Remote feature activation authentication file system
First Claim
1. A process for providing a user with authorization to perform one or more functions using or otherwise involving the computational component, comprising:
- providing a computational component for installation by a user on a computational system, the computational component having a first set of authentication information permitting a first set of operations to be performed on the computational component;
receiving a request from the user for a second set of authentication information permitting a second set of operations to be performed on the computational component, the first and second sets of operations being different;
generating an authentication file containing the second set of authentication information; and
transmitting the authentication file to the computational system.
24 Assignments
0 Petitions
Accused Products
Abstract
A system for providing a user with authorization to perform one or more functions using or otherwise involving a computational component is provided. The system includes an authentication file system 100 operable to (a) receive a request from a user for a second set of authentication information permitting a second set of operations to be performed on a computational component, wherein the computational component is operable to be installed by the user on the computational system, wherein the computational component contains a first set of authentication information permitting a first set of operations to be performed on the computational component; and wherein the first and second sets of operations are different; (b) generate an authentication file containing the second set of authentication information; and (c) transmit the authentication file to the computational system.
-
Citations
50 Claims
-
1. A process for providing a user with authorization to perform one or more functions using or otherwise involving the computational component, comprising:
-
providing a computational component for installation by a user on a computational system, the computational component having a first set of authentication information permitting a first set of operations to be performed on the computational component;
receiving a request from the user for a second set of authentication information permitting a second set of operations to be performed on the computational component, the first and second sets of operations being different;
generating an authentication file containing the second set of authentication information; and
transmitting the authentication file to the computational system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A process for installing a computational component on a computational system, comprising:
-
providing a computational component for installation by a user on a computational system, the computational component having a first set of authentication information permitting a first set of operations to be performed on the computational component;
receiving the first set of authentication information from the user before, during, or after installation of the computational component on the computational system;
verifying the first set of authentication information;
when the first set of authentication information is successfully verified, receiving a request from the user for a second set of authentication information permitting a second set of operations to be performed on the computational component, the first and second sets of operations being different;
receiving an authentication file containing the second set of authentication information; and
loading the authentication file onto the computational system. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A system for providing a user with authorization to perform one or more functions using or otherwise involving a computational component, comprising:
an authentication file system operable to;
(a) receive a request from a user for a second set of authentication information permitting a second set of operations to be performed on a computational component, wherein the computational component is operable to be installed by the user on the computational system, wherein the computational component contains a first set of authentication information permitting a first set of operations to be performed on the computational component; and
wherein the first and second sets of operations are different;
(b) generate an authentication file containing the second set of authentication information; and
(c) transmit the authentication file to the computational system. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
36. A telecommunication system, comprising:
-
a computational component, the computational component having a first set of authentication information permitting a first set of operations to be performed on the computational component; and
a local access controller operable to receive a second set of authentication information, verify the second set of authentication information, and, when the second set of authentication information is successfully verified, load the second set of authentication information into the telecommunication system, wherein the second set of authentication information permits a second set of operations to be performed on the computational component and wherein the first and second sets of operations are different. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45)
-
-
46. An authentication file for use in controlling access to a computational system, comprising:
-
a set of login names;
for each login name in the set of login names, at least one of a password and a key; and
a unique identifier associated with the computational system. - View Dependent Claims (47, 48, 49, 50)
-
Specification