Remote feature activation authentication file system
First Claim
1. A method for installing a computational component on a first computational system, comprising:
- providing a computational component for installation by a user on a first computational system, the computational component having a first set of authentication information permitting a first set of operations to be performed on the computational component, wherein the first set of authentication information corresponds to a first login and comprises a first key and/or password, and wherein the first set of operations comprises requesting delivery of a second set of authentication information;
receiving, at a network interface of a remote feature activation system, the first set of authentication information from the user before, during, or after installation of the computational component on the first computational system;
verifying, at the remote feature activation system, the first set of authentication information;
after the first set of authentication information is successfully verified, receiving a request from the user for the second set of authentication information, which permits a second set of operations to be performed on the computational component, the first and second sets of operations being different, wherein the first set of operations provides access by the user to fewer validly licensed operational features than the second set of operations;
receiving an authentication file containing the second set of authentication information, the second set of authentication information comprising a unique identifier of the first computational system, corresponding to a second login, and comprising a second key and/or password, whereby the unique identifier links the second set of authentication information with the first computational system such that the second set of authentication information cannot be used on a second computational system having a different unique identifier; and
loading the authentication file onto the first computational system.
23 Assignments
0 Petitions
Accused Products
Abstract
A system for providing a user with authorization to perform one or more functions using or otherwise involving a computational component is provided. The system includes an authentication file system 100 operable to (a) receive a request from a user for a second set of authentication information permitting a second set of operations to be performed on a computational component, wherein the computational component is operable to be installed by the user on the computational system, wherein the computational component contains a first set of authentication information permitting a first set of operations to be performed on the computational component; and wherein the first and second sets of operations are different; (b) generate an authentication file containing the second set of authentication information; and (c) transmit the authentication file to the computational system.
261 Citations
19 Claims
-
1. A method for installing a computational component on a first computational system, comprising:
-
providing a computational component for installation by a user on a first computational system, the computational component having a first set of authentication information permitting a first set of operations to be performed on the computational component, wherein the first set of authentication information corresponds to a first login and comprises a first key and/or password, and wherein the first set of operations comprises requesting delivery of a second set of authentication information; receiving, at a network interface of a remote feature activation system, the first set of authentication information from the user before, during, or after installation of the computational component on the first computational system; verifying, at the remote feature activation system, the first set of authentication information; after the first set of authentication information is successfully verified, receiving a request from the user for the second set of authentication information, which permits a second set of operations to be performed on the computational component, the first and second sets of operations being different, wherein the first set of operations provides access by the user to fewer validly licensed operational features than the second set of operations; receiving an authentication file containing the second set of authentication information, the second set of authentication information comprising a unique identifier of the first computational system, corresponding to a second login, and comprising a second key and/or password, whereby the unique identifier links the second set of authentication information with the first computational system such that the second set of authentication information cannot be used on a second computational system having a different unique identifier; and loading the authentication file onto the first computational system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A first telecommunication system, comprising:
-
a computational component, the computational component having a first set of authentication information permitting a first set of operations to be performed on the computational component, wherein the first set of authentication information corresponds to a first login and comprises a first key and/or password, and wherein the first set of operations comprises requesting delivery of a second set of authentication information; and a local access controller operable to receive the second set of authentication information at a network interface, verify the second set of authentication information, and, if the second set of authentication information is successfully verified, load the second set of authentication information into the first telecommunication system, wherein the second set of authentication information permits a second set of operations to be performed on the computational component and wherein the first and second sets of operations are different, wherein the first set of operations provides access by the user to fewer validly licensed operational features than the second set of operations, wherein the second set of authentication information comprises a unique identifier of the first telecommunication system, corresponds to a second login, and comprises a second key and/or password, whereby the unique identifier links the second set of authentication information with the first telecommunication system such that the second set of authentication information cannot be used with a second telecommunication system having a different unique identifier. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification