Portable electronic authorization system and method
First Claim
1. A method for enabling a user interface on a computer operated by a user to cause memory content of an electronic device distinct from the computer to be modified, comprising steps of:
- (A) establishing a communication link between the user interface and the electronic device by establishing a first connection between the user interface and a server distinct from each of the computer and the electronic device, and establishing a second connection, which is secure, between the electronic device and the server, the communication link being established such that all substantive communications between the user interface and the electronic device pass through the server;
(B) with the electronic device, authenticating an identity of the user to determine that the user is permitted to modify the memory content of the electronic device;
(C) if the identity of the user has been authenticated with the electronic device, then enabling the user interface to cause the server communicate with the electronic device via the second connection and thereby cause the memory content of the electronic device to be modified;
(D) if the user interface has been enabled to cause the server to communicate with the electronic device via the second connection and thereby cause the memory content of the electronic device to be modified, then, at a time when the first and second connections exist concurrently, in response to commands input to the computer by the user, using the user interface to communicate with the server via the first connection so as to cause the server to communicate with the electronic device via the second connection and thereby cause new information to be added to the memory of the electronic device via the second connection;
(E) after performing the step (D), de-establishing the second connection; and
(F) after performing the step (E), accessing the new information stored in the memory of the electronic device and using the new information to perform at least one operation.
5 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, an electronic device is used to authenticate an identity of a user to determine that the user is permitted to access restricted information on a server. In response to the electronic device authenticating the identity of the user, a software module on a computer operated by the user is permitted to access the restricted information. In another embodiment, an electronic device is used to authenticate an identity of a user. In response to the electronic device authenticating the identity of the user, the settings on a computer are altered to correspond to settings on the electronic device.
176 Citations
36 Claims
-
1. A method for enabling a user interface on a computer operated by a user to cause memory content of an electronic device distinct from the computer to be modified, comprising steps of:
-
(A) establishing a communication link between the user interface and the electronic device by establishing a first connection between the user interface and a server distinct from each of the computer and the electronic device, and establishing a second connection, which is secure, between the electronic device and the server, the communication link being established such that all substantive communications between the user interface and the electronic device pass through the server; (B) with the electronic device, authenticating an identity of the user to determine that the user is permitted to modify the memory content of the electronic device; (C) if the identity of the user has been authenticated with the electronic device, then enabling the user interface to cause the server communicate with the electronic device via the second connection and thereby cause the memory content of the electronic device to be modified; (D) if the user interface has been enabled to cause the server to communicate with the electronic device via the second connection and thereby cause the memory content of the electronic device to be modified, then, at a time when the first and second connections exist concurrently, in response to commands input to the computer by the user, using the user interface to communicate with the server via the first connection so as to cause the server to communicate with the electronic device via the second connection and thereby cause new information to be added to the memory of the electronic device via the second connection; (E) after performing the step (D), de-establishing the second connection; and (F) after performing the step (E), accessing the new information stored in the memory of the electronic device and using the new information to perform at least one operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A system comprising:
-
an electronic device distinct from each of a computer operable by a user and a server, the electronic device including a user-authenticator to authenticate an identity of the user to determine that the user is permitted to modify memory content of the electronic device; means for establishing a communication link between a user interface on the computer and the electronic device by establishing a first connection between the user interface computer and the server and establishing a second connection, which is secure, between the electronic device and the server, the communication link being established such that all substantive communications between the user interface and the electronic device pass through the server; and means for, if the user-authenticator has authenticated the identity of the user and when the first and second connections exist concurrently, enabling and using the user interface to, in response to commands input to the computer by the user, issue commands to the server via the first connection that cause the server to communicate with the electronic device via the second connection and thereby cause new infonnation to be added to a memory of the electronic device; wherein the electronic device is configured to access the new information stored in the memory to perform at least one operation after the second connection-has been de-established. - View Dependent Claims (14)
-
-
15. A method for enabling a user interface on a computer to cause medi4 memory content of an electronic device distinct from the computer to be modified1 comprising steps of:
-
(A) establishing a communication link between the user interface and a server distinct from each of the electronic device and the computer by establishinR a first connection between the user interface and the server. and establishing a second connection.which is secure. between the electronic device and (Eall the server di3tinct frcm z;
ch of the el3otronio dc;
i;
z and tz eempiie* via a seeead software module included in the computer tat tunnels packets though the com uter he communication link bein established sue hat all substantive communications between the user interface and the electronicAeviee nasa through the server;(B) after performing the step (A) and at a time when the first and second connections exist concurrently. issuing commands from the user interface tint zfr;
;
ore mzdul;
to the server via the first connection that cause the server to communicate with the electronic device via the second connection so as to cause new information to be added to a memory of the electronic device;(C) after performing the step (B), de-establishing the second connection, and (D) after performing the step (C), accessing the new information stored in the memory of the electronic device and using the new information to perform at least one operation. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A system, comprising:
-
a server; a computer, distinct from the server, comprising a user interface configured to be operable by a user; an electronic device distinct from each of the server and the computer, the electronic device including a user-authenticator to authenticate an identity of the user to determine that the user is permitted to modify memory content of the electronic device; a communication link between the user interface and the electronic device comprising a first connection between the user interface and the server and a second connection, which is secure, between the electronic device and the server, the communication link being established such that all substantive communications between the user interface and the electronic device pass through the server; and at least one software module executable in the system, the at least one software module being configured such that the user can input commands to the user interface that cause instructions to be communicated from the user interface to the server via the first connection, and further configured such that, at a time when the first and second connections exist concurrently, if the electronic device has authenticated the identity of the user, the instructions cause the server to communicate new information to a memory of the electronic device via the second connection; wherein the electronic device is configured to access the new information stored in the memory to perform at least one operation after the second connection has been de-established. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
Specification