Networked device access control
First Claim
1. A method of securely enabling remote computer logins, comprising:
- receiving, via a wireless network, confirmation of a detected and authenticated presence of a user at a fixed remote location away from a computer apparatus;
initiating booting, based on receiving confirmation of the detected and authenticated presence of the user at the fixed remote location, of the computer apparatus in a protected workstate that prevents acceptance of a key input to the computer apparatus while the user is remote and until a local presence of the user is detected and authenticated;
receiving biometric information of the user;
authenticating the local presence of the user based on the biometric information of the user;
locally logging the user into the computer apparatus to place the computer apparatus in an unprotected workstate, in response to authenticating the local presence of the user;
accepting a key input, by the computer apparatus in the unprotected workstate;
making accessible the computer apparatus to the user upon unprotecting of the protected workstate of the computer apparatus;
initiating booting of a plurality of computer apparatuses in a protected workstate that prevents access to the plurality of computer apparatuses until a local presence of the user is confirmed;
placing each of the plurality of computer apparatuses in an unprotected workstate upon confirmation of the local presence of the user;
enabling the user to access, upon unprotecting of the protected workstate, each of the plurality of computer apparatuses; and
enabling another user to access the computer apparatus when the protected workstate of the computer apparatus is unprotected.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer apparatus is remotely initiated. Confirmation of a detected and authenticated presence of a user remote from the computer apparatus is detected and confirmed via a wireless network. Booting of the computer apparatus is initiated based on receiving confirmation of the detected and authenticated presence of the user remote from the computer apparatus. The computer apparatus is booted in a protected workstate that prevents access to the computer apparatus while the user is remote and until a local presence of the user is detected and authenticated. The computer apparatus is operable to be unprotected upon confirmation of the local presence of the user. The computer apparatus is also operable to be accessible to the user upon unprotecting the workstate of the computer apparatus.
-
Citations
17 Claims
-
1. A method of securely enabling remote computer logins, comprising:
-
receiving, via a wireless network, confirmation of a detected and authenticated presence of a user at a fixed remote location away from a computer apparatus; initiating booting, based on receiving confirmation of the detected and authenticated presence of the user at the fixed remote location, of the computer apparatus in a protected workstate that prevents acceptance of a key input to the computer apparatus while the user is remote and until a local presence of the user is detected and authenticated; receiving biometric information of the user; authenticating the local presence of the user based on the biometric information of the user; locally logging the user into the computer apparatus to place the computer apparatus in an unprotected workstate, in response to authenticating the local presence of the user; accepting a key input, by the computer apparatus in the unprotected workstate; making accessible the computer apparatus to the user upon unprotecting of the protected workstate of the computer apparatus; initiating booting of a plurality of computer apparatuses in a protected workstate that prevents access to the plurality of computer apparatuses until a local presence of the user is confirmed; placing each of the plurality of computer apparatuses in an unprotected workstate upon confirmation of the local presence of the user; enabling the user to access, upon unprotecting of the protected workstate, each of the plurality of computer apparatuses; and enabling another user to access the computer apparatus when the protected workstate of the computer apparatus is unprotected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer readable storage medium that stores a computer program for securely enabling remote computer logins, the computer program, when executed by a processor, causing a computer apparatus to perform a process comprising:
-
receiving, via a wireless network, confirmation of a detected and authenticated presence of a user at a fixed remote location away from the computer apparatus; initiating booting, based on receiving confirmation of the detected and authenticated presence of the user at the fixed remote location, of the computer apparatus in a protected workstate that prevents acceptance of a key input to the computer apparatus while the user is remote and until a local presence of the user is detected and authenticated; receiving biometric information of the user; authenticating the local presence of the user based on the biometric information of the user; locally logging the user into the computer apparatus to place the computer apparatus in an unprotected workstate, in response to authenticating the local presence of the user; accepting a key input, by the computer apparatus in the unprotected workstate; making accessible the computer apparatus to the user upon unprotecting of the protected workstate of the computer apparatus; initiating booting of a plurality of computer apparatuses in a protected workstate that prevents access to the plurality of computer apparatuses until a local presence of the user is confirmed; placing each of the plurality of computer apparatuses in an unprotected workstate upon confirmation of the local presence of the user; enabling the user to access, upon unprotecting of the protected workstate, each of the plurality of computer apparatuses; and enabling another user to access the computer apparatus when the protected workstate of the computer apparatus is unprotected.
-
-
17. A computer apparatus, comprising:
-
a memory that stores instructions for securely enabling remote computer logins, and a processor that executes the instructions, wherein, when executed by the processor, the instructions cause the processor to perform operations comprising; receiving, via a wireless network, confirmation of a detected and authenticated presence of a user at a fixed remote location away from the computer apparatus; initiating booting, based on receiving confirmation of the detected and authenticated presence of the user at the fixed remote location, of the computer apparatus in a protected workstate that prevents acceptance of a key input to the computer apparatus while the user is remote and until a local presence of the user is detected and authenticated; receiving biometric information of the user; authenticating the local presence of the user based on the biometric information of the user; locally logging the user into the computer apparatus to place the computer apparatus in an unprotected workstate, in response to authenticating the local presence of the user; accepting a key input, by the computer apparatus in the unprotected workstate; making accessible the computer apparatus to the user upon unprotecting of the protected workstate of the computer apparatus; initiating booting of a plurality of computer apparatuses in a protected workstate that prevents access to the plurality of computer apparatuses until a local presence of the user is confirmed; placing each of the plurality of computer apparatuses in an unprotected workstate upon confirmation of the local presence of the user; enabling the user to access, upon unprotecting of the protected workstate, each of the plurality of computer apparatuses; and enabling another user to access the computer apparatus when the protected workstate of the computer apparatus is unprotected.
-
Specification