Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system of credential roaming among a plurality of computing facilities

A computing device and credential technology, applied in the direction of synchronously sending/receiving encrypted devices, computing, transmission systems, etc., can solve problems such as users being unable to log in and using computers, slowing down the login process, etc.

Inactive Publication Date: 2012-03-14
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, user profiles can be large (several megabytes), and downloading user profiles from a web server slows down the login process
Also, without a locally stored user profile (in case the network is unavailable), the user may not be able to log on and use the computer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system of credential roaming among a plurality of computing facilities
  • Method and system of credential roaming among a plurality of computing facilities
  • Method and system of credential roaming among a plurality of computing facilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In short, credential roaming can be implemented to synchronize local credentials (encryption keys, credentials, tokens, etc.) at any number (n) of computing devices. For illustration, a user can change, modify, add and / or delete credentials at his (or her) laptop or desktop computer. When the user logs off the laptop or desktop computer, the management service synchronizes the local credentials with the remote cache. Remote caching can be implemented as a remote directory service, such as Microsoft WINDOWS Active Directory available in the operating environment. Alternatively, in response to other events, the management service can synchronize. For example, real-time synchronization can occur in response to one or more credentials being added, deleted, and / or modified.

[0019] Later, the user can retrieve the e-mail message using his (or her) personal digital assistant (PDA) or mobile phone. When a user logs into a mobile device, the user's credentials are synchro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses to implementations to enable credential roaming among a plurality of different computing devices. An exemplary system may include an event handler to receive event notifications such as, e.g., a client logon. The event handler may invoke a management service in response to receiving an event notification. The management service may include a synchronizing module to synchronize a user's credentials with a remote directory service, such as, e.g., Active Directory, so that the user's credentials are available from any of a number of different computing devices.

Description

technical field [0001] The described subject matter relates to electronic computing, and more particularly to credential roaming systems and methods in electronic computing systems. Background technique [0002] Various types of encryption schemes are widely used to protect data (such as e-mail messages or files) communicated over a network. For example, in symmetric encryption, both the user encrypting the data and the user decrypting the data need a copy of the same encryption key. Asymmetric encryption (also known as public key encryption) uses key pairs (such as public and private keys). In asymmetric encryption, the public key is shared, but the private key is not. [0003] The encryption key can be stored in the computer system, such as as part of a user profile, or other repository for user settings, credentials, and the like. Encryption keys can be modified or replaced at any time to reduce the possibility that an unauthorized user can break the encryption scheme....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/12H04L9/08G06F21/20H04L29/06G06F21/31G06F21/41
CPCH04L2463/121H04L63/08H04L63/06E03C1/02E03C2201/50
Inventor D·B·克罗斯庄颢P·J·哈林苏晓红
Owner MICROSOFT TECH LICENSING LLC