Identity management via cloud
First Claim
1. A method of maintaining a user profile for a handheld computer in a shared, scalable computing resource, comprising:
- receiving user profile data from the handheld computer at the shared, scalable computing resource via a first wireless carrier, the user profile data comprising a user security factor, wherein the user profile data is received via a secure wireless communication protocol having authentication of an identity of the handheld computer;
storing the user profile data on the shared, scalable computing resource as a portion of a user profile, the user profile further comprising user preference data;
receiving the user security factor from a second computing device via a second wireless carrier, wherein the first wireless carrier is different than the second wireless carrier and the user security factor is received via a secure wireless communication protocol having authentication of an identity of the second computing device;
downloading user preference data to the second computing device;
receiving, by the shared, scalable computing resource, information associated with user input received at the second computing device;
sending by the shared, scalable computing resource, to the handheld device, the information associated with the user input received at the second computing device;
receiving, by the shared, scalable computing system, from the handheld device, changes in a user interface of the handheld device based on the information associated with the user input received at the second computing device; and
sending, from the shared, scalable computing system, to the second computing device, the changes in the user interface of the handheld device for updating a user interface displayed by the second computing device.
8 Assignments
0 Petitions
Accused Products
Abstract
A system and method of maintaining a user profile for a handheld computer in a shared, scalable computing resource is described. The method includes receiving user profile data from the handheld computer at the shared, scalable computing resource, the user profile data comprising a user security factor. The user profile data is received via a secure wireless communication protocol having authentication of an identity of the handheld computer. The method includes storing the user profile data on the shared, scalable computing resource as a portion of a user profile, the user profile further comprising user preference data. The method further includes receiving the user security factor from a second computing device. The user security factor is received via a secure wireless communication protocol having authentication of an identity of the second computing device. The method further includes downloading user preference data to the second computing device.
-
Citations
18 Claims
-
1. A method of maintaining a user profile for a handheld computer in a shared, scalable computing resource, comprising:
-
receiving user profile data from the handheld computer at the shared, scalable computing resource via a first wireless carrier, the user profile data comprising a user security factor, wherein the user profile data is received via a secure wireless communication protocol having authentication of an identity of the handheld computer; storing the user profile data on the shared, scalable computing resource as a portion of a user profile, the user profile further comprising user preference data; receiving the user security factor from a second computing device via a second wireless carrier, wherein the first wireless carrier is different than the second wireless carrier and the user security factor is received via a secure wireless communication protocol having authentication of an identity of the second computing device; downloading user preference data to the second computing device; receiving, by the shared, scalable computing resource, information associated with user input received at the second computing device; sending by the shared, scalable computing resource, to the handheld device, the information associated with the user input received at the second computing device; receiving, by the shared, scalable computing system, from the handheld device, changes in a user interface of the handheld device based on the information associated with the user input received at the second computing device; and sending, from the shared, scalable computing system, to the second computing device, the changes in the user interface of the handheld device for updating a user interface displayed by the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for maintaining a user profile for a handheld computer in a shared, scalable computing system, comprising:
-
one or more processors; memory coupled to the one or more processors, the memory configured to store instructions that, when executed by the one or more processors, cause the shared, scalable computing system to; receive user profile data from the handheld computer via a first wireless carrier, wherein the user profile data is received via a secure wireless communication protocol having authentication of an identity of the handheld computer, the user profile data comprising; a user security factor, and user preference data; store the user profile data as a portion of a user profile; receive the user security factor from a second computing device via a second wireless carrier, wherein the first wireless carrier is different than the second wireless carrier, wherein the user security factor is received via a secure wireless communication protocol having authentication of an identity of the second computing device; download user preference data to the second computing device; receive information associated with user input received at the second computing device; send, to the handheld device, the information associated with the user input received at the second computing device; receive, by the shared, scalable computing system, from the handheld device, changes in a user interface of the handheld device based on the information associated with the user input received at the second computing device; and send, from the shared, scalable computing system, to the second computing device, the changes in the user interface of the handheld device for display by a user interface of the second computing device. - View Dependent Claims (15, 16)
-
-
17. A non-transitory computer-readable media configured to store machine-executable instructions to implement a method comprising:
-
receiving user profile data from a handheld computer at a shared, scalable computing resource via a first wireless carrier, the user profile data comprising a user security factor, wherein the user profile data is received via a secure wireless communication protocol having authentication of an identity of the handheld computer; storing the user profile data on the shared, scalable computing resource as a portion of a user profile, the user profile further comprising user preference data; receiving the user security factor from a second computing device via a second wireless carrier, wherein the first wireless carrier is different than the second wireless carrier and the user security factor is received via a secure wireless communication protocol having authentication of an identity of the second computing device; downloading user preference data to the second computing device; receiving, by the shared, scalable computing resource, information associated with user input received at the second computing device; sending by the shared, scalable computing resource, to the handheld device, the information associated with the user input received at the second computing device; receiving, by the shared, scalable computing system, from the handheld device, changes in a user interface of the handheld device based on the information associated with the user input received at the second computing device; and sending, from the shared, scalable computing system, to the second computing device, the changes in the user interface of the handheld device for updating a user interface displayed by the second computing device. - View Dependent Claims (18)
-
Specification