System and method for network power management incorporating user identity and preferences via a power managed smart card
First Claim
1. A method of controlling a network computer having an access port for receiving an access card which includes a processor and storage for providing secure user information, the method comprising the steps of:
- detecting the presence in the network computer of the access card;
tracking user activity on the network computer by tracking transitions between power modes and time spent in power modes to establish power management preferences for a user;
storing the established power management preferences to provide network computer independent power management preferences as user specific information stored on the access card;
accessing the access card to obtain the user specific information; and
controlling the power management of the network computer based upon the user specific information obtained from the access card.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems and computer program products are provided which control a network computer having an access port for receiving an access card, such as a short card which includes a processor and storage for providing secure user information. The network computer is controlled by detecting the presence in the network computer of the access card and accessing the access card to obtain user specific information. The power management of the network computer may then be controlled based upon the user specific information on the detailed access card. Also provided are methods, systems and computer program products for providing user information to a network computer by storing user specific information on an access card which includes a processor and storage such that information stored on the access card may only be accessed through the processor of the access card so as to provide secure data on the access card. The access card may then be provided to a network computer and accessed to obtain user specific information independent of the network connections of the network computer. User identification information, which may be encrypted, is stored on the access card and validated to permit access to the network computer. User activity may be tracked or monitored, including transitions between and time spent in power modes, to establish power management preferences for a user on the network. The network computer may be activated and deactivated by the detected presence or absence of the access card or smart card, so that the access card may act as an intelligent “power on” for the network computer.
116 Citations
25 Claims
-
1. A method of controlling a network computer having an access port for receiving an access card which includes a processor and storage for providing secure user information, the method comprising the steps of:
-
detecting the presence in the network computer of the access card;
tracking user activity on the network computer by tracking transitions between power modes and time spent in power modes to establish power management preferences for a user;
storing the established power management preferences to provide network computer independent power management preferences as user specific information stored on the access card;
accessing the access card to obtain the user specific information; and
controlling the power management of the network computer based upon the user specific information obtained from the access card. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of providing user information to a network computer, the method comprising the steps of:
-
storing user specific information on an access card which includes a processor and storage such that information stored on the access card may only be accessed through the processor of the access card so as to provide secure data on the access card;
tracking user activity on the network computer by tracking transitions between power modes to establish user preferences for a user associated with the access card;
storing the established user preferences on the access card as user specific information to provide network independent user preferences;
providing the access card to a network computer; and
accessing the access card to obtain the user specific information independent of the network connections of the network computer. - View Dependent Claims (7, 8, 9)
validating the user identification stored on the access card; and
allowing access to the network computer by a user if said step of validating the user identification determines that the user identification is valid.
-
-
10. A network computer comprising:
-
a central processing unit;
a memory operatively associated with the central processing unit;
a network interface operatively associated with the central processing unit;
an access card comprising;
access card central processing unit; and
access card memory operatively associated with the access card central processing unit;
an access card port operatively associated with the central processing unit, which receives said access card and allows for communication with said access card central processing unit; and
a power management controller, operatively associated with said access card port and responsive to said access card, which controls the power state of the network computer and which is configured to track user activity on the network computer by tracking transitions between power modes to establish power management preferences for a user and store the established power management preferences on the access card to provide network computer independent power management information. - View Dependent Claims (11, 12)
activate the network computer when the access card is present in the access card port and deactivate the network computer when the access card is removed from the access card port. -
12. A network computer according to claim 10, further comprising:
-
means for validating user identification stored on the access card; and
wherein the power management controller is configured to activate the network computer responsive to the means for validating if said means for validating the user identification determines that the user identification is valid.
-
-
-
13. A network computer, comprising:
-
an access card which includes a processor and storage and is configured to store user specific information in the storage of the access card such that the user specific information stored on the access card may only be accessed through the processor of the access card so as to provide secure data on the access card;
an access card port configured to provide access to the access card to the network computer and configured to allow the network computer to access the access card to obtain user specific information independent of the network connections of the network computer; and
wherein the network computer is further configured to track user activity on the network computer by tracking transitions between power modes and time spent in power modes to establish user preferences for a user associated with the access card and store the established user preferences on the access card to provide network computer independent user preferences. - View Dependent Claims (14, 15, 16)
means for validating the user identification stored on the access card; and
means for activating the network computer if said means for validating the user identification determines that the user identification is valid.
-
-
17. A computer program product for controlling a network computer having an access port for receiving an access card which includes a processor and storage for providing secure user information, the computer program product comprising:
-
a computer-readable storage medium having computer-readable program code means embodied in said medium, said computer-readable program code means comprising;
computer-readable program code means for detecting the presence in the network computer of the access card;
computer-readable program code means for tracking user activity on the network computer by tracking transitions between power modes and time spent in power modes to establish power management preferences for a user;
computer-readable program code means for storing the established power management preferences on the access card to provide network computer independent power management preferences as user specific information;
computer-readable program code means for accessing the access card to obtain the user specific information; and
computer-readable program code means for controlling the power management of the network computer based upon the user specific information. - View Dependent Claims (18, 19, 20, 21)
-
-
22. A computer program product for providing user information to a network computer, the computer program product comprising:
-
a computer-readable storage medium having computer-readable program code computer-readable program code means embodied in said medium, said computer-readable program code computer-readable program code means comprising;
computer-readable program code means for storing user specific information on an access card which includes a processor and storage such that information stored on the access card may only be accessed through the processor of the access card so as to provide secure data on the access card;
computer-readable program code means for tracking user activity on the network computer by tracking transitions between power modes to establish user preferences for a user associated with the access card;
computer-readable program code means for storing the established user preferences on the access card to provide network computer independent user preferences as user specific information;
computer-readable program code means for providing access to the access card to a network computer; and
computer-readable program code means for accessing the access card to obtain user specific information independent of the network connections of the network computer. - View Dependent Claims (23, 24, 25)
computer-readable program code means for validating the user identification stored on the access card; and
computer-readable program code means for allowing access to the network computer by the user if said computer-readable program code means for validating the user identification determines that the user identification is valid.
-
Specification