Information
-
Patent Grant
-
6353449
-
Patent Number
6,353,449
-
Date Filed
Thursday, December 10, 199826 years ago
-
Date Issued
Tuesday, March 5, 200222 years ago
-
Inventors
-
Original Assignees
-
Examiners
Agents
- Mims, Jr.; David A.
- Wilder; Robert V.
-
CPC
-
US Classifications
Field of Search
US
- 345 331
- 345 333
- 345 335
- 345 334
- 345 339
- 345 349
- 345 751
- 345 762
- 345 765
- 345 744
- 345 764
- 345 839
- 705 1
- 705 13
- 705 14
-
International Classifications
-
Abstract
A method and implementing computer system are provided in which screensavers are used to lock a workstation and present an eye-pleasing display while the user is away from the workstation. Users are enabled to select from a plurality of screensaver types which are applied in a screensaver mode. The screensaver displays include application indicia representative of work-in-progress when a screensaver mode was activated. The application indicia can be selectively obscured to hide work which may be of a sensitive or proprietary nature.
Description
FIELD OF THE INVENTION
The present invention relates generally to information processing systems and more particularly to a methodology and implementation for providing a screen-saver technique by which useful information may be selectively communicated in conjunction with the screen saving function on a computer display.
BACKGROUND OF THE INVENTION
A screensaver for a workstation provides a computer user with a means of manually or automatically locking the workstation when the computer user is either absent or inactive at the workstation for some period of time. While the workstation is locked, some attractive pattern is usually repetitively displayed until the workstation is unlocked. As is known in the computer art, the user can invoke the screensaver by clicking on a button, or can set certain screensaver parameter options to cause the screensaver to be invoked after some period of input inactivity. Usually, the screensaver is invoked after a few minutes of keyboard or mouse inactivity. Once invoked, the screensaver can only be deactivated by an input interrupt such as a movement of a mouse pointing device or a keyboard input. When interrupted, the screensaver will ask the user to input a correct password, and only then will the screen be restored to its last active state and accept additional input via the keyboard, mouse, or other input devices.
Although screensaver functions are successful in locking out unauthorized users, and also successful in preventing unauthorized users from even viewing work related information, they also prevent information from being viewed by authorized and appropriately interested users, such as work colleagues, team leaders, managers, and so forth. Since the safest method of workstation protection is to use automatic invocation of screensavers, the workstation user can also be blocked from even viewing his or her ongoing work and activity on the workstation when other work duties which take place at the desk, even as simple as lengthy telephone calls, prevent frequent use of the keyboard or mouse. Further, many installations require that any workstation that is inactive for fifteen minutes or more be automatically locked. As a result, users attempting to follow correct policy will have their own work hidden from them while completing other desk-bound duties.
Thus, there is a need for an improved methodology and implementing system which enables a more efficient and useful screen saver function which exceeds current screensaver functions by also displaying the ongoing work activity on the workstation even though the workstation is locked and input is inhibited.
SUMMARY OF THE INVENTION
A method and implementing computer system is provided in which screensaver presentations are selected by a user and selectively presented on the user's display device on command or after a predetermined period of inactivity. The user selected screen saver presentations are used to lock a workstation and present an eye-pleasing display on the CRT while the user is away from the workstation, and at the same time, provide a means for enabling a presentation of useful information to viewers of the display when the workstation is in the screen-saver mode. A work-oriented screen saver methodology provides a means of viewing work that was in progress when the user left the workstation, while selectively obscuring or hiding work which may be of a sensitive or proprietary nature.
