Efficient startup and logon
First Claim
Patent Images
1. A computerized method comprising:
- receiving, at an enterprise device communicably coupled to a server, a command from the server to initiate startup processes on the enterprise device,wherein the command is sent in response to detecting a physical presence of a device associated with a user, wherein the physical presence of the device is detected using at least one of;
near-field communications, radio-frequency identification, location-based technology, or Bluetooth;
in response to receiving the command to initiate the startup processes, launching at least one application;
receiving, at the enterprise device, authentication credentials; and
providing, to the user, access to the enterprise device upon verification of the authentication credentials,wherein the startup processes are initiated prior to the verification of the authentication credentials.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for receiving a detection of a physical presence of a user and, in response, initiating a start-up process on an enterprise device according to a profile associated with the user are described. Thereafter, the system receives authentication credentials at the enterprise device and the user is granted access to the enterprise device after the authentication credentials are verified.
-
Citations
20 Claims
-
1. A computerized method comprising:
-
receiving, at an enterprise device communicably coupled to a server, a command from the server to initiate startup processes on the enterprise device, wherein the command is sent in response to detecting a physical presence of a device associated with a user, wherein the physical presence of the device is detected using at least one of;
near-field communications, radio-frequency identification, location-based technology, or Bluetooth;in response to receiving the command to initiate the startup processes, launching at least one application; receiving, at the enterprise device, authentication credentials; and providing, to the user, access to the enterprise device upon verification of the authentication credentials, wherein the startup processes are initiated prior to the verification of the authentication credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium containing a set of instructions that, when executed by one or more processors, cause a machine to:
-
receive, at an enterprise device communicably coupled to a server, a command from the server to initiate startup processes on the enterprise device, wherein the command is sent in response to detecting a physical presence of a device associated with a user, wherein the physical presence of the device is detected using at least one of;
near-field communications, radio-frequency identification, location-based technology, or Bluetooth;in response to receiving the command to initiate the startup processes, launch at least one application; receive, at the enterprise device, authentication credentials; and provide, to the user, access to the enterprise device upon verification of the authentication credentials, wherein the startup processes are initiated prior to the verification of the authentication credentials. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer system comprising:
-
at least one processor; at least one memory comprising instructions configured to cause the at least one processor to perform a method comprising; receiving, at an enterprise device communicably coupled to a server, a command from the server to initiate startup processes on the enterprise device, wherein the command is sent in response to detecting a physical presence of a device associated with a user, wherein the physical presence of the device is detected using at least one of;
near-field communications, radio-frequency identification, location-based technology, or Bluetooth;in response to receiving the command to initiate the startup processes, launching at least one application; receiving, at the enterprise device, authentication credentials; and providing, to the user, access to the enterprise device upon verification of the authentication credentials, wherein the startup processes are initiated prior to the verification of the authentication credentials. - View Dependent Claims (20)
-
Specification