GB2420198A - Apparatus for transferring desktop environment between computers - Google Patents
Apparatus for transferring desktop environment between computers Download PDFInfo
- Publication number
- GB2420198A GB2420198A GB0523005A GB0523005A GB2420198A GB 2420198 A GB2420198 A GB 2420198A GB 0523005 A GB0523005 A GB 0523005A GB 0523005 A GB0523005 A GB 0523005A GB 2420198 A GB2420198 A GB 2420198A
- Authority
- GB
- United Kingdom
- Prior art keywords
- computer
- working
- environment
- data group
- relevant data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 235000014510 cooky Nutrition 0.000 claims abstract description 12
- 238000012544 monitoring process Methods 0.000 claims description 5
- 230000006870 function Effects 0.000 description 9
- 238000000034 method Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000010354 integration Effects 0.000 description 1
- 239000000047 product Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000008685 targeting Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
- G06F9/4451—User profiles; Roaming
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
- G06F15/177—Initialisation or configuration control
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A portable apparatus 4 is provided with memory which stores software which can authenticate the user and transfer settings and files 12 to or from a computer 1,2,3 to which it is attached. The first time the device is connected to the users main computer it fetches the settings and files it requires and stores them either in a remote location or in the memory of the apparatus. Subsequently the transfer software operates to transfer the users preferred environment to the computer to which it is attached to allow the user to operate on any computer in the same desktop environment. The settings and files which can be transferred include the desktop image, desktop shortcuts and icons; cookies, browser history and bookmarks; email account settings and mail folders; and any documents contained in the "My documents" folder of a users main computer. The transfer of data to the computer may be temporary in which case any files created on the computer are removed when the user disconnects the apparatus or permanent to synchronise the files on several different computers. No applications are transferred to/from the apparatus and the software provides a module to determine compatible applications if a users normal applications are not provided on a computer to which the apparatus is attached.
Description
1 2420198
COMPUTER-WORKING-ENVIRONMENT APPARATUS
1] The present invention is related to a sync device, particularly to one computer transfer computer environment thereof to another in terms of a computer-working-environment apparatus.
2] With the increasing popularity of PCs (personal computers), either desktop PCs or notebook PCs can be found anywhere in our daily lives. Many users have access to at least two computers in their daily lives, often one at home for private use and another at work for business purposes. Businessmen, who often have to work from place to place when traveling for business, often need to use computers to handle certain....
tasks; as such, many airports and hotels provide computers for * businessmen to use. However, as different computers use different operation apparatus and even computers using the same operation * apparatus have different personalized settings and user interfaces, S...
making them difficult for most guest users to use, notebook computers,uu have long since become a necessary piece of equipment for most businessmen. Many manufacturers of notebook computers thus look at businessmen as their primary customers, targeting their products at those people who need to use the same computer at different locations.
3] However, no matter how light and compact a notebook computer is, it still carries some weight and occupies some space, with the technology for its portability having reached a bottleneck. At present, the most portable notebook computer weighs approximately one kilogram, which is not much a burden when compared to the total weight of one's luggage; but as the notebook computer is a delicate electronic device which may be easily damaged if transported with checked-in luggage, it is normally hand-carried by the user, and may thus become a significant burden. In addition, the problem of power supply is another major factor that limits the portability and mobility of the notebook computer. Of course, there are other technologies dedicated to addressing these problems of portability and mobility, for example, there are PDAs (personal digital assistants) of various makes on the market that can meet the user's demand for processing digital tasks on-the-go. Yet the functions of PDAs, no matter how sophisticated they may be, cannot entirely replace those of the computer, so PDAs can, normally, just serve as a supplement to the computer.
4] On the other hand, aside from the continuous progress in computer technology, the rapid advancement of Internet technology is: another major factor contributing to the popularity of personal computers.
The Internet has made it possible for computers to communicate with each other, access each other's data, and make exchanges. For users having access to several computers, however, a problem arises from computer usage. As aforementioned, every computer has its own.
personalized settings, such as e-mail account settings, "bookmarks", "history" and "cookies" for web browsers, or different desktops, shortcuts, etc., all of which are interfaces or programs frequently used by the user; thus, in a very literary sense, we can say that such settings are the "working environment" of a computer.