BRIEF DESCRIPTION OF THE DRAWINGS
A better understanding of the present invention can be obtained when the following detailed description of a preferred embodiment is considered in conjunction with the following drawings, in which:
FIG. 1
is a diagram of a computer system in which the present invention may be implemented;
FIG. 2
is a simplified schematic diagram showing selected components and subsystems of the computer system illustrated in
FIG. 1
;
FIG. 3
is a functional block diagram of the system described in
FIG. 2
;
FIG. 4
is a Table of All Windows screen showing relationship between a screen of windows display and saved table information;
FIG. 5
is an exemplary screen display produced by the
FIG. 4
Table of All Windows screen;
FIG. 6
is an example of a “Screensaver Option Create” screen, showing samples of user options;
FIG. 7
is another example of a “Screensaver Option Create” screen, showing samples of user options;
FIG. 8
is a Table of Work-Windows for Screensaver;
FIG. 9
is an example of a first exemplary screen-obscuring technique;
FIG. 10
is an example of a second exemplary screen-obscuring technique;
FIG. 11
is an example of a third exemplary screen-obscuring technique;
FIG. 12
is a flow chart showing an exemplary sequence of operations for creating work oriented screen saver options;
FIG. 13
is a flow chart showing an exemplary sequence of operations for screen-saver set-up and display;
FIG. 14
is a flow chart illustrating an exemplary sequence of operations for Table III input processing;
FIG. 15
is another flow chart illustrating an exemplary sequence of operations for Table III input processing;
FIG. 16
is a flow chart illustrating an exemplary sequence of operations for screen saver activation; and
FIG. 17
is a flow chart illustrating an exemplary sequence of operations for a return from screen saver mode.
DETAILED DESCRIPTION
The present invention may be practiced in any suitable hardware configuration such as the workstation system illustrated in FIG.
1
and
FIG. 2
, or, alternatively, in a laptop or so called “network” computer, or any processing system which includes a display. Further, although references are made to the CRT phosphorous-saving function served by the screensaver technique, it is understood that the present invention applies also to flat panel and other non-CRT displays as well.
In
FIG. 1
, the computer system includes a processor unit
103
which is typically arranged for housing a processor circuit along with other component devices and subsystems of the computer system
101
. The computer system
101
also includes a monitor unit
105
(which may be a CRT, a liquid crystal display, flat panel or other display device), a keyboard
107
and a mouse or pointing device
109
, which are all interconnected with the computer system illustrated. Also shown is a connector
111
which is arranged for connecting a modem within the computer system to a communication line such as a telephone line in the present example. The present invention may also be implemented in a cellular or other wireless system.
Several of the major components of the system
101
are illustrated in
FIG. 2. A
processor circuit
201
is connected to a system bus
203
which may be any host system bus. It is noted that the processing methodology disclosed herein will apply to many different bus and/or network configurations. A cache memory device
205
, and a system memory unit are also connected to the bus
203
. A modem
209
is arranged for connection
210
to a communication line, such as a telephone line, through a connector
111
(FIG.
1
). The modem
209
, in the present example, selectively enables the computer system
101
to establish a communication link and initiate communication with another computer system, or network or database server.
The system bus
203
is also connected through an input interface circuit
211
to a keyboard
213
and a mouse or pointing device
215
. The bus
203
is also coupled to a network interface subsystem
217
and a diskette drive unit
219
. A video subsystem
220
, which may include a graphics subsystem, is connected to a display device
221
. A storage device
218
, which may comprise a hard drive unit and/or an optical CD, is also coupled to the bus
203
. The diskette drive unit provides a means by which individual diskette programs may be loaded on to the hard drive, or accessed directly, for selective execution by the computer system
101
. As is well known, program diskettes containing application programs represented by magnetic indicia on the diskette, may be read from the diskette drive, and the computer system is selectively operable to read such magnetic indicia and create program signals. Such program signals are selectively effective to cause the computer system to present displays on the screen of a display device and respond to user inputs in accordance with the functional flow of the application program on the diskette.
In general, an implementing computer system may include a plurality of processors in a multi-bus system in a network of similar systems. However, since the workstation or computer system implementing the present invention in an exemplary embodiment, is generally known in the art and composed of electronic components and circuits which are also generally known to those skilled in the art, the computer system details beyond those shown in FIG.
1
and
FIG. 2
are not specified to any greater extent than that considered necessary as illustrated, for the understanding and appreciation of the underlying concepts of the present invention and in order not to obfuscate or distract from the teachings of the present invention.
In
FIG. 3
, there is shown a functional block diagram of the various software modules within the exemplary system described in FIG.
2
. As illustrated, the system includes a trackball device driver
301
which is coupled between a mouse trackball device and a trackball interpretive module
303
. The trackball device may be a movable mouse riding on a trackball or a stationary base unit for a trackball which is mounted on the base. Where a stationary base unit is implemented, the ball itself is maneuvered by a user rather than the mouse device. The output of the trackball interpretive module
303
provides trackball input signals to a screen saver module
309
and also to a screen monitor module
311
. The trackball input signals are representative of user inputs from the mouse/pointing device
109
. The keyboard
107
is coupled through a keyboard device driver
305
and a keyboard interpretive module
307
to furnish inputs to the screen saver module
309
and also directly to the screen monitor module
311
. The Screen saver module
309
also applies additional inputs to the screen monitor module
311
. A COMM device driver
313
couples the modem
209
to a COMM interpretive module
315
which, in turn, provides input to the screen monitor module
311
. An internal disk or diskette drive, or both
317
, are operable to run disk or diskette applications
319
and provide application input to the screen monitor module
311
. The screen monitor module
311
provides input signals to a CRT or other display device driver
321
in the exemplary illustration.
As illustrated, the screen monitor module coordinates the screen data flow from the various devices and applications into an orderly presentation of windowed information. When a “screensaver” function is invoked, some of the devices which interface with the screen monitor module are masked off by the locking functions of the screen saver module
309
. Other devices may continue to function and therefore continue to update window images even though the screen is “locked”.
The screen monitor module
311
has many internal subroutines to accomplish its overall function. As part of integrating keyboard and mouse, and modem (e.g. Internet) input, the screen monitor module (SMM)
311
must serve as the window manager for the system. The SMM
311
must handle window creation, window movement, window iconization, window resizing, and bring-window-to-focus, amongst many other functions. In order to manage these windows efficiently, it is necessary for the SMM
311
to maintain a “Table of All Windows” active or inconified for a particular session.
As shown in
FIG. 4
, the Table of All Windows contains information about the contents of each window, including the X-Y limits of the pixels for the window as it exists on the display and the disk location of the last saved copy of the window. The table always contains one default entry which describes the background for an entire screen display. Each entry for a window also contains an identifier or “nickname” for the window, which is usually the same or similar to the identifier or “nickname” commonly seen in the activate button or “pull-down bar” for a window. The user also can cause the X-Y coordinates of each window to change by moving or resizing windows about the screen. Software functions which create or modify the content of each window (such as Browsers) create or modify the value of the actual pixels contained in the Table of Windows. In order to correctly perform this function, these software functions must always first obtain the X-Y coordinate data from the table of windows. From these X-Y coordinates, the height and width of the window can be derived. Although the actual table is far more complex, for this example the screen is depicted as a 100×100 matrix.
The table entries in
FIG. 4
would result in the screen display shown in FIG.
5
. As the highest priority (i.e. “
6
” in the exemplary
FIG. 4
table), the “Fax” window is atop all other windows. The order of display for the other windows is also determined by their priority, except for priority
2
(Lotus Notes), which is currently Iconified and is shown as an Icon (not shown) instead of as a separate Window. The actual pixel values in the each Table of Windows entry has been set by the application that interfaces with its window—Lotus Notes has set the pixel values for entry 2 in the Table of Windows, MSWorks has set the pixel values for entry 3, the “Doom2” application has set the Pixel values for entry 4, Netscape has set the pixel values for entry 5, and Fax has set the pixel values for entry 6. Coincidentally, the priority of each window is equal to the entry number for each window. However, the user can change this priority, and the X-Y coordinates of any entry by taking actions like mouse clicking or mouse “drag” and “resize” functions.
An enhanced screensaver option screen, “Create Screen Saver Screen”, is illustrated in FIG.
6
and FIG.
7
. The screensaver option screen allows the user to choose to display certain work oriented windows that were active when the screensaver was activated. The user can choose to display all the windows that were active, and can also specify a list of windows for special treatment. The user can also choose: to group certain windows together for display; to select a stylized or standard treatment of the display; to exclude or obscure certain windows; and to specify times or varying time lengths for each window or group of windows to be displayed. The user can also choose to allow iconfied windows to be expanded prior to display or to be expanded when clicked upon. The user can also choose to allow the display of a window frozen at the time the screensaver was activated, or display of the current contents. (Since certain tasks, such as a database search on the Internet may not complete until sometime after the user has left the workstation, this does make sense.) All of the users options are saved in a second Table of Work-Windows for Screensaver (
FIG. 8
) which is essentially a copy of the create options screen. This table need only be created once, but may be updated from time to time as the user desires.
