Zero administrative interventions accounts
First Claim
1. A method of managing a user account on a computer, comprising:
- (a) inserting a token into the computer, said token comprising user account information and security data which permits the user account information to be verified;
(b) verifying a user of said token;
(c) verifying said security data on said token; and
(d) creating said user account if said security data is successfully verified.
2 Assignments
0 Petitions
Accused Products
Abstract
A security token is used to dynamically create a user account on a host computer system. The token preferably is programmed with a user'"'"'s credentials which includes information regarding the user account and security data. Once programmed, the token then can be inserted into a host computer. The user verifies himself or herself to the host computer/token and the token verifies itself to the host computer. Once verified, the user'"'"'s credentials stored on the token are accessed to dynamically create the user account on the host system. The token may comprise a smart card, USB-compatible memory device, and the like. Storage media, such as floppy disks, also can be used if fewer security features are acceptable.
-
Citations
43 Claims
-
1. A method of managing a user account on a computer, comprising:
-
(a) inserting a token into the computer, said token comprising user account information and security data which permits the user account information to be verified;
(b) verifying a user of said token;
(c) verifying said security data on said token; and
(d) creating said user account if said security data is successfully verified. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of creating a token usable to dynamically create a user account on a computer, comprising:
-
(a) inserting the token into a token programmer coupled to a configuration system;
(b) generating a private key;
(c) generating user credentials containing user account information and a security value, said user credentials usable to create a user account on said computer upon insertion of said token into said computer; and
(d) writing said user credentials to said token. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A token, comprising:
-
memory;
an interface coupled to said memory and usable to couple said token to a computer;
wherein said memory contains user account information which permits a user account to be created on a computer and security data which permits the user account information to be verified. - View Dependent Claims (21, 22, 23, 24)
-
-
25. A token configuration system, comprising:
-
a CPU; and
a token programmer coupled to said CPU and configured to receive a token;
wherein said CPU writes user account information and security data to said token, said user account information usable to permit a user account to be created using the token and said security data usable to permit the user account information to be verified. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A computer system comprising:
-
a CPU; and
a token reader coupled to said CPU and configured to receive a token;
whereby said token includes user account information which is read by said CPU and used to create a user account. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
Specification