In one embodiment, an electronic device is used to authenticate an identity of a user to determine that the user is permitted to access restricted information on a server. In response to the electronic device authenticating the identity of the user, a software module on a computer operated by the user is permitted to access the restricted information. In another embodiment, an electronic device is used to authenticate an identity of a user. In response to the electronic device authenticating the identity of the user, the settings on a computer are altered to correspond to settings on the electronic device.

 
Web www.patentalert.com

< Data player, digital contents player, playback system, data embedding apparatus, and embedded data detection apparatus

< System and method for automatically protecting private video content using cryptographic security for legacy systems

> Methods for authenticating potential members invited to join a group

> Systems and methods for secure transaction management and electronic rights protection

~ 00275