5] When a user has to use more than one computer, he or she naturally wishes to integrate all the computers different sets of personalized settings into one so that he can always have the same "working environment" when using different computers. But integrating the sets of personalized settings of several computers is not an easy task; for instance, when the user adds a web address to the "bookmark" of the web browser on the first computer, there is no existing technology that can automatically add the web address to the bookmark of the web browser on the second computer, so the user must manually add the web address onto the second computer. Moreover, there are many personalized settings which cannot be added manually, such as the "cookies" stored in the user's computer hard drive by some website servers to identify the individual terminal computer or to record the user's personalized settings of that particular web page, for cookies are one type of personalized settings that cannot be added manually. Thus, personalized settings on the same computer (such as the first computer) can be changed, but implementing these changes one by one on another *.. SS.
computer (such as the second computer) can be a cumbersome job, not to * mention unworkable when it comes to changes that cannot be manually implemented by the user.
****** [0006] In addition to personalized settings, users often have to process the same files over several computers. Generally speaking, most people.
save their files in folders that carry the name over different computers, for *: * instance, the most frequently used folder name "My Documents" is the same on every computer. When a user works on the first computer, some of the files may be opened and updated, and when he works on the second computer, some other files may also be opened and updated. In other words, the files in the first and the second computers may have the same name but are in different versions that it will be impossible for you to copy all the files from the first to the second computer (or vice versa) in one go, as it will lead to the overwriting of the newer versions of certain files of the second computer by the older versions of such files in the first computer. How to maintain the files on different computers in the most updated state while preventing newer versions from being overwritten by older ones accidentally is one of the focuses of the present invention.
7] In sum, as computers and the Internet are becoming more and more popular, the major aim of the present invention is to improve the inadequacies of the prior art by integrating several computer "working environments" and files into one so that users having access to several computers may have the same "working environment" over different computers at different locations.
8] The aim of the invention is to provide a solution for users having access to several computers to have the same "working environment" over different computers at different locations.
9] Another aim of the invention is to provide an alternative solution:. *.:.
to the problem of limited portability and mobility of prior art notebook * computers. * *S.*** [0010] Still another aim of the invention is to improve the inadequacies i....
of the prior art in terms of the ability (or "inability") to integrate different * * *.** "working environments" and files for users having access to several:: computers.
1] The present invention provides a computer-working -environment apparatus that can be used on and transferred between pluralities of computers. The apparatus includes: a memory chip, a computer-workingenvironment software and one identification code. The computer-workingenvironment software is stored in the memory, and will be automatically installed on a computer when the computer-working -environment apparatus is connected to the computer for the first time.
The identification code is stored in the memory, and the computer-workingenvironment software installed in the computer needs to verify the identification code from the connected computer-working -environment apparatus to activate the apparatus. In the process, as the computer-working-environment apparatus is connected to the first computer, the computer-working-environment software can store a plurality of data relevant to the first "working environment" as presented by the first computer; subsequently, when the computer-working -environment apparatus is connected to the second computer, the data will be read and then input into the second computer so that the second computer can be operated as in the "working environment" of the first computer.
2] Through this computer-working-environment apparatus, the problem of integrating computer "working environments" and files into:...:.
one for users having access to several computers can be solved. In * addition to offering the users the benefit of a highly portable favorite *..S*S personal computer-working-environment apparatus that can be S.....
simulated and used on different computers, the present invention can S...
also effectively and substantially synchronize the updating of a plurality * of computers, significantly increasing the efficiency of data updating and *: *: : file integration.
3] The above features of the present invention will be more clearly understood from consideration of the following descriptions in connection with accompanying drawings in which: [0014] FIG. 1 illustrates several computers may be convenient to make a second computer having the same computer working environment as his first computer by means of the computer-working-environment apparatus according to the present invention; [0015] FIG. 2 shows computer working environment while the computerworking-environment apparatus is connected to the first computer; and [0016] FIG. 3 shows computer working environment while the computerworking-environment apparatus is connected to the second computer after fetching the first relevant data group.
7] Please refer to FIG. 1 for the present invention's computerworking-environment apparatus, which is designed to be used on and transferred among pluralities of computers. For example, a first computer 1, a second computer 2 and a third computer 3 all of them have different sets of personalized settings, which results in the three computers having three different "working environments", hereunder referred to as the first "working environment" 11, the second "working *.S*SU environment" 21 and the third "working environment" 31 respectively. If the first computer 1 is the computer most frequently used by the user, the second computer 2 and the third computer 3 can be synchronized to: present the first "working environment" 11 with the use of the present p,. : invention's computer-working-environment apparatus. In other words, * : : :* through the present invention's computer-working-environment * :: apparatus 4, the second computer 2 and the third computer 3 can be operated in the first "working environment" 11. The aforementioned first "working environment" 11 includes relevant "environment" settings, such as the desktop, web browser, e-mail account and other specific files.
