Integrating operating systems with content offered by web based entities
First Claim
Patent Images
1. A method of facilitating a computer logon session comprising:
- receiving, by a logon screen generated by an operating system, a user'"'"'s credential associated with the user, the operating system including a kernel;
transmitting a validation request to an internet based service provider, wherein said validation request includes the user'"'"'s credentials, said credentials being verifiable by said internet based service provider;
receiving information related to said user from said internet based service provider, wherein said information includes a security context;
utilizing, by an authentication process of the operating system, said user security context to generate an operating system security token;
logging said user into the operating system, wherein the operating system security token is used by said operating system to determine whether a user associated with the user'"'"'s credential is authorized to use system resources; and
using the security context to obtain content from one or more internet based service providers.
2 Assignments
0 Petitions
Accused Products
Abstract
Example embodiments are provided for integrating operating systems with content offered by internet based entities.
40 Citations
19 Claims
-
1. A method of facilitating a computer logon session comprising:
-
receiving, by a logon screen generated by an operating system, a user'"'"'s credential associated with the user, the operating system including a kernel; transmitting a validation request to an internet based service provider, wherein said validation request includes the user'"'"'s credentials, said credentials being verifiable by said internet based service provider; receiving information related to said user from said internet based service provider, wherein said information includes a security context; utilizing, by an authentication process of the operating system, said user security context to generate an operating system security token; logging said user into the operating system, wherein the operating system security token is used by said operating system to determine whether a user associated with the user'"'"'s credential is authorized to use system resources; and using the security context to obtain content from one or more internet based service providers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer system, comprising:
-
a processor; a memory coupled to the processor, wherein the memory includes executable instructions that upon execution by the processor cause the computer system to; receive, via an operating system log-on screen, a credential; send the credential to an internet-based service provider; receive a security context generated by the internet-based service provider; generate an operating system logon token using information stored in the security context; download, prior to logging a user associated with the logon token into the operating system, a file from the internet-based service provider; log the user into the operating system using the operating system logon token, the operating system including a kernel; and display, by the operating system, an icon for the downloaded file. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computer-readable storage medium wherein the medium is not a signal including executable instructions that upon execution by a processor cause a computer system to facilitate a computer system logon session, the computer-readable storage medium comprising:
-
instructions that upon execution by the processor cause the computer system to display a logon screen for an operating system; instructions that upon execution by the processor cause the computer system to receive, by the logon screen, a credential; instructions that upon execution by the processor cause the computer system to transmit a validation request to an internet based service provider, wherein said validation request includes the credential, said credentials being verifiable by said internet based service provider; instructions that upon execution by the processor cause the computer system to receive, in response to said validation request, a user security context from said internet based service provider; instructions that upon execution by the processor cause the computer system to generate an operating system logon token from said user security context; instructions that upon execution by the processor cause the computer system to log a user associated with the operating system logon token into the operating system, the operating system including a kernel, wherein the operating system is configured to use said operating system logon token to control access to local computing resources of the operating system;
; andinstructions that upon execution by the processor cause the computer system to use the security context to obtain content from one or more internet based service providers. - View Dependent Claims (17, 18, 19)
-
Specification