SECURE ACCESS SUPERSESSION ON SHARED WORKSTATIONS
First Claim
Patent Images
1. A computer-implemented method for transitioning access to a shared desktop on a workstation connected to a computer network, the workstation currently running, on the desktop, at least one application launched at the request of a first user, the method comprising the steps of:
- recognizing, by the workstation, a use request by a second user;
receiving, by the workstation via the network, an authorization from a server for the second user to access the desktop on the workstation; and
causing the workstation to (i) hide without shutting down at least one application launched at the request of the first user, (ii) allow the second user to log on to the workstation to thereby access the shared desktop, (iii) launch at least one application requested by the second user, (iv) allow the second user to log off the workstation and, following log-off of the second user, (v) unhide the at least one application launched at the request of the first user.
7 Assignments
0 Petitions
Accused Products
Abstract
Transitions between users at shared workstations that permit access to private health information or other secure data may be handled, without incurring unnecessary delays due to shut-down of all applications used by the departing user, by selectively hiding applications with sensitive information on a shared desktop while allowing temporary system access for the interrupting user.
-
Citations
22 Claims
-
1. A computer-implemented method for transitioning access to a shared desktop on a workstation connected to a computer network, the workstation currently running, on the desktop, at least one application launched at the request of a first user, the method comprising the steps of:
-
recognizing, by the workstation, a use request by a second user; receiving, by the workstation via the network, an authorization from a server for the second user to access the desktop on the workstation; and causing the workstation to (i) hide without shutting down at least one application launched at the request of the first user, (ii) allow the second user to log on to the workstation to thereby access the shared desktop, (iii) launch at least one application requested by the second user, (iv) allow the second user to log off the workstation and, following log-off of the second user, (v) unhide the at least one application launched at the request of the first user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 16)
-
-
14. A workstation configured for transitioning access to a shared desktop, the workstation comprising:
-
a reader for detecting and obtaining data from an authentication token; a network interface; at least one user interface device; and a processor responsive to the reader and configured to; (i) run at least one application launched at the request of a first user; (ii) recognize a signal from the reader indicative of a use request by a second user, the use request including an identifier associated with the second user; (iii) transmit, via the network interface, the identifier associated with the second user to a server; (iv) receive, via the network interface, an authorization from the server for the second user to access the shared desktop on the workstation; (v) hide without shutting down at least one of the running applications launched at the request of the first user; (vi) allow the second user to log on to the workstation via the at least one user interface and the network interface to thereby access the shared desktop; (vii) launch at least one application requested by the second user; (viii) allow the second user to log off the workstation via the at least one user interface device and the network interface, and following log-off of the second user, (ix) unhide the at least one application launched at the request of the first user. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification