System configuration contingent upon secure input
First Claim
1. A method of dynamically providing user configuration to a host computer in execution of a current virtual system, the host computer comprising a plurality of virtual systems, the method comprising the steps of:
- at intervals, determining a user identification of a user of the host system;
locating a virtual system in dependence upon the user identification; and
when a virtual system associated with the user identification is located, executing the virtual system of the host computer.
3 Assignments
0 Petitions
Accused Products
Abstract
A method of configuring and reconfiguring a computer system based on user authorization is presented wherein at least some users perceive themselves and available system resources as the entirety of the computer system. The resources are configured through use of virtual resources providing predetermined access privileges and configurations for some users. In another aspect, a method is provided of configuring and reconfiguring a computer system based on biometric user input wherein at least some user biometric input is necessary in order to gain authorized access to a system and to configure the system based on the authorized user. The configuration is, preferably, transparent to the user.
-
Citations
38 Claims
-
1. A method of dynamically providing user configuration to a host computer in execution of a current virtual system, the host computer comprising a plurality of virtual systems, the method comprising the steps of:
-
at intervals, determining a user identification of a user of the host system; locating a virtual system in dependence upon the user identification; and when a virtual system associated with the user identification is located, executing the virtual system of the host computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of dynamically providing user configuration to a host computer in execution of a current virtual system and in communication with a computer network, said network comprising a plurality of virtual systems, the method comprising the steps of:
-
at intervals, determining a user identification; searching computers in communication with the network for a virtual system associated with the determined user identification; and when a virtual system associated with the user identification is located, executing the virtual system on the host computer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of dynamically providing user configuration to a host computer in execution of an operating system, the method comprising the steps of:
-
using a biometric input means and at intervals during normal use, determining a user identification; locating configuration information in dependence upon the user identification; and configuring at least a portion of the host computer in dependence upon the configuration information. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method of dynamically providing user configuration to a host computer executing an operating system and in communication with a computer network comprising the steps of:
-
using a biometric input means and at intervals during normal use, determining a user identification; searching computers in communication with the network for configuration information associated with the determined user identification; locating configuration information in dependence upon the user identification; and
configuring at least a portion of the host computer in dependence upon the configuration information. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
Specification