8] The embodiments of computer-working-environment apparatus 4 according to the present invention is not restricted, or limited in anyway but focus on high portability. The apparatus 4 can be selected one from the group consisting of USB pen-drives, SD memory cards, SM memory cards, CF memory cards, XD memory cards, card readers with built in memory, and PDAs. The computer-working-environment apparatus 4 includes a memory chip 41, a computer-working-environment software 42 and an identification code 43. Referring to FIG. 1, a computer-working -environment software 42 is stored in the memory chip 41, and when the computer-working-environment apparatus 4 is connected to any one of computers 1, 2, or 3 for the first time, the computer-working -environment software 42 will be automatically installed in the computer which is connected to the computer-working-environment apparatus 4.
Identification code 43 is stored in memory 41, and the computer-working -environment software 42 verifies the identification code 43.
9] In the process, when the computer-working-environment apparatus 4 is connected to the first computer 1, the computer-working -environment software 42 store a plurality of data relevant to the first "working environment" 11 as presented by the first computer 1 (*for: brevity, the phrase, "a plurality of data relevant to the first "working *SS...
environment" 11", will hereinafter be referred to as the first relevant data: S.....
group 12"). S...
0] In one embodiment, the first relevant data group 12 is stored in the memory chip 41 of the computer-working-environment apparatus 4, S. or, in another embodiment, the first relevant data group 12 is stored in a server 6 through the Internet. Subsequently, when the computer-working -environment apparatus 4 is connected to the second computer 2, the first relevant data group 12 will be restored into the second computer 2 so that the second computer 2 can operate in the first "working environment" 11. By the same principle, when the computer-working -environment apparatus 4 is connected to the third computer 3, the first relevant data group 12 is restored into the third computer 3 so that the third computer 3 can also operate in the first "working environment" 11.
1] As illustrated in FIG. 1, the computer-working-environment apparatus 4 is a medium that carries the computer-working -environment software 42. Only a user has to do is carry the computerworking-environment apparatus 4 having the first relevant data group 12 to a different computer, which the user work at. After the computerworking-environment software 42 is automatically installed, the first "working environment" 11 of the first computer will be transferred to the computer to be worked and presented as it is. In this transferred "working environment", all the user's personalized settings such as e- mail account settings, "bookmarks", "history" and "cookies" for web browsers, desktops, shortcuts, and work-related documents and files will be presented as they are on the first computer 1. In view of this, the present invention certainly provides a solution to the prior art, : enabling the user to use the same computer "working environment," (the first "working environment" 11) over different computers. .....
2] FIG. 2 shows the computer-working-environment apparatus a being connected to the first computer 1. As illustrated in FIG. 2, after the computer-working-environment apparatus 4 is connected to the first a...: computer 1, the computer-working-environment software 42 is installed in the first computer 1. The computer-working-environment software 42 includes a data fetch module 421 to be used for fetching the first relevant data group 12. The first relevant data group 12 includes a desktop image file 121, a desktop shortcut setting file 122 and a desktop shortcut icon file 123 of the first computer 1. The desktop image file 121, desktop shortcut setting file 122 and desktop shortcut icon file 123 are relevant to the desktop settings of the first computer 1. The relevant search paths and target file names for acquiring files are built into the data fetch module 421. In one embodiment, the data fetch module 421 acquires the storage location of the desktop image file 121 from the system registry table therefrom acquiring desktop image file 121. Data fetch module 421 can further acquire the storage location of the desktop folder from the system registry table, and then scan the desktop folder to acquire the desktop shortcut setting file 122 and the desktop shortcut icon file 123.
3] Still referring to FIG. 2, which shows that the first relevant data group 12 also includes a cookie 124, browser history 125 and a bookmark 126 of the web browser of the first computer 1. The cookie 124, the browser history 125 and the bookmark 126 are relevant to the web browser settings of the first computer 1. The relevant search paths and target file names for acquiring the files are built into the data fetch module 421. In one embodiment the data fetch module 421 acquires the si. s* storage locations of the cookie 124, the browser history 125 and the bookmark 126 from the system registry table, and goes on to acquire the cookie 124, the browser history 125 and the bookmark 126.
4] Please refer to FIG. 2, which shows that the first relevant data group 12 also includes an e-mail account setting file 127 and at least one message file 128 of the first computer 1. The E-mail account setting file 127 and the message file 128 are relevant to the e-mail account settings of the first computer 1. The relevant search paths and target file names for acquiring the files are built into the data fetch module 421. In one embodiment, the data fetch module 421 acquires the storage locations of the e-mail account setting file 127 and the message file 128 from the system registry table, and goes on to acquire the e-mail account setting file 127 and the message file 128.
