Portable electronic authorization system and method
First Claim
1. A method for enabling a software module on a computer operated by a user to access restricted information on a server, comprising steps of:
- (A) with an electronic device distinct from the computer, authenticating an identity of the user to determine that the user is permitted to access the restricted information on the server; and
(B) in response to the electronic device authenticating the identity of the user operating the computer, enabling the software module on the computer to access the restricted information on the server.
5 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, an electronic device is used to authenticate an identity of a user to determine that the user is permitted to access restricted information on a server. In response to the electronic device authenticating the identity of the user, a software module on a computer operated by the user is permitted to access the restricted information. In another embodiment, an electronic device is used to authenticate an identity of a user. In response to the electronic device authenticating the identity of the user, the settings on a computer are altered to correspond to settings on the electronic device.
232 Citations
29 Claims
-
1. A method for enabling a software module on a computer operated by a user to access restricted information on a server, comprising steps of:
-
(A) with an electronic device distinct from the computer, authenticating an identity of the user to determine that the user is permitted to access the restricted information on the server; and
(B) in response to the electronic device authenticating the identity of the user operating the computer, enabling the software module on the computer to access the restricted information on the server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for altering settings on a computer to correspond to settings on an electronic device distinct from the computer, comprising steps of:
-
(A) with the electronic device, authenticating an identity of a user to determine that the user is authorized to use the electronic device; and
(B) in response to authenticating the identity of the user to determine that the user is authorized to use the electronic device, altering the settings on the computer to correspond to settings on the electronic device. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 18, 19, 20, 21, 22, 24, 25, 26, 27, 28, 29)
-
-
17. A system for enabling a software module on a computer operated by a user to access restricted information on a server, comprising:
-
an electronic device distinct from the computer, the electronic device including a user-authenticator to authenticate an identity of the user to determine that the user is permitted to access the restricted information on the server; and
means for, in response to the electronic device authenticating the identity of the user operating the computer, enabling the software module on the computer to access the restricted information on the server.
-
-
23. A system for altering settings on a computer to correspond to settings on an electronic device distinct from the computer, comprising:
-
a user authenticator included in the electronic device to authenticate an identity of a user to determine that the user is authorized to use the electronic device; and
means for, in response to authenticating the identity of the user to determine that the user is authorized to use the electronic device, altering the settings on the computer to correspond to settings on the electronic device.
-
Specification