Information security – Access control or authentication
Reexamination Certificate
2011-08-16
2011-08-16
Poltorak, Peter (Department: 2434)
Information security
Access control or authentication
C713S001000, C713S002000
Reexamination Certificate
active
08001581
ABSTRACT:
Methods and systems for providing embedded user authentication and/or providing computing services using an information handling system configured as flexible computing node, and which may be implemented to perform preboot authentication of users. The flexible computing node may also be configured to provision the appropriate work environment for a given user based on one or more user parameters (e.g. entitlements, location, network connection, and/or other parameters).
REFERENCES:
patent: 6516350 (2003-02-01), Lumelsky et al.
patent: 6609151 (2003-08-01), Khanna et al.
patent: 7299354 (2007-11-01), Khanna et al.
patent: 2001/0052069 (2001-12-01), Sekiguchi
patent: 2004/0268140 (2004-12-01), Zimmer et al.
patent: 2005/0010811 (2005-01-01), Zimmer et al.
patent: 2006/0041581 (2006-02-01), Aghvami et al.
patent: 2007/0186091 (2007-08-01), Yang et al.
patent: 2008/0114976 (2008-05-01), Dandekar et al.
patent: 2010/0058325 (2010-03-01), Macken et al.
Sailer et al., “sHype: Secure Hypervisor Approach to Trustted Virtualized Systems”, IBM Research Report, RC23511, Feb. 2005.
Majenta Solutions, “VMware Virtual Desktop Infrastructure”, Printed from Internet Jul. 26, 2008, 3 pgs.
VMware, “VMware Professional Services Virtual Desktop Manager”, 2007, 2 pgs.
Majenta Solutions, “VMware Virtual Center”, Printed from Internet Jul. 26, 2008, 2 pgs.
Dell, “Dell™ MediaDirect™ Frequency Asked Questions”, Technical Support, Printed from Internet Jul. 26, 2008, 5 pgs.
Cherian et al, “System and Method for OS Boot Image Provisioning Based on User Identity to Enable Mobile Users”, filed Dec. 20, 2007, U.S. Appl. No. 11/961,048, 17 pgs.
Phoenix Technologies, Virtualization, “Phoenix Technologies Confirms HyperCore Existence”, Printed from Internet Aug. 12, 2008, 5 pgs.
Phoenix Technologies, “Transforming the Personal Computing Experience”, Printed from Internet Aug. 12, 2008, 2 pgs.
Phoenix Technologies, “Phoenix HyperSpace—Laying the Foundation for PC 3.0 with Embedded Simplicity”, Printed from Internet Aug. 12, 2008, 3 pgs.
BrianMadden, RemoteScan, “Scanners With Terminal Server and Citrix”, Printed from Internet Aug. 12, 2008, 16 pgs.
IBM, “Leostream Connection Broker”, Printed from Internet, 5 pgs.
IBM, “Virtual Client Solution From IBM”, Printed from Internet Aug. 12, 2008, 2 pgs.
IBM, “Leostream Connection Broker”, Printed from Internet Aug. 12, 2008, 3 pgs.
Dell, Power Solutions, “How Streaming the OS and Applications Changes the Rules for Server Provisioning”, Aug. 2007, 3 pgs.
Cox, “Citrix Acquires Ardence for Pc, Server Provisioning”, Networkworld, Dec. 20, 2006, 3 pgs.
Ford Jeremy
Lo Yuan-Chang
O'Connor Clint
Dell Products L.P.
O'Keefe, Egan Peterman & Enders LLP
Poltorak Peter
LandOfFree
Methods and systems for embedded user authentication and/or... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods and systems for embedded user authentication and/or..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and systems for embedded user authentication and/or... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2751863