Method for authenticating modification of a cursor image

Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

709227, 709203, 345339, G06F 1516

Patent

active

060650575

ABSTRACT:
A system for modifying a cursor image, as displayed on a video monitor of a remote terminal, to a specific image having a desired shape and appearance. The system stores cursor image data corresponding to the specific image, and a cursor display code. The cursor display code contains information in response to which the cursor image is modified to the specific image. A server computer transmits specified information to the remote terminal. The information includes at least one cursor display instruction. The cursor display instruction is operable to modify, in conjunction with the cursor information and the cursor image data, a cursor image displayed by a display of the remote terminal in the shape and appearance of the specific image.

REFERENCES:
patent: 4672575 (1987-06-01), Stephens
patent: 4841291 (1989-06-01), Swix et al.
patent: 4984152 (1991-01-01), Muller
patent: 5157768 (1992-10-01), Hoeber et al.
patent: 5179656 (1993-01-01), Lisle
patent: 5347628 (1994-09-01), Brewer et al.
patent: 5544295 (1996-08-01), Capps
patent: 5559943 (1996-09-01), Cyr et al.
patent: 5559947 (1996-09-01), Wugofski
patent: 5559948 (1996-09-01), Bloomfield et al.
patent: 5572643 (1996-11-01), Judson
patent: 5596694 (1997-01-01), Capps
patent: 5710897 (1998-01-01), Schneider
patent: 5737619 (1998-04-01), Judson
patent: 5740549 (1998-04-01), Reilly et al.
patent: 5801698 (1998-09-01), Vection et al.
patent: 5841970 (1998-11-01), Tabuki
patent: 5923327 (1999-07-01), Smith et al.
patent: 5945989 (1999-08-01), Freishtat et al.
patent: 5959624 (1999-09-01), Johnston, Jr. et al.
patent: 5987134 (1999-11-01), Shin et al.
patent: 5990888 (1999-11-01), Blades et al.
The Java Language Environment--May 1995, A White Paper, by James Gosling and Henry McGilton (65 pp.)
WWW Plug-Ins Companion, Written by Mark R. Brown with Simeon M. Greene, Galen Grimes, John Jung, Bernie Roehl, David Wall and Joe Weber, (21 pp.), 1996.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for authenticating modification of a cursor image does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for authenticating modification of a cursor image, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for authenticating modification of a cursor image will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-268472

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.