5] The first relevant data group 12 also includes a My Documents" folder 129 of the first computer 1, as is shown in FIG. 2. Considering that many users customarily save frequently used word files and data in the My Documents folder 129, one embodiment of the present invention is to set "the data fetch module 421 acquiring and saving data fetch module 421" as a default action. In other embodiments, an editing module 422 can be used to change the default action of data fetch module 421 in order to specify the relevant path and name of the files to be acquired and saved.
6] Noticed that the aforementioned first relevant data group 12 of the first "working environment" 11, such as the desktop file 121, the desktop shortcut setting file 122, the desktop shortcut icon file 123, the cookies 124, the browser historyl25, the 126, the e-mail account setting file 127, the e-mail folder 128, and the My Documents folder 129, are, *II.uS respectively, stored in the first computer 1 by various paths according to * : operating system and program configurations of the first computer 1. To S....
facilitate the subsequent illustrations, the area for first relevant data: 0S*aS* group 12 stored is called Public Space 13. Public Space 13 contains the individual active file paths of the first relevant data group 12. * a..
7] In FIG. 2, computer-working-environment software 42 also ** further includes a password module 423 and a monitoring module 424.
Accordingly, the computer-working-environment apparatus 4 itself though does not possess operation functions as that of a conventional computing provided, it, however, can make a computer be transformed into the first "working environment" 11 as user customarily used if and only if the computer is connected with the computer-working -environment apparatus 4.
8] Thus, to enhance the security of the computer-working -environment apparatus 4 and to prevent the personal data of the user from being stolen, a password module 423 and a monitoring module 424 are used according to the present invention. When the computer-working -environment apparatus 4 is connected to the computer, the password module 423 will display a dialog box to request a password 51 to be inputted. If the password 51 keyed matches with the predetermined user password 52, the computer-working-environment software 42 will active.
In one embodiment of the present invention, the password module 423 also provides functions of password editing and hint. By means of an editing module 422, the user can modify the user password 52 and/or the hint for reminding user password 52.
9] Monitoring module 424 is used to monitor the identification code 43 in the computer-working-environment apparatus 4 with the S...
corresponding code 53, which is recorded in the computer when the * :.
computer-working-environment software 42 is installed. If the S.....
identification code 43 matches with the corresponding code 53, the:..:.
computer can be as operated at the "working environment" as the first S...
computer 1. If the computer-working-environment apparatus 4 is disconnected with the computer, the "working environment" will be lost form the computer.
0] After the data fetch module 421 acquires the first relevant data group 12 from the first computer 1, the first relevant data group 12 is stored in the memory chip 41 of the computer-working-environment apparatus 4 by using a data transferring module 425. Or, in another embodiment, the first relevant data group 12 is stored in the server 6 through the Internet.
1] Please refer to FIG. 3, which shown the computer-working -environment apparatus in FIG. 1 as being connected to the second computer. As is illustrated in FIG. 3, after the computer-working -environment apparatus 4 get the first relevant data group 12, the computer-working-environment software 42 is installed in the second computer 2. The second computer 2 represents a computer that is temporarily or less frequently used.
2] As is illustrated in FIG. 1, the second computer 2 originally has a default second "working environment" 21; a plurality of data relevant to the second "working environment" 21 (hereafter referred to as "the second relevant data group 22"), which is illustrated in FIG. 3. The second relevant data group 22 is stored in the public space 23, where the public space 2 includes the paths of personalized file settings of the second computer 2, such as e-mail account settings, "bookmarks" settings, " S...
"browser history," and "cookies" for web browsers, or desktops, shortcuts, . :.
and work-related documents and files. . I.....
3] When the computer-working-environment apparatus 4 is h.:.
connected to the second computer 2, the password module 423 and the S...
monitoring module 424 are used to check as before to prevent personal data from being stolen. When the computer-working-environment software 42 is activated, the first relevant data group 12, which is relevant to the first "working environment" 11, is read, as shown in FIG. 3, by a data receiving module 426. Thereafter, the first relevant data group 12 is being transferred to a private space 24 of the second computer 2.
The private space 24 and a temporary storage space 25 are created by the computer-working-environment software 42. The data fetch module 421 then transfers the second relevant data group 22 stored at the public space 23 to a temporary storage space 25. Thereafter, the user can operate the second computer 2 as he is work in the first "working environment 11." [0034] After the user finishes his work on the second computer 2 and prepares to remove the computer-working-environment apparatus 4, a virtual mode or a sync mode can be selected according to whether the first "working environment" 11 is removed or not. In a "virtual mode," a removal procedure is made. Because many changes might have occurred to the first relevant data group 12 stored in the public space 23 while the user was working, means the first relevant data group 12 is updated. The computer-working-environment software 42 then execute and make the data fetch module 421 to acquire the first relevant data group 12 and uses a data transferring module 425 to transfer the first relevant data group to the memory chip 41 or the server 6 for storage in order to:...:.
maintain the most updated version of the first "working environment" 11 * in the computer-working-environment apparatus 4. In the removal I.....
procedure, the computer-working-environment software 42 will restore S.... .
the second relevant data group 22 in a temporary storage space 25 into *1SS the public space 23 so that the second computer 22 can be returned to its. . ..
original second "working environment" 21, please see FIG. 1. It will also: delete the private space 24, the temporary storage space 25 and all the data established by the user so that other subsequent users cannot use the aforementioned personal data when working on the second computer 2. This virtual mode is suitable for occasions when the user is traveling and needs to use a public or borrowed computer temporarily.
5] In a "sync mode, " the removal procedures do not restore the second relevant data group 22 into public space 23 so that the second computer 2 can still operate in the first "working environment" 11 after the computer-working-environment apparatus 4 is removed. This sync mode is suitable for users who own several computers such as the first computer 1, the second computer 2 and the third computer 3 in FIG. 1.
Since all belong to the same user and there is no worry about personal data being stolen; this sync mode can also effectively solve the problems of the prior art as described above in terms of the difficulty in integrating various computer "working environments" and files for users having several computers. In the sync mode, the private space 24, the temporary storage space 25 and all the data within can be optional removed.
6] As shown in FIG. 3, the virtual mode and the sync mode can be selected from dialog box, which is set by a mode selection module 472 in the computer-working-environment software 42. In another embodiment, the mode selection module 427 offers the selection of a "dummy mode" too. When the dummy mode is selected, the computer-working S...
-environment software 42 does not launch its synchronizing functions, . :.
but allows the user to change some settings. :...:.
7] When the user goes back to work on the first computer 1, " connecting the computer-working-environment apparatus 4 to the first *SS.
computer 1, he or she will be allowed to choose among the * :: aforementioned virtual mode, sync mode or dummy mode. Of course, when the aforementioned first computer 1 is among the user's most frequently used computers, the user can normally select the sync mode to maintain the most updated first "working environment" 11 on the first computer 1.
8] A point worthy of mentioning is that the computer-working -environment software 42 of the present invention also has a substitute program search function. For instance, if the web browsers in the first computer 1 and the second computer 2 are different as is the case when the second "working environment" 21 uses Microsoft Internet Explorer and the first "working environment" 11 uses Netscape, then, taking FIG. 3 as an example where the desktop shortcut file 122 represents the shortcut for launching the Netscape program, the computer-working -environment software 42 can launch the substitute program search function to direct this desktop shortcut file 122 to the Microsoft Internet Explorer program in the second computer 2.
9] The substitute program search function of computer-working -environment software 42 can be further illustrated as follows: if the email software in the second computer 2 and the first computer 1 are different as is the case when the second "working environment" 21 uses Outlook and the first "working environment" 11 uses Outlook Express, then, taking FIG. 3 as an example where a message file 128 has been launched in its original first "working environment" 11 by. :.
Outlook Express, the computer-working -environment software 42 will:.,.:.
launch the substitute program search function to open the message file:... .
128 in Outlook as the second computer does not have the S..
Outlook Express software. ::;:; [0040] The aforementioned substitute program search function is realized by having a program substitute module 428 in the computer-working - environment software 42. As shown in FIG. 3, the program substitution module 428 makes a comparison between the application programs for all the data and files in the first relevant data group 12 and those stored in the OS 26 in the second computer 2, and carries out the aforementioned program substitution action according to a default substitution guideline list.
1] Briefly, the present invention certainly provides a solution for users to use the same computer-working -environment to handle tasks over different computers at different locations. The present invention is a more effective alternative solution to the prior art concerning the portability of notebook computers. Through the computer-working -environment apparatus, the problem of the prior art concerning the difficultly in integrating computer "working environments" and files for users having access to several computers can be improved. Therefore, in addition to offering the benefit of high portability for users to simulate a familiar set of computer-working -environment settings on different computers, the present invention can synchronize and integrate the filesand data of a plurality of computers more effectively and efficiently. * S IS**
S S...
S * ** * S
S..... * S
S..... * S...
S S *55S * ..* * S S *S S
Claims (19)
- Claims: 1. A computer-working-environment apparatus characterized by: amemory chip; a computer-working-environment software stored in said memory chip for installing in a computer which connects with said computer-working- environment apparatus; and an identification code stored in said memory chip as a key of launching a computer-working-environment of a computer which connects with said computer-working-environment apparatus; whereby, when said computer-working-environment apparatus is connected to a first computer, said computer-working-environment software fetches a first relevant data group from said first computer and S.....then stores into said computer-working-environment apparatus, : S.....thereafter said first relevant data group will be loaded by said computerworking-environment software into a second computer which. . connects with said computer-working-environment apparatus. *: :
- 2. The computer-working-environment apparatus according to Claim 1, characterized in that said first relevant data group includes a desktop image file of said first computer.
- 3. The computer-working-environment apparatus according to Claim 1, characterized in that said first relevant data group includes a desktop shortcut setting file of said first computer.
- 4. The computer-working-environment apparatus according to Claim 1, characterized in that said first relevant data group includes a desktop shortcut icon file of said first computer.
- 5. The computer-working-environment apparatus according to Claim 1, characterized in that said first relevant data group includes a cookie, a browser history, and a bookmark of said first computer.
- 6. The computer-working -environment apparatus according to Claim 1, characterized in that said first relevant data group includes an e-mail account setting file of said first computer.
- 7. The computer-working-environment apparatus according to Claim 1, characterized in that said first relevant data group includes an e-mail folder of said first computer.
- 8. The computer-working-environment apparatus according to Claim 1, characterized in that said first relevant data group includes a "My Documents" folder of said first computer.
- 9. The computer-working-environment apparatus according to Claim 1, characterized in that said computer-working-environment * software includes a data fetch module for fetching said first relevant data group. : S.....
- 10. The computer-working-environment apparatus according to I..Claim 1, characterized in that said computer-working-environment 5....5 software includes a virtual mode and a sync mode for a user to select.
- 11. The computer-working-environment apparatus according to Claim 10, characterized in that once said sync mode is selected, an original working environment of said second computer will be overwritten by said first relevant data group.
- 12. The computer-working-environment apparatus according to Claim 10, characterized in that once said virtual mode is selected, an original working environment of said second computer is temporary replaced by said first relevant data group and said original working environment of said second computer will be recovered when said "working environment" apparatus is removed from said second computer.
- 13. The computer-working -environment apparatus according to Claim 1, characterized in that said first relevant data group is stored into said memory chip by means of said working environment" software.
- 14. The computer-working -environment apparatus according to Claim 1, characterized in that said first relevant data group is stored into a server by means of said working environment" software through Internet or intranet.
- 15. The computer-working -environment apparatus according to Claim 1, characterized in that said working environment" software includes a module for persistently monitoring said identification code.
- 16. The computer-working -environment apparatus according to...Claim 1, characterized in that wherein said "working environment" a software includes a password module for checking the user -S...identification, and said "working environment" software is activated only if the user inputs a correct password. 5.-
- 17. The computer-working -environment apparatus according to:S;: Claim 1, characterized in that wherein said "working environment" software includes a data transferring module to transfer updated first relevant data group to the memory chip of the computer-working -environment apparatus.
- 18. The computer-working-environment apparatus according to Claim 1, characterized in that wherein said "working environment" software includes a substitute program search module to search a relevant application program from the second computer while is desired to execute an application from the first relevant data group but said second computer does not meet.
