Remote administration of computer access settings
First Claim
Patent Images
1. A method to control computer access, comprising:
- storing a user profile in local memory of a computer, the user profile having settings customized for a user of the computer, the settings specifying types of information that the user is authorized to access on the computer;
remotely storing a copy of the user profile in a database of a server that communicates with the computer;
detecting an event at the computer that initiates a synchronization procedure;
retrieving a time associated with the copy of the user profile stored in the server;
comparing the time associated with the copy to another time associated with the user profile stored in the local memory of the computer, whereby the copy is synchronized to a latest version stored in the computer;
producing a prompt at the computer to identify the user of the computer;
receiving a password that identifies the user of the computer;
querying the copy of the user profile stored in the server for the password to verify the password;
detecting no response from the server to verify the password;
querying the user profile stored in the memory of the computer for the password when the server fails to respond;
determining the password matches the user profile stored in the memory of the computer; and
controlling access to the computer in accordance with the user profile.
10 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides systems and methods for controlling computer access. Briefly described in architecture, some embodiments of such a system provide a control unit for controlling user access to a computer in accordance with a user profile. An administrator of the computer is enabled to remotely access and modify the user profile. The user profile is stored at least in a remote database that is accessible via a server. Other systems and methods are also provided.
103 Citations
15 Claims
-
1. A method to control computer access, comprising:
-
storing a user profile in local memory of a computer, the user profile having settings customized for a user of the computer, the settings specifying types of information that the user is authorized to access on the computer; remotely storing a copy of the user profile in a database of a server that communicates with the computer; detecting an event at the computer that initiates a synchronization procedure; retrieving a time associated with the copy of the user profile stored in the server; comparing the time associated with the copy to another time associated with the user profile stored in the local memory of the computer, whereby the copy is synchronized to a latest version stored in the computer; producing a prompt at the computer to identify the user of the computer; receiving a password that identifies the user of the computer; querying the copy of the user profile stored in the server for the password to verify the password; detecting no response from the server to verify the password; querying the user profile stored in the memory of the computer for the password when the server fails to respond; determining the password matches the user profile stored in the memory of the computer; and controlling access to the computer in accordance with the user profile. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer-readable storage medium storing processor-executable instructions for performing a method, the method comprising:
-
storing a user profile in local memory of a computer, the user profile having settings customized for a user of the computer, the settings specifying types of information that the user is authorized to access on the computer; remotely storing a copy of the user profile in a database of a server that communicates with the computer; detecting an event at the computer that initiates a synchronization procedure; retrieving a time associated with the copy of the user profile stored in the server; comparing the time associated with the copy to another time associated with the user profile stored in the local memory of the computer, whereby the copy is synchronized to a latest version stored in the computer; producing a prompt at the computer to identify the user of the computer; receiving a password that identifies the user of the computer; querying the copy of the user profile stored in the server for the password to verify the password; detecting no response from the server to verify the password; querying the user profile stored in the memory of the computer for the password when the server fails to respond; determining the password matches the user profile stored in the memory of the computer; and controlling access to the computer in accordance with the at least one user profile. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system for controlling access to a computer, comprising:
-
a processor; memory; and instructions stored in the memory that cause the processor at least to; store a user profile in the memory having settings customized for a user of the computer, the settings specifying types of information that the user is authorized to access on the computer; remotely store a copy of the user profile; detect an event by the processor that initiates a synchronization procedure; retrieve a time associated with the copy of the user profile; compare the time associated with the copy to another time associated with the user profile stored in the memory, wherein the copy is synchronized to a latest version stored in the computer; produce a prompt at the computer to identify the user of the computer; receive a password that identifies the user of the computer; query the copy of the user profile stored in the server for the password to verify the password; detect no response from the server to verify the password; query the user profile stored in the memory of the computer for the password when the server fails to respond; determine the password matches the user profile stored in the memory of the computer; and control access to the computer in accordance with the user profile. - View Dependent Claims (12, 13, 14, 15)
-
Specification