Once the screensaver is activated, either automatically or manually, the processing essentially consists of comparing the list of windows in the Table of Windows (
FIG. 4
) to the Table of Work-Windows for Screensaver (FIG.
8
). A flow chart is provided for this processing; but briefly, all the active windows are displayed using default values using the general rules specified by the user, unless a match is found between the Table of Windows and the Table of Work-Windows for Screensaver. When a match is found, the specific options for that window are applied. If a window in the Table of Work-Windows is not active when the screensaver is activated, no processing problems occur and no process harm is done, since no match is found.
The Screen Monitor Module is also responsible for detecting user interrupts, as when the user double clicks on an icon to initiate a new function, such as creating a set of screen saver options, as in FIG.
6
. Once a function has been created, monitoring for invocation of the screensaver function is accomplished by detecting the click on the screensaver activate button, or by detecting that the number of seconds defined by the user or by system default has elapsed. As illustrated in
FIG. 6
, the user has clicked on a “Create Screensaver” button, and the screensaver function accesses the Table of All Windows to present the user with default options for the windows known to the system at that time. Note that the default values in
FIG. 6
are derived from the table entries in FIG.
4
. The user may now modify this screen to tailor the screensaver options as shown in FIG.
7
.
FIG. 8
is a Table of Work-Windows for Screensaver. Note that the values in
FIG. 8
are simply a saved record of the user options expressed in
FIG. 7
, plus information selected from the Table of All Windows (FIG.
4
). Information selected from the Table of All Windows includes the disk address of windows which will be displayed “frozen”, or as they existed at the time Screensaver was started. Windows given the “Current” option will have to be retrieved dynamically from the Table of all Windows. Other information selected from the Table of All Windows includes Priority, which will be used in certain ordering circumstances to supplement other ordering rules.
The Table in
FIG. 8
need only be created once by the user, but may be updated whenever the user sees fit. It would be possible to create only the Fixed Area of the table, and allow system default values to control the display of all windows which happen to be active. In this case, the first iteration of Screensaver activation would dynamically create the variable portion of the Table. When creating the Table in
FIG. 8
, the user may specify Table Nicknames which do not happen to be active. Later activation of Screensaver will process these nicknames when an appropriate matching entry exists in the Table of All Windows.
In
FIGS. 9-11
, several styles of the exemplary method of screen-saving are illustrated. In
FIG. 9
, a group of two window images
903
and
905
is displayed on a screen
901
as a pair in a “Waterfall” style to comply with user selected options. The windows appear to slide down a waterfall and then float off the screen as their time allowed on screen elapses. Note that the contents of the MSWorks window have been obscured (Refer to FIG.
7
). As shown in
FIG. 10
, when a style designated as “Falling Leaf” has been selected, the window
1003
appears to “flutter” from the top to the bottom of the screen display
1001
. As shown in
FIG. 11
, in the “standard” display, the FAX window
1101
appears in its normal, or standard format. The window simply “appears” to replace the previous window, and fades out when its time has elapsed. Windows may also appear from the left or from the right.
FIG. 12
is a flow chart showing an exemplary sequence of operations for creating work oriented screen saver options. As shown, after the process starts
1201
, the default options are created
1203
and the default list is obtained or downloaded from tables
1205
. Next a determination is made concerning whether or not this routine was called as an internal call (simply for the purpose of creating default entries in Table II, when the user has chosen to or forgotten to supply specific window options for screen saving). If so, the process returns to the process illustrated in FIG.
13
. Otherwise, the process continues by implementing, for each user input
1211
, a series of options selected
1213
by the user. These options include information found in the “Contents” column
1215
, the “Expand Icon” column
1217
, the “Style” column
1219
and the “Order” column
1221
of the “Create Screen Saver Screen” shown in FIG.
7
. As further shown in
FIG. 12
, the flow continues by ensuring that values for grouping and time on screen have legal numeric values
1223
, and if none have been assigned by the user, default values are assigned
1225
. Finally the nicknames are forced to a format which will allow valid “compares” with system assigned names at a later time—for example, all characters are forced to upper case and embedded blanks are eliminated
1227
. The process then returns to the screen monitor module
1229
.
FIG. 13
is a flow chart showing an exemplary sequence of operations for screen-saver set-up and display. As shown, when the process starts
1301
, a check is made to determine if Table I exists
1301
. Table 1 is the Table of All Windows which is illustrated in FIG.
4
. If Table I does not exist, an error message is created
1305
and the process exits to the Screen Monitor Module
1307
. If Table I does exist
1303
, a check is made to determine if Table II exists
1309
. Table II is the Table of Work-Windows for Screensaver which is illustrated in FIG.
8
. If Table II exists, the program continues by creating Table III
1311
. If Table II does not exist, it is created
1313
prior to the creation of Table III
1311
. Table III is a merger of Tables I and II and is created through the steps illustrated in FIG.
14
and FIG.
15
. Table III looks just like
FIG. 8
, which is Table II, Table of Work-Windows for Screensaver. Table III is basically a working copy of Table II which can be dynamically updated. Table II is the user specified set of options; Table III is a working copy with some data merged in from Table I on the fly, such as an updated disk address. Table III might contain more entries or less entries than Table II; for example, if DOOM2 is not active when screensaver is activated, there would be no entry created in the working copy, Table III, since there would be nothing to display for DOOM2. If the user had specified DISPLAY ALL in his options, when screensaver activates, entries would be created for all active windows, which might be more than those set in Table II. For those entries where a match is found in Table II, those options specified in Table II would be copied over to Table III, but default values would be created for those active windows which do not appear in Table II.
Table III has priority and order information created from copying Table II data where specified and assigning default values where no data is specified. The priority and order information, combined with time-on-screen options, determines which windows appear first in a sequence, second in a sequence, and so on. It can also specify that the sequence is RANDOM, in which case all the priorities would be equal or null. Group information determines which windows are grouped together for simultaneous display; Time determines how long windows or groups stay on the screen, and so on. In short, Table III controls the appearance, format, longevity, style, and other possible variables of the sequence of the windows which make up the changing screensaver image.
After creating Table III
1311
, the program or process continues
1315
by checking and implementing user selected options for each entry in Table III. If the “Current” option has not been selected
1317
, the window image is retrieved from storage or disk
1321
and a check is made to determine if the “Obscure” option has been selected
1323
. If the “Current” option was selected
1317
, the disk address is updated
1319
to the “current” address in Table I before retrieving the window image from disk
1321
. If the “Obscure” option was not selected
1323
, the screensaver window is displayed in accordance with the options chosen
1327
. If the “Obscure” option was selected
1323
, the particular style for the obscuration is determined
1325
and used in the display of the window
1327
. The determination of the options is cycled until there is an input interrupt
1329
at which time the process exits to the screen monitor module
1307
.
FIG.
14
and
FIG. 15
are flow charts illustrating the exemplary methodology for Table III input processing. As shown in
FIG. 14
, after the process starts
1401
, the entries in Table I are checked. For each entry in Table I (
FIG. 4
)
1403
, a check is made
1405
to see if the “State” column entry is “Displayed” or “Iconified”. If all entries are marked “Displayed”, the entries are placed in Table III
1409
. If all entries are not marked as “Displayed”, the entry is looked-up in Table II
1407
and a check for a “Nickname” match
1411
is made. If there is no nickname match, the cycle is repeated for the next entry in Table I. If there is a nickname match
1411
, another check is made to determine if the “Displayed” column is selected
1413
. If not selected, the entry is placed in Table III
1415
and the process returns to cycle the next entry in Table I
1403
. If “Display All” option was selected, a check is made for the “Exclude” option
1417
. If the “Exclude” option was selected, the entry is removed from Table III
1419
and the process returns to cycle the next entry in Table I
1403
. If the “Exclude” option was not selected
1417
, the processing continues
1421
as illustrated in FIG.
15
.
In
FIG. 15
, the processing continues from
FIG. 14
1501
and a check is next made as to whether the window of the screensaver is currently Iconified
1503
. If the screensaver window being processed is not Iconified, the process moves to block
1515
. If the screensaver window being processed is Iconified, a check is made to determine if the user had generally specified that all Iconified windows were to be expanded
1505
, or if this specific window was to be expanded if it was Iconified
1511
. If there is a need for Icon expansion, the processing sets the disk address to the expanded window
1513
. If no expansion is required, processing sets the disk address to the disk address of the Icon image
1507
and the processing returns
1509
to
FIG. 14
as shown. When the last entry is detected
1515
, Table III is sorted on Group, Order and Priority
1517
and the processing is completed
1519
.
In
FIG. 16
, there is shown an exemplary process used to initiate or activate the screen saver function. As illustrated, after the screen monitor module is started
1601
, the screen monitor functions are performed
1603
and a continual check is made
1605
to determine the time elapsed since the last input, such as a keyboard or mouse input, is received from a user. When no input is received for a predetermined period of time (such as 30 seconds in the example), the screensaver function shown in
FIG. 13
is activated
1607
, to present a screensaver display in accordance with the programmed and selected screensaver options. Normal program processing continues and the screensaver function is not activated so long as user inputs continue to be received within the prescribed predetermined time period.
In
FIG. 17
, a flow chart illustrating an exemplary sequence of operations for a return from screen saver mode. In the example, when the screen saver is functioning and displaying selected screensaver images, when any key on the keyboard is pressed or the mouse or trackball is moved, a request to enter a password
1701
is presented on the screen. If a valid password is entered
1703
in less than a predetermined period of time (such as 30 seconds), the screen returns to the Table I—Table of All Windows presentation
1705
. Alternatively, the user may be returned to an application program running at the time the screensaver function was invoked. If a valid password is not entered in a prescribed amount of time, the process returns
1707
to reactivate the screensaver function as illustrated in FIG.
13
.
The method and apparatus of the present invention has been described in connection with a preferred embodiment as disclosed herein. The disclosed methodology may be implemented in a wide range of sequences, menus and screen designs to accomplish the desired results as herein illustrated. Although an embodiment of the present invention has been shown and described in detail herein, along with certain variants thereof, many other varied embodiments that incorporate the teachings of the invention may be easily constructed by those skilled in the art, and even included or integrated into a processor or CPU or other larger system integrated circuit or chip. The disclosed methodology may also be implemented solely in program code stored on a disk or diskette (portable or fixed), or other memory device, from which it may be executed to achieve the beneficial results as described herein. Accordingly, the present invention is not intended to be limited to the specific form set forth herein, but on the contrary, it is intended to cover such alternatives, modifications, and equivalents, as can be reasonably included within the spirit and scope of the invention.
Claims
- 1. A method for implementing a screensaver technique, said method being adaptable for use with a computer system, said computer system being selectively operable for executing at least one application program and displaying a working screen for said one application to a user on a display screen of a display device, said working screen being continuously changeable in response to user input, said method comprising:activating a screensaver mode function; and modifying said working screen to appear as one of a plurality of selectable application images on said display screen, each application image containing display indicia representative of information present on said working screen of a corresponding application program when said screensaver function was activated, wherein selected ones of said application images are on said display screen during a continuance of said screensaver mode.
- 2. The method as set forth in claim 1 wherein said screensaver mode function is automatically activated after a predetermined period of user input inactivity.
- 3. The method as set forth in claim 1 wherein said screensaver mode function is actively initiated by said user.
- 4. The method as set forth in claim 1 wherein said selectable application image is reduced in size from said working screen of said corresponding application program.
- 5. The method as set forth in claim 1 wherein contents of said working screen are decipherable from said display indicia.
- 6. The method as set forth in claim 5 and further including:restoring said working screen to said display screen in response to a predetermined condition.
- 7. The method as set forth in claim 6 wherein said predetermined condition is a predetermined input from a user.
- 8. The method as set forth in claim 7 wherein said predetermined input from said user is a password input.
- 9. The method as set forth in claim 1 wherein contents of said working screen are undecipherable from said display indicia.
- 10. The method as set forth in claim 1 wherein said display screen is a cathode ray tube display device.
- 11. The method as set forth in claim 1 wherein said display device is a flat screen device.
