Mechanism for facilitating remote access of user and device credentials for remoting device activities between computing devices
First Claim
Patent Images
1. A computer-implemented method comprising:
- detecting, by a first computing device, a second computing device having credentials capable of facilitating one or more tasks, wherein the first computing device lacks the credentials and is incapable of performing the one or more tasks, wherein the first computing device is incapable due to lacking one or more features or being un-favoured due to one or more preferences to perform the one or more tasks;
remotely accessing, by the first computing device, the credentials at the second computing device such that accessing the credentials to turn the first computing device into temporarily gaining capacity to be capable of performing the one or more tasks based on the credentials of the second computing device; and
performing, by the first computing device, the one or more tasks based on the credentials at the second computing device without the first computing device having to employ the credentials or permanently gain the capacity, wherein the credentials include one or more of communication credentials, user preferences, one or more voice plans, and one or more data plans, and wherein the one or more tasks include voice calling, over a communication medium, based on the one or more phone plans at the second computing device, accessing data, over one the communication medium, based on the one or more data plans at the second computing device, wherein performing further includes facilitating the second computing device to perform the one or more tasks on behalf of the first computing device without the first computing device having to employ the credentials or permanently gain the capacity.
1 Assignment
0 Petitions
Accused Products
Abstract
A mechanism is described for facilitating remote access of device and user credentials for at computing devices according to one embodiment of the invention. A method of embodiments of the invention includes remotely accessing, by a first computing device, credentials of a second computing device. The credentials may facilitate the first computing device to perform one or more tasks. The method may further include performing, at the first computing device, the one or more tasks based on the accessed credentials and according to capabilities of the first computing device.
7 Citations
18 Claims
-
1. A computer-implemented method comprising:
-
detecting, by a first computing device, a second computing device having credentials capable of facilitating one or more tasks, wherein the first computing device lacks the credentials and is incapable of performing the one or more tasks, wherein the first computing device is incapable due to lacking one or more features or being un-favoured due to one or more preferences to perform the one or more tasks; remotely accessing, by the first computing device, the credentials at the second computing device such that accessing the credentials to turn the first computing device into temporarily gaining capacity to be capable of performing the one or more tasks based on the credentials of the second computing device; and performing, by the first computing device, the one or more tasks based on the credentials at the second computing device without the first computing device having to employ the credentials or permanently gain the capacity, wherein the credentials include one or more of communication credentials, user preferences, one or more voice plans, and one or more data plans, and wherein the one or more tasks include voice calling, over a communication medium, based on the one or more phone plans at the second computing device, accessing data, over one the communication medium, based on the one or more data plans at the second computing device, wherein performing further includes facilitating the second computing device to perform the one or more tasks on behalf of the first computing device without the first computing device having to employ the credentials or permanently gain the capacity. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory machine-readable medium comprising instructions that, when executed by a processing device of a first computing device, cause the processing device to:
-
detect a second computing device having credentials capable of facilitating one or more tasks, wherein the first computing device lacks the credentials and is incapable of performing the one or more tasks, wherein the first computing device is incapable due to lacking one or more features or being un-favoured due to one or more preferences to perform the one or more tasks; remotely access the credentials at the second computing device such that accessing the credentials to turn the first computing device into temporarily gaining capacity to be capable of performing the one or more tasks based on the credentials of the second computing device; and perform the one or more tasks based on the credentials at the second computing device without the first computing device having to employ the credentials or permanently gain the capacity, wherein the credentials include one or more of communication credentials, user preferences, one or more voice plans, and one or more data plans, and wherein the one or more tasks include voice calling, over a communication medium, based on the one or more phone plans at the second computing device, accessing data, over one the communication medium, based on the one or more data plans at the second computing device, wherein performing further includes facilitating the second computing device to perform the one or more tasks on behalf of the first computing device without the first computing device having to employ the credentials or permanently gain the capacity. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An apparatus comprising:
-
a first computing device comprising; device detection module to detect a second computing device having credentials capable of facilitating one or more tasks, wherein the first computing device lacks the credentials and is incapable of performing the one or more tasks, wherein the first computing device is incapable due to lacking one or more features or being un-favoured due to one or more preferences to perform the one or more tasks; credentials access module to remotely access the credentials at the second computing device such that accessing the credentials to turn the first computing device into temporarily gaining capacity to be capable of performing the one or more tasks based on the credentials of the second computing device; and one or more components to perform the one or more tasks based on the credentials, wherein the credentials include one or more of communication credentials, user preferences, one or more voice plans, and one or more data plans, and wherein the one or more tasks include voice calling, over a communication medium, based on the one or more phone plans at the second computing device, accessing data, over one the communication medium, based on the one or more data plans at the second computing device, wherein performing further includes facilitating the second computing device to perform the one or more tasks on behalf of the first computing device without the first computing device having to employ the credentials or permanently gain the capacity. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification