DYNAMIC AUTHENTICATION IN ALTERNATE OPERATING ENVIRONMENT
First Claim
1. A system for defining access to remote resources, comprising:
- a first access control that defines access to a remote resource based at least in part on a client credential;
a second access control that defines access to the remote resource based at least in part on a client identifier; and
a utility component that integrates the first access control and the second access control into a client environment.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods that employ dynamic credentials across distinct authentication standards can be used to reduce the burden associated with repeated re-authentication. A utility can be employed during logon in an alternate operating environment that stores information from the logon dynamically and generates a credential file that is employed to grant access to a resource without repeating the earlier logon procedure, even if the device changes its user state. After processes requiring resource access are complete, or when an allowed time expires, the granted access is revoked and the device returns to a default or standard authentication technique.
-
Citations
20 Claims
-
1. A system for defining access to remote resources, comprising:
-
a first access control that defines access to a remote resource based at least in part on a client credential; a second access control that defines access to the remote resource based at least in part on a client identifier; and a utility component that integrates the first access control and the second access control into a client environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for imaging a client device, comprising:
-
authenticating the client device to a network via a first authentication technique; storing information related to the first authentication technique; creating a record of the client related to a second authentication technique, wherein the record includes at least the information related to the first authentication technique; and authenticating the client device to the network via the second authentication technique. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system, comprising:
-
means for authenticating a client via a graphical logon challenge; means for capturing at least information related to the client; means for authenticating the client via a bypass table based at least in part on the information related to the client; and means for transmitting to the client over a network secured at least by the bypass table. - View Dependent Claims (19, 20)
-
Specification