Porting security application preferences from one system to another
First Claim
1. A method for configuring a security application, the method comprising:
- receiving a first input from a user, wherein the first input is indicative of the user selecting the security application from a plurality of security applications, receiving a second input, wherein the second input includes a request to load user preferences corresponding to the user and the security application;
receiving a unique identifier, wherein the user preferences for the security application are accessible by providing the unique identifier;
requesting the user preferences corresponding to the unique identifier; and
receiving the user preferences.
14 Assignments
0 Petitions
Accused Products
Abstract
Configuring a security application includes determining whether user preferences for the security application are pre-loaded in an information handling system (IHS) received by a user. If the user preferences have not been pre-loaded a request to receive the user preferences corresponding to the user and the security application is sent to a provider of the security application. The request includes a unique identifier for accessing the user preferences for the security application. The user preferences, which have been previously configured by the user for another IHS, are stored in a predefined format and are accessible to any requester providing the unique identifier. The provider provides the user preferences corresponding to the unique identifier.
29 Citations
21 Claims
-
1. A method for configuring a security application, the method comprising:
-
receiving a first input from a user, wherein the first input is indicative of the user selecting the security application from a plurality of security applications, receiving a second input, wherein the second input includes a request to load user preferences corresponding to the user and the security application;
receiving a unique identifier, wherein the user preferences for the security application are accessible by providing the unique identifier;
requesting the user preferences corresponding to the unique identifier; and
receiving the user preferences. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for configuring a security application, the method comprising:
-
determining whether user preferences for the security application are pre-loaded;
receiving an input, wherein the input includes a request to load the user preferences corresponding to a user and the security application in response to determining that the user preferences are not pre-loaded;
receiving a unique identifier, wherein the user preferences for the security application are accessible by providing the unique identifier;
requesting the user preferences corresponding to the unique identifier; and
receiving the user preferences. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. An information handling system (IHS) comprising:
-
a processor;
a memory coupled to the processor for storing a plurality of instructions executable by the processor to configure a security application, wherein the plurality of instructions are executable for;
determining whether user preferences for the security application are pre-loaded in the memory;
receiving an input, wherein the input includes a request to load the user preferences corresponding to a user and the security application in response to determining that the user preferences are not pre-loaded;
receiving a unique identifier, wherein the user preferences for the security application are accessible by providing the unique identifier;
requesting the user preferences corresponding to the unique identifier; and
receiving the user preferences. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification