inc. Portable multifunction device, method, and graphical user interface for configuring and displaying widgets
US9952759B2 (en) 2006-09-06 2018-04-24 Apple Inc. Touch screen device, method, and graphical user interface for customizing display of content category icons
US11586348B2 (en) 2007-01-07 2023-02-21 Apple Inc. Portable multifunction device, method, and graphical user interface supporting user navigations of graphical objects on a touch screen display
US11169691B2 (en) 2007-01-07 2021-11-09 Apple Inc. Portable multifunction device, method, and graphical user interface supporting user navigations of graphical objects on a touch screen display
US10254949B2 (en) 2007-01-07 2019-04-09 Apple Inc. Portable multifunction device, method, and graphical user interface supporting user navigations of graphical objects on a touch screen display
US10732821B2 (en) 2007-01-07 2020-08-04 Apple Inc. Portable multifunction device, method, and graphical user interface supporting user navigations of graphical objects on a touch screen display
US9933937B2 (en) 2007-06-20 2018-04-03 Apple Inc. Portable multifunction device, method, and graphical user interface for playing online videos
US11507255B2 (en) 2007-06-29 2022-11-22 Apple Inc. Portable multifunction device with animated sliding user interface transitions
US10761691B2 (en) 2007-06-29 2020-09-01 Apple Inc. Portable multifunction device with animated user interface transitions
US9772751B2 (en) 2007-06-29 2017-09-26 Apple Inc. Using gestures to slide between user interfaces
US11010017B2 (en) 2007-09-04 2021-05-18 Apple Inc. Editing interface
US11604559B2 (en) 2007-09-04 2023-03-14 Apple Inc. Editing interface
US10620780B2 (en) 2007-09-04 2020-04-14 Apple Inc. Editing interface
US11861138B2 (en) 2007-09-04 2024-01-02 Apple Inc. Application menu user interface
US11126321B2 (en) 2007-09-04 2021-09-21 Apple Inc. Application menu user interface
CN101821707B (en) * 2007-09-04 2012-12-12 苹果公司 Application menu user interface
US8619038B2 (en) 2007-09-04 2013-12-31 Apple Inc. Editing interface
US9619143B2 (en) 2008-01-06 2017-04-11 Apple Inc. Device, method, and graphical user interface for viewing application launch icons
US10628028B2 (en) 2008-01-06 2020-04-21 Apple Inc. Replacing display of icons in response to a gesture
CN101635629B (en) * 2008-07-21 2013-02-20 李晓东 Secure password authentication method
CN101702126B (en) * 2009-12-04 2012-11-28 金蝶软件(中国)有限公司 Graphical interface editing method and device thereof
US9733812B2 (en) 2010-01-06 2017-08-15 Apple Inc. Device, method, and graphical user interface with content display modes and display rotation heuristics
WO2014083378A1 (en) * 2012-11-29 2014-06-05 Hewlett-Packard Development Company, L.P. Image analysis
CN103279345A (en) * 2013-05-28 2013-09-04 星云融创(北京)信息技术有限公司 Method and device for locking page element
CN103279345B (en) * 2013-05-28 2017-02-08 星云融创(北京)科技有限公司 Method and device for locking page element
CN107646120A (en) * 2015-05-22 2018-01-30 微软技术许可有限责任公司 Interactive command row for content creating
CN107646120B (en) * 2015-05-22 2021-04-02 微软技术许可有限责任公司 Interactive command line for content creation
US10897441B2 (en) 2015-05-22 2021-01-19 Microsoft Technology Licensing, Llc Unified messaging platform for displaying attached content in-line with e-mail messages
US10846459B2 (en) 2015-05-22 2020-11-24 Microsoft Technology Licensing, Llc Unified messaging platform and interface for providing user callouts
CN106547461A (en) * 2015-09-23 2017-03-29 小米科技有限责任公司 A kind of operation processing method, device and equipment
WO2018205548A1 (en) * 2017-05-12 2018-11-15 武汉斗鱼网络科技有限公司 Dialog box control display method and device, readable storage medium, and user terminal
CN109216235A (en) * 2017-07-05 2019-01-15 株式会社迪思科 Processing unit (plant)
CN109216235B (en) * 2017-07-05 2024-02-09 株式会社迪思科 Processing device

Also Published As

Publication number Publication date
JP2000181597A (en) 2000-06-30
SG87065A1 (en) 2002-03-19

Similar Documents

Publication Publication Date Title
CN1257247A (en) Method and device for protecting pattern user interface central control element of computer system
US5745714A (en) Method and system in a data processing system for the association and display of a plurality of objects
RU2376626C2 (en) Method of preventing disclosure entered information to observer
US8863024B2 (en) Smart window creation in a graphical user interface
CN106605220A (en) Method and system for selective document redaction
AU2004214609A1 (en) Providing a graphical user interface in a system with a high-assurance execution environment
US20030067497A1 (en) Method and device for modifying a pre-existing graphical user interface
US6718386B1 (en) Methods, system, and article for displaying privilege state data
US20060253771A1 (en) User Interface For Nonuniform Access Control System And Methods
CN107038357A (en) User authority control method and mobile terminal
EP1061726A3 (en) Apparatus and method for tol client boundary protection
CN103699830A (en) Operating system unlocking method and operating system unlocking device
CN105138252A (en) Control method and electronic equipment
KR20020019881A (en) Spotlight cursor
JP3601013B2 (en) Setting method of access code or security code
US20070005975A1 (en) Method and system for easily and securely managing multiple keys used to have access to multiple computing resources
CN106354379A (en) Method for hiding multiple objects on basis of gestures and method and device for restoring display
CN106648280B (en) Task management interaction method and device
CN114138395A (en) Application management method and device and electronic equipment
Hullot CEYX, a multiformalism programming environment
Epstein A prototype for Trusted X labeling policies
Norman Yet another technology cusp: confusion, vendor wars, and opportunities
DE102009033918B4 (en) Secure display of user data on a telecommunications device
Lundberg et al. Baker v. Selden, Computer Programs, 17 USC Section 102 (b) and Whelan Revisited
JP2004078918A (en) Program for preventing unauthorized access

Legal Events

Date Code Title Description
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication