Methods and apparatus for managing user access to a computing environment
First Claim
1. A method, performed by a user, of gaining access to at least one computing device, the method comprising acts of:
- (A) gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user'"'"'s identity to the at least one computing device;
(B) presenting to a first user interface for the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and
(C) gaining access to the at least one computing device at a second time, subsequent to the first time, by presenting the physical device to the first user interface or a different user interface of the at least one computing device without providing the credential information to authenticate the user'"'"'s identity to the at least one computing device at the second time.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for controlling user access to a computing environment. In one embodiment, a user gains access to at least one computing device at a first time by providing credential information to authenticate the user'"'"'s identity; presents to a first user interface for the at least one computing device a physical device comprising identifying information to associate the device with the authenticated user; and gains access at a second time by presenting the physical device to the first user interface or a different user interface without providing the credential information. In another embodiment, in response to a user seeking access by presenting a physical device comprising identifying information, granting access only when the device was previously associated with a user who, within a grace period, provided credential information to authenticate the user'"'"'s identity.
38 Citations
26 Claims
-
1. A method, performed by a user, of gaining access to at least one computing device, the method comprising acts of:
-
(A) gaining access to the at least one computing device at a first time by providing credential information to the at least one computing device to authenticate the user'"'"'s identity to the at least one computing device; (B) presenting to a first user interface for the at least one computing device a physical device comprising identifying information to associate the physical device with the user authenticated by the credential information; and (C) gaining access to the at least one computing device at a second time, subsequent to the first time, by presenting the physical device to the first user interface or a different user interface of the at least one computing device without providing the credential information to authenticate the user'"'"'s identity to the at least one computing device at the second time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of controlling access to at least one computing device, the method comprising acts of:
-
(A) in response to a user seeking access to the at least one computing device by presenting a physical device comprising identifying information, determining whether the physical device was previously associated with a user who, within a grace period of time, accessed the at least one computing device as a result of the user having provided credential information to the at least one computing device to authenticate the user'"'"'s identity and who presented the physical device to the at least one computing device to associate the physical device with the user identified by the credential information; (B) when it is determined in the act (A) that the physical device was not previously associated with a user who, within the grace period of time, accessed the at least one computing device as a result of the user having provided the credential information to the at least one computing device to authenticate the user'"'"'s identity and who presented the physical device to the at least one computing device to associate the physical device with the user identified by the credential information, requiring that to gain access to the at least one computing device the user provide the credential information to the at least one computing device to authenticate the user'"'"'s identity; and (C) when it is determined in the act (A) that the physical device was previously associated with a user who, within the grace period of time, accessed the at least one computing device as a result of the user having provided the credential information to the at least one computing device to authenticate the user'"'"'s identity and who presented the physical device to the at least one computing device to associate the physical device with the user identified by the credential information, enabling the user to gain access to the at least one computing device by presenting the physical device to the at least one computing device without requiring the user to provide the credential information to the at least one computing device to authenticate the user'"'"'s identity. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. At least one computer readable medium encoded with a plurality of instructions that, when executed, perform a method of controlling access to at least one computing device, the method comprising acts of:
-
(A) in response to a user seeking access to the at least one computing device by presenting a physical device comprising identifying information, determining whether the physical device was previously associated with a user who, within a grace period of time, accessed the at least one computing device as a result of the user having provided credential information to the at least one computing device to authenticate the user'"'"'s identity and who presented the physical device to the at least one computing device to associate the physical device with the user identified by the credential information; (B) when it is determined in the act (A) that the physical device was not previously associated with a user who, within the grace period of time, accessed the at least one computing device as a result of the user having provided the credential information to the at least one computing device to authenticate the user'"'"'s identity and who presented the physical device to the at least one computing device to associate the physical device with the user identified by the credential information, requiring that to gain access to the at least one computing device the user provide the credential information to the at least one computing device to authenticate the user'"'"'s identity; and (C) when it is determined in the act (A) that the physical device was previously associated with a user who, within the grace period of time, accessed the at least one computing device as a result of the user having provided the credential information to the at least one computing device to authenticate the user'"'"'s identity and who presented the physical device to the at least one computing device to associate the physical device with the user identified by the credential information, enabling the user to gain access to the at least one computing device by presenting the physical device to the at least one computing device without requiring the user to provide the credential information to the at least one computing device to authenticate the user'"'"'s identity.
-
-
23. A computer system comprising:
at least one processor programmed to control access to computer system, wherein in response to a user seeking access to the at least one computer system by presenting a physical device comprising identifying information, the at least one processor is programmed to; determine whether the physical device was previously associated with a user who, within a grace period of time, accessed the at least one computer system as a result of the user having provided credential information to the at least one computer system to authenticate the user?s identity and who presented the physical device to the at least one computer system to associate the physical device with the user identified by the credential information; require that to gain access to the at least one computer system the user provide the credential information to the at least one computer system to authenticate the user'"'"'s identity when the at least one processor determines that the physical device was not previously associated with a user who, within the grace period of time, accessed the at least one computer system as a result of the user having provided the credential information to the at least one computer system to authenticate the user'"'"'s identity and who presented the physical device to the at least one computer system to associate the physical device with the user identified by the credential information; and enable the user to gain access to the at least one computer system by presenting the physical device to the at least one computer system without requiring the user to provide the credential information to the at least one computer system to authenticate the user'"'"'s identity when the at least one processor determines that the physical device was previously associated with a user who, within the grace period of time, accessed the at least one computer system as a result of the user having provided the credential information to the at least one computer system to authenticate the user'"'"'s identity and who presented the physical device to the at least one computer system to associate the physical device with the user identified by the credential information.
-
24. A method of controlling access to at least one computing device, the method comprising an act of:
(A) in response to a user accessing the at least one computing device by providing credential information to the at least one computing device to authenticate the user'"'"'s identity and presenting a physical device comprising identifying information to the at least one computing device to associate the physical device with the user identified by the credential information, establishing a grace period of time during which the user may gain access to the at least one computing device by presenting the physical device to the at least one computing device without providing the credential information to the at least one computing device to authenticate the user'"'"'s identity. - View Dependent Claims (25, 26)
Specification