Two-pass device access management
First Claim
1. A method for controlling access to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user based on centralized access management information accessible by a server, the method comprising:
- authenticating the walk-up user based on authentication information corresponding to the user;
determining, at the server, a first level of access to the networked peripheral device available to the walk-up user based on the access management information;
transmitting access management information for the walk-up user to the networked peripheral device a centralized location indicative of the determined first level of access;
determining, at the networked peripheral device, a second level of access to the networked peripheral device available to the walk-up user based on the received access management information; and
allowing the walk-up user to access to the networked peripheral device based on the first and second determined levels of access.
1 Assignment
0 Petitions
Accused Products
Abstract
Access control to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user, based on centralized access management information. Access control comprises receiving authenticated information for the walk-up user from the networked peripheral device at a centralized location, determining at a server connected to the network a first level of access to the networked peripheral device, determining at the networked peripheral device a second level of access to the networked peripheral device by the walk-up user based on received access management information for the walk-up user, and allowing the walk-up user to access determined user-available features of the networked peripheral device based on the determined first and second levels of access.
-
Citations
18 Claims
-
1. A method for controlling access to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user based on centralized access management information accessible by a server, the method comprising:
-
authenticating the walk-up user based on authentication information corresponding to the user;
determining, at the server, a first level of access to the networked peripheral device available to the walk-up user based on the access management information;
transmitting access management information for the walk-up user to the networked peripheral device a centralized location indicative of the determined first level of access;
determining, at the networked peripheral device, a second level of access to the networked peripheral device available to the walk-up user based on the received access management information; and
allowing the walk-up user to access to the networked peripheral device based on the first and second determined levels of access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 14)
-
-
12. A computer-readable memory medium in which computer-executable process steps are stored, the process steps for controlling access to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user based on centralized access management information accessible by a server, wherein the process steps comprise:
-
an authenticating step of authenticating the walk-up user based on authentication information corresponding to the user;
a first determining step of determining, at the server, a first level of access to the networked peripheral device available to the walk-up user based on the access management information;
a transmitting step of transmitting access management information for the walk-up user to the networked peripheral device a centralized location based on the determined first level of access;
a second determining step of determining, at the networked peripheral device, a second level of access to the networked peripheral device available to the walk-up user based on the received access management information; and
an allowing step of allowing the walk-up user to access to the networked peripheral device based on the first and second determined levels of access.
-
-
13. A computer-executable program code stored on a computer readable medium, said computer-executable program code for controlling access to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user based on centralized access management information accessible by a server, said computer-executable program code comprising:
-
code to authenticate the walk-up user based on authentication information corresponding to the user;
code to determine, at the server, a first level of access to the networked peripheral device available to the walk-up user based on the access management information;
code to transmit access management information for the walk-up user to the networked peripheral device a centralized location based on the determined first level of access;
code to determine, at the networked peripheral device, a second level of access to the networked peripheral device available to the walk-up user based on the received access management information; and
code to allow the walk-up user to access to the networked peripheral device based on the first and second determined levels of access determined by the network peripheral device.
-
-
15. A server for use in controlling access to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user based on centralized access management information accessible by a server, the server comprising:
-
receiving a request for access policy information, the request including authentication information;
authenticating the user using the authentication information;
determining a level of access to features and/or services of the networked peripheral device available to the walk-up user based on centralized access management information; and
transmitting access management information for the user to the networked peripheral device, which comprises an access policy in a case that authentication of the user is successful and the user is authorized to use at least some portion of the features and/or services of the networked peripheral device. - View Dependent Claims (16)
-
-
17. A method of controlling access to a networked peripheral device by a walk-up user, wherein the networked peripheral device is accessible by both the walk-up user and a remote user based on centralized access management information accessible over a network, the method comprising:
-
transmitting authentication information over the network;
receiving, over the network, access management information for the walk-up user at the networked peripheral device from the centralized location;
examining the received access management information to determine whether it includes an access policy corresponding to the walk-up user;
determining, at the networked peripheral device, a level of access to the networked peripheral device available to the walk-up user based on received access policy in a case that an access policy is received by the networked peripheral device; and
allowing the walk-up user to access the networked peripheral device based on the determined level of access. - View Dependent Claims (18)
-
Specification