Single-step custom configuration of a cloud client device
First Claim
Patent Images
1. A method of a cloud client device comprising:
- monitoring for one or more configuration events of the cloud client device;
identifying a configuration event from the one or more configuration events;
identifying a configuration associated with the configuration event;
determining a first security key associated with the configuration;
comparing the first security key with a stored security key associated with a previous configuration;
configuring the cloud client device in accordance with the configuration based, at least in part, on the comparison of the first security key and the stored security key, wherein the configuration comprises at least an application;
preventing user access to one or more settings of the cloud client device based, at least in part, on the configuration;
comparing an amount of time associated with a presentation of the first security key to a predetermined threshold amount of time;
wherein the configuration event is caused by connection of a local storage device to the cloud client device;
comparing an amount of time that the local storage device has remained connected to the cloud client device since a presentation of the first security key by the local storage device to a predetermined threshold amount of time;
invalidating the first security key based on the comparing of the amount of time; and
communicating to a cloud services system the invalidation of the first security key.
14 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a cloud client device identifies a configuration event. The cloud client device identifies a configuration associated with the configuration event. The cloud client device stores a first security key associated with the configuration and configures the cloud client device in accordance with the configuration.
32 Citations
11 Claims
-
1. A method of a cloud client device comprising:
-
monitoring for one or more configuration events of the cloud client device; identifying a configuration event from the one or more configuration events; identifying a configuration associated with the configuration event; determining a first security key associated with the configuration; comparing the first security key with a stored security key associated with a previous configuration; configuring the cloud client device in accordance with the configuration based, at least in part, on the comparison of the first security key and the stored security key, wherein the configuration comprises at least an application; preventing user access to one or more settings of the cloud client device based, at least in part, on the configuration; comparing an amount of time associated with a presentation of the first security key to a predetermined threshold amount of time; wherein the configuration event is caused by connection of a local storage device to the cloud client device; comparing an amount of time that the local storage device has remained connected to the cloud client device since a presentation of the first security key by the local storage device to a predetermined threshold amount of time; invalidating the first security key based on the comparing of the amount of time; and communicating to a cloud services system the invalidation of the first security key. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of a cloud client device comprising:
-
monitoring for one or more configuration events of the cloud client device; identifying a first configuration event from the one or more configuration events; identifying a first configuration associated with the first configuration event; storing a first security key associated with the first configuration; identifying a second configuration event from the one or more configuration events; identifying a second configuration associated with the second configuration event, wherein a second security key is associated with the second configuration; configuring the cloud client device in accordance with the second configuration based, at least in part, on a comparison of the first security key and the second security key, wherein the configuration comprises at least an application; preventing user access to one or more settings of the cloud client device based, at least in part, on the second configuration; wherein the second configuration event is caused by connection of a local storage device to the cloud client device; comparing an amount of time that the local storage device has remained connected to the cloud client device since a presentation of the second security key by the local storage device to a predetermined threshold amount of time; invaliding the second security key based on the comparing of the amount of time; and communicating to a cloud services system the invalidation of the second security key. - View Dependent Claims (8, 9, 10, 11)
-
Specification