Efficient startup and logon
First Claim
Patent Images
1. A computerized method comprising:
- receiving, at a first device, a command to initiate startup processes on the first device,wherein the command is sent in response to a detection of a physical presence of a second device, wherein the second device is associated with a user,wherein a geo-fence surrounds an area, and wherein the physical presence of the second device is detected when the second device associated with the user enters or leaves the area surrounded by the geo-fence;
in response to receiving the command to initiate the startup processes, launching at least one application on the first device;
receiving, at the first device, verification of authentication credentials; and
providing, to the user, access to the first device upon receiving the verification of the authentication credentials, wherein the startup processes are initiated prior to the verification of the authentication credentials.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for receiving a detection of a physical presence of a user and, in response, initiating a start-up process on an enterprise device according to a profile associated with the user are described. Thereafter, the system receives authentication credentials at the enterprise device and the user is granted access to the enterprise device after the authentication credentials are verified.
82 Citations
18 Claims
-
1. A computerized method comprising:
-
receiving, at a first device, a command to initiate startup processes on the first device, wherein the command is sent in response to a detection of a physical presence of a second device, wherein the second device is associated with a user, wherein a geo-fence surrounds an area, and wherein the physical presence of the second device is detected when the second device associated with the user enters or leaves the area surrounded by the geo-fence; in response to receiving the command to initiate the startup processes, launching at least one application on the first device; receiving, at the first device, verification of authentication credentials; and providing, to the user, access to the first device upon receiving the verification of the authentication credentials, wherein the startup processes are initiated prior to the verification of the authentication credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium containing a set of instructions that, when executed by one or more processors, cause a machine to:
-
receive, at a first device, a command to initiate startup processes on the first device, wherein the command is sent in response to a detection of a physical presence of a second device, wherein the second device is associated with a user, wherein a geo-fence surrounds an area, and wherein the physical presence of the second device is detected when the second device associated with the user enters or leaves the area surrounded by the geo-fence; in response to receiving the command to initiate the startup processes, launch at least one application on the first device; receive, at the first device, verification of authentication credentials; and provide, to the user, access to the first device upon receiving the verification of the authentication credentials, wherein the startup processes are initiated prior to the verification of the authentication credentials. - View Dependent Claims (14, 15, 16)
-
-
17. A computer system comprising:
-
at least one processor; at least one memory comprising instructions configured to cause the at least one processor to perform a method comprising; receiving, at a first device, a command to initiate startup processes on the first device, wherein the command is sent in response to a detection of a physical presence of a second device, wherein the second device is associated with a user, wherein a geo-fence surrounds an area, and wherein the physical presence of the second device is detected when the second device associated with the user enters or leaves the area surrounded by the geo-fence; in response to receiving the command to initiate the startup processes, launching at least one application on the first device; receiving, at the first device, verification of authentication credentials; and providing, to the user, access to the first device upon receiving the verification of the authentication credentials, wherein the startup processes are initiated prior to the verification of the authentication credentials. - View Dependent Claims (18)
-
Specification