REMOTE FEATURE ACTIVATION AUTHENTICATION FILE SYSTEM
23 Assignments
0 Petitions
Accused Products
Abstract
A system for providing a user with authorization to perform one or more functions using or otherwise involving a computational component is provided. The system includes an authentication file system 100 operable to (a) receive a request from a user for a second set of authentication information permitting a second set of operations to be performed on a computational component, wherein the computational component is operable to be installed by the user on the computational system, wherein the computational component contains a first set of authentication information permitting a first set of operations to be performed on the computational component; and wherein the first and second sets of operations are different; (b) generate an authentication file containing the second set of authentication information; and (c) transmit the authentication file to the computational system.
170 Citations
50 Claims
-
1-14. -14. (canceled)
-
15. A process for installing a computational component on a computational system, comprising:
-
providing a computational component for installation by a user on a computational system, the computational component having a first set of authentication information permitting a first set of operations to be performed on the computational component;
receiving the first set of authentication information from the user before, during, or after installation of the computational component on the computational system;
verifying the first set of authentication information;
when the first set of authentication information is successfully verified, receiving a request from the user for a second set of authentication information permitting a second set of operations to be performed on the computational component, the first and second sets of operations being different;
receiving an authentication file containing the second set of authentication information; and
loading the authentication file onto the computational system. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 46, 47, 48, 49, 50)
-
-
25-35. -35. (canceled)
-
36. A telecommunication system, comprising:
-
a computational component, the computational component having a first set of authentication information permitting a first set of operations to be performed on the computational component; and
a local access controller operable to receive a second set of authentication information, verify the second set of authentication information, and, when the second set of authentication information is successfully verified, load the second set of authentication information into the telecommunication system, wherein the second set of authentication information permits a second set of operations to be performed on the computational component and wherein the first and second sets of operations are different. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45)
-
Specification