Single sign-on to an underlying operating system application
First Claim
1. A method of bypassing an initial sign-on screen of an underlying operating system with a single sign-on capability comprising the steps of:
- providing an application framework, wherein said application framework logs on a user with a first level of access in said underlying operating system;
generating an application framework sign-on screen;
entering a logon input on said generated application framework sign-on screen; and
comparing said logon input with an application framework security database to determine level of access.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and computer program product for bypassing the initial sign-on of an underlying operating system with single sign-on capability. In one embodiment, a method comprises the step of providing an application framework which logs on a user with a first level of access in the underlying operating system thereby bypassing the initial sign-on screen of the underlying operating system. The method further comprises entering a logon input, e.g., userID and password, on a generated application framework sign-on screen by the user. The method further comprises comparing the logon input with an application framework security database to determine the level of access. If the user is only entitled to the first level of access, then the user is restricted to a first level of access. If the user is entitled to another level of access, then a switch user program may be executed to switch the level of access to a second level of access, i.e., change in the assortment and/or number of applications. In another embodiment, the user selects an icon to maintain a first level of access upon entering the logon input. In another embodiment, the user selects an icon to change the level of access upon entering the logon input.
23 Citations
81 Claims
-
1. A method of bypassing an initial sign-on screen of an underlying operating system with a single sign-on capability comprising the steps of:
-
providing an application framework, wherein said application framework logs on a user with a first level of access in said underlying operating system; generating an application framework sign-on screen; entering a logon input on said generated application framework sign-on screen; and comparing said logon input with an application framework security database to determine level of access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A computer program product having a computer readable medium having computer program logic recorded thereon for bypassing an initial sign-on screen of an underlying operating system with a single sign capability, comprising:
-
programming operable for providing an application framework, wherein said application framework logs on a user with a first level of access in said underlying operating system; programming operable for generating an application framework sign-on screen; programming operable for receiving a logon input entered on said generated application framework sign-on screen; and programming operable for comparing said logon input with an application framework security database to determine level of access. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. A data processing system, comprising:
-
a processor; a memory unit operable for storing a computer program operable for bypassing an initial sign-on screen of an underlying operating system with a single sign capability; an input mechanism; an output mechanism; and a bus system coupling the processor to the memory unit, input mechanism, and output mechanism, wherein the computer program is operable for performing the following programming steps; providing an application framework, wherein said application framework logs on a user with a first level of access in said underlying operating system; generating an application framework sign-on screen; receiving a logon input entered on said generated application framework sign-on screen; and comparing said logon input with an application framework security database to determine level of access. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81)
-
Specification