USER INTERFACE CONTROLS FOR A COMPUTER SYSTEM

    公开(公告)号:GB2327836A

    公开(公告)日:1999-02-03

    申请号:GB9716304

    申请日:1997-08-04

    Applicant: IBM

    Abstract: A user interface builder provides support for creation of customised user interfaces, enabling users to associate images, animation, sound clips and other media with specific predefined states of a user interface control. A set of object classes for each control predefined within the user interface builder include a first class defining the functional behaviour and a comprehensive state model for the control, and a second class which encapsulates property attributes which may be set by a user to be associated with specific states of the control. In particular, desired graphics images, audio and animation sequences can be associated with a control via simple GUI interaction, avoiding the need for an interface creator to write code for standard interface control functions and so enabling easy creation of interfaces with semantic consistency and customised appearance.

    4.
    发明专利
    未知

    公开(公告)号:DE2749710A1

    公开(公告)日:1978-05-24

    申请号:DE2749710

    申请日:1977-11-07

    Applicant: IBM

    Abstract: A data processing system is described which issues value documents e.g. tickets or information under the control of output instructions and is designed to prevent a person attempting fraud using an unauthorized program obtaining the value documents or information. The system includes a data processor controlling output units which can issue value documents or information and data storage. The data storage is divided into a secure store containing the output instructions arranged to make tampering difficult and a free storage into which an operator may load a program. Security logic is provided to check that an output instruction has originated in the secure store and to prevent operation of an output unit which receives output instructions from free storage. This makes it difficult for a person attempting fraud to produce value documents or information by loading a program into free storage. The secure storage is preferably a read only store programmed during manufacture. When secure and free storage share a common memory bus, the security logic monitors addresses used to fetch instructions.

Patent Agency Ranking