Method and system of credential roaming among a plurality of computing facilities
A computing device and credential technology, applied in the direction of synchronously sending/receiving encrypted devices, computing, transmission systems, etc., can solve problems such as users being unable to log in and using computers, slowing down the login process, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] In short, credential roaming can be implemented to synchronize local credentials (encryption keys, credentials, tokens, etc.) at any number (n) of computing devices. For illustration, a user can change, modify, add and / or delete credentials at his (or her) laptop or desktop computer. When the user logs off the laptop or desktop computer, the management service synchronizes the local credentials with the remote cache. Remote caching can be implemented as a remote directory service, such as Microsoft WINDOWS Active Directory available in the operating environment. Alternatively, in response to other events, the management service can synchronize. For example, real-time synchronization can occur in response to one or more credentials being added, deleted, and / or modified.
[0019] Later, the user can retrieve the e-mail message using his (or her) personal digital assistant (PDA) or mobile phone. When a user logs into a mobile device, the user's credentials are synchro...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 