- 12. The method as set forth in claim 1 wherein said display device is a liquid crystal display device.
- 13. The method as set forth in claim 1 wherein said computer system is arranged to execute a first number of application programs, said first number being greater than one, said method further including:selectively providing a second number of application images, said application images containing display characteristics uniquely representative of an application program being represented by said application image.
- 14. The method as set forth in claim 13 and further including:presenting an application image selection screen to said user to enable said user to select a particular application image to represent any of said application programs.
- 15. The method as set forth in claim 13 wherein said application images are selectively presented and removed from said display screen such that only one application image is present on said display screen at any given time.
- 16. The method as set forth in claim 13 wherein said application images are selectively presented on said display screen such that all user-selected application images are presented on said display screen during said screensaver mode.
- 17. The method as set forth in claim 1 wherein said computer system is arranged to execute a first number of application programs, said first number being greater than one, said method further including:selectively providing a second number of application images, said application images containing display characteristics representative of an application program being represented by said application image, said second number being equal to said first number whereby each of said application programs is represented by a corresponding application image on said display screen during said screensaver mode.
- 18. The method as set forth in claim 1 wherein said computer system is arranged to execute a first number of application programs, said method further including:selectively providing a second number of application images, said application images containing display characteristics representative of corresponding application programs being represented by said application images, said second number being less than said first number whereby selected ones of said application program working screens are omitted from being displayed on said display screen during said screensaver mode.
- 19. The method as set forth in claim 1 and further including:moving said application image on said display screen during said screensaver mode.
- 20. The method as set forth in claim 19 wherein said screensaver mode is terminated when said user actuates said input pointing device while pointing said input pointing device at said application image while said application image is moving on said display screen.
- 21. The method as set forth in claim 1 and further including:presenting a screensaver format selection screen to said user; and modifying said application images to conform to a screensaver format selected by said user.
- 22. The method as set forth in claim 21 wherein one of said screensaver formats is effective to present said application image enclosed within a shape of a falling leaf, said falling leaf appearing to fall across said display screen.
- 23. The method as set forth in claim 21 wherein one of said screensaver formats is effective to present said application image enclosed within a bouncing ball, said bouncing ball appearing to bounce across said display screen.
- 24. The method as set forth in claim 21 wherein one of said screensaver formats is effective to present said application image enclosed within a shape of a waterfall, said application image appearing to flow over said waterfall.
- 25. The method as set forth in claim 21 wherein one of said screensaver formats is effective to present said application image continuously appearing and fading out from said display screen.
- 26. A storage medium including machine readable coded indicia, said storage medium being selectively coupled to a reading device, said reading device being selectively coupled to processing circuitry within a computer system, said reading device being selectively operable to read said machine readable coded indicia and provide program signals representative thereof, said program signals being effective to implement a screen saver processing methodology by which a screen saver display may be selected and presented on a user display screen, said program signals being effective for:activating a screensaver mode function; and modifying said working screen to appear as one of a plurality of selectable application images on said display screen, each application image containing display indicia representative of information present on said working screen of a corresponding application program when said screensaver function was activated, wherein selected ones of said application images are displayed on said display screen during a continuance of said screensaver mode.
- 27. An information processing system comprising:a system bus; a user input device coupled to said system bus; a processing device coupled to said system bus; a memory unit coupled to said system bus; and a display device coupled to said system bus, said processing device being selectively responsive to program signals from said memory unit for implementing a screensaver technique, said processing device being selectively operable for executing at least one application program and displaying a working screen for said one application to a user on a display screen of a display device, said working screen being continuously changeable in response to user input, said processing device being further selectively operable for activating a screensaver mode function and modifying said working screen to appear as one of a plurality of selectable application images on said display screen, each application image containing display indicia representative of information present on said working screen of a corresponding application program when said screensaver function was activated, wherein selected ones of said application images are displayed on said display screen during a continuance of said screensaver mode.
US Referenced Citations (4)
Number |
Name |
Date |
Kind |
5740549 |
Reilly et al. |
Apr 1998 |
A |
5930501 |
Neil |
Jul 1999 |
A |
6014135 |
Fernandes |
Jan 2000 |
A |
6216141 |
Straub et al. |
Apr 2001 |
B1 |