- 19. The computer-working-environment apparatus substantially as described hereinbefore with reference to and as illustrated in Figure 1 to Figure 3 of the accompanying drawings.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW093134697A TW200615797A (en) | 2004-11-12 | 2004-11-12 | Computer-working-environment apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0523005D0 GB0523005D0 (en) | 2005-12-21 |
GB2420198A true GB2420198A (en) | 2006-05-17 |
Family
ID=35516750
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0523005A Pending GB2420198A (en) | 2004-11-12 | 2005-11-11 | Apparatus for transferring desktop environment between computers |
Country Status (6)
Country | Link |
---|---|
JP (1) | JP2006146912A (en) |
DE (1) | DE102005052944A1 (en) |
GB (1) | GB2420198A (en) |
IT (1) | ITMI20052120A1 (en) |
NL (1) | NL1030343C1 (en) |
TW (1) | TW200615797A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2424095A (en) * | 2005-03-07 | 2006-09-13 | Unisvr Global Information Tech | Method of using software on a portable storage device |
US7523122B2 (en) | 2006-09-25 | 2009-04-21 | Microsoft Corporation | Automatic discovery of application settings' storage locations |
WO2011057409A1 (en) | 2009-11-13 | 2011-05-19 | Memory Experts International Inc. | Device and method for verifying connectivity |
US8266350B2 (en) | 2009-09-30 | 2012-09-11 | Imation Corp. | Method and system for supporting portable desktop |
US8370922B1 (en) | 2011-09-30 | 2013-02-05 | Kaspersky Lab Zao | Portable security device and methods for dynamically configuring network security settings |
US8516236B2 (en) | 2009-09-30 | 2013-08-20 | Imation Corp. | Portable desktop device and method of host computer system hardware recognition and configuration |
US8555376B2 (en) | 2009-09-30 | 2013-10-08 | Imation Corp. | Method and system for supporting portable desktop with enhanced functionality |
US8601532B2 (en) | 2009-09-30 | 2013-12-03 | Imation Corp. | Method and system for provisioning portable desktops |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008046854A (en) * | 2006-08-16 | 2008-02-28 | Kyocera Mita Corp | Software authentication apparatus and image forming apparatus |
JP4241783B2 (en) | 2006-08-18 | 2009-03-18 | コニカミノルタビジネステクノロジーズ株式会社 | Image processing apparatus, image processing system, program, and Web browser setting information transmission method |
JP4916020B2 (en) * | 2007-07-25 | 2012-04-11 | 株式会社日立情報制御ソリューションズ | Remote access system, auxiliary storage device used therefor, and remote access method |
US7752285B2 (en) * | 2007-09-17 | 2010-07-06 | Yahoo! Inc. | Shortcut sets for controlled environments |
KR20100028163A (en) * | 2008-09-04 | 2010-03-12 | 주식회사 케이티테크 | Method for providing contents using portable terminal |
JP5350024B2 (en) * | 2009-03-06 | 2013-11-27 | 株式会社日立製作所 | Application program operating state control system |
JP5608484B2 (en) * | 2010-09-06 | 2014-10-15 | 株式会社リョーイン | Storage device and network connection setting method |
JP5345998B2 (en) * | 2010-11-16 | 2013-11-20 | レノボ・シンガポール・プライベート・リミテッド | Computer system control method and computer |
JP6572821B2 (en) * | 2016-04-28 | 2019-09-11 | 京セラドキュメントソリューションズ株式会社 | Information processing apparatus and information processing program |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020135613A1 (en) * | 2001-03-21 | 2002-09-26 | O'hara Sean M. | Transfer of personal information between computing systems |
US20020147912A1 (en) * | 2000-10-27 | 2002-10-10 | Shimon Shmueli | Preference portability for computing |
JP2004070467A (en) * | 2002-08-02 | 2004-03-04 | Kozo Niimura | External storage device and computer system using same |
US20040139309A1 (en) * | 2002-07-23 | 2004-07-15 | Twingo Systems | Method, system, apparatus and program product for temporary personalization of a computer terminal |
JP2004246720A (en) * | 2003-02-14 | 2004-09-02 | Fujitsu Ltd | Information processing device, information processing method and program |
-
2004
- 2004-11-12 TW TW093134697A patent/TW200615797A/en unknown
-
2005
- 2005-11-03 DE DE102005052944A patent/DE102005052944A1/en not_active Ceased
- 2005-11-03 NL NL1030343A patent/NL1030343C1/en not_active IP Right Cessation
- 2005-11-08 IT IT002120A patent/ITMI20052120A1/en unknown
- 2005-11-10 JP JP2005326507A patent/JP2006146912A/en active Pending
- 2005-11-11 GB GB0523005A patent/GB2420198A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020147912A1 (en) * | 2000-10-27 | 2002-10-10 | Shimon Shmueli | Preference portability for computing |
US20020135613A1 (en) * | 2001-03-21 | 2002-09-26 | O'hara Sean M. | Transfer of personal information between computing systems |
US20040139309A1 (en) * | 2002-07-23 | 2004-07-15 | Twingo Systems | Method, system, apparatus and program product for temporary personalization of a computer terminal |
JP2004070467A (en) * | 2002-08-02 | 2004-03-04 | Kozo Niimura | External storage device and computer system using same |
JP2004246720A (en) * | 2003-02-14 | 2004-09-02 | Fujitsu Ltd | Information processing device, information processing method and program |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2424095A (en) * | 2005-03-07 | 2006-09-13 | Unisvr Global Information Tech | Method of using software on a portable storage device |
US7523122B2 (en) | 2006-09-25 | 2009-04-21 | Microsoft Corporation | Automatic discovery of application settings' storage locations |
US9026776B2 (en) | 2009-09-30 | 2015-05-05 | Imation Corp. | Portable desktop device and method of host computer system hardware recognition and configuration |
US8266350B2 (en) | 2009-09-30 | 2012-09-11 | Imation Corp. | Method and system for supporting portable desktop |
US9792441B2 (en) | 2009-09-30 | 2017-10-17 | Kingston Digital, Inc. | Portable desktop device and method of host computer system hardware recognition and configuration |
US9268943B2 (en) | 2009-09-30 | 2016-02-23 | Imation Corp. | Portable desktop device and method of host computer system hardware recognition and configuration |
US8516236B2 (en) | 2009-09-30 | 2013-08-20 | Imation Corp. | Portable desktop device and method of host computer system hardware recognition and configuration |
US8555376B2 (en) | 2009-09-30 | 2013-10-08 | Imation Corp. | Method and system for supporting portable desktop with enhanced functionality |
US8601532B2 (en) | 2009-09-30 | 2013-12-03 | Imation Corp. | Method and system for provisioning portable desktops |
WO2011057409A1 (en) | 2009-11-13 | 2011-05-19 | Memory Experts International Inc. | Device and method for verifying connectivity |
US9087197B2 (en) | 2009-11-13 | 2015-07-21 | Imation Corp. | Device and method for verifying connectivity |
US8370922B1 (en) | 2011-09-30 | 2013-02-05 | Kaspersky Lab Zao | Portable security device and methods for dynamically configuring network security settings |
US8973151B2 (en) | 2011-09-30 | 2015-03-03 | Kaspersky Lab Zao | Portable security device and methods for secure communication |
US8522008B2 (en) | 2011-09-30 | 2013-08-27 | Kaspersky Lab Zao | Portable security device and methods of user authentication |
US8381282B1 (en) | 2011-09-30 | 2013-02-19 | Kaspersky Lab Zao | Portable security device and methods for maintenance of authentication information |
US8370918B1 (en) | 2011-09-30 | 2013-02-05 | Kaspersky Lab Zao | Portable security device and methods for providing network security |
Also Published As
Publication number | Publication date |
---|---|
NL1030343C1 (en) | 2006-05-15 |
JP2006146912A (en) | 2006-06-08 |
DE102005052944A1 (en) | 2006-05-24 |
GB0523005D0 (en) | 2005-12-21 |
TW200615797A (en) | 2006-05-16 |
ITMI20052120A1 (en) | 2006-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2420198A (en) | Apparatus for transferring desktop environment between computers | |
CN100385386C (en) | Display picture during period of leading and turn-off computer | |
US7606733B2 (en) | Account portability for computing | |
US8117608B1 (en) | System and method of providing mobility to personal computers | |
US8468136B2 (en) | Efficient data backup | |
US20070083906A1 (en) | Content-based navigation and launching on mobile devices | |
US7941659B2 (en) | External memory enabling a user to select an application program to be launched before launching an operating system | |
US9280423B1 (en) | Mounting block level backup images | |
US20040225876A1 (en) | Application software configured to work with two operating systems | |
EP2511859B1 (en) | User information registration program and user information registration method | |
JP7390071B2 (en) | Document processing devices, document processing methods, and programs | |
JP2003108385A (en) | Computer system utilizing detachable external storage device and method for utilizing computer thereof | |
US20070033386A1 (en) | Computer working environment apparatus | |
JP6930278B2 (en) | Multifunction device, reboot method, and computer program | |
US10061653B1 (en) | Method to expose files on top of a virtual volume | |
JP7054011B2 (en) | Information processing system, information processing device, information processing method, program | |
KR20100066735A (en) | An automatic sync or back-up system using a removable storage device and the method thereof | |
Miller | Absolute beginner's guide to computer basics | |
Satheesh Kumar et al. | An agent based tool for windows mobile forensics | |
Smith et al. | Identification of forensic artifacts in VMWare virtualized computing | |
Adonis | Mastering Information Technology for CXC CSEC CAPE | |
Miller | Computer Basics Absolute Beginner's Guide, Windows 10 Edition (includes Content Update Program) | |
Corbin | The Google Chrome operating system forensic artifacts | |
JP2024094940A (en) | Information processing system, method for controlling information processing system, and program | |
Le | Windows Phone 7: implications for digital forensic investigators |