Browse Prior Art Database

Authentication for a Wireless Portable Workstation

IP.com Disclosure Number: IPCOM000119468D
Original Publication Date: 1991-Jan-01
Included in the Prior Art Database: 2005-Apr-01
Document File: 1 page(s) / 34K

Publishing Venue

IBM

Related People

Harrison, CG: AUTHOR

Abstract

Portable computers with wireless communication may be left unattended by their users in areas accessible to unauthorized users of the portable computer and the distributed computing systems to which it is attached via the wireless link. A process is described below for enforcing the periodic verification of the user's identity. 1. The workstation is delivered with a preset password, which is communicated separately to the user. 2. The user should change the password to a private password as soon as possible. 3. The password is required to begin execution of applications and also for the initial access to the wireless communications medium. 4.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 100% of the total text.

Authentication for a Wireless Portable Workstation

      Portable computers with wireless communication may be left
unattended by their users in areas accessible to unauthorized users
of the portable computer and the distributed computing systems to
which it is attached via the wireless link.  A process is described
below for enforcing the periodic verification of the user's identity.
1.   The workstation is delivered with a preset password, which is
communicated separately to the user.
2.   The user should change the password to a private password as
soon as possible.
3.   The password is required to begin execution of applications and
also for the initial access to the wireless communications medium.
4.   If the workstation is left idle for a user-controllable period,
typically, several minutes, internal power management mechanisms will
place the notepad in one of a combination of hardware and software
states in which power consumption is strongly reduced.  These states
may also be deliberately selected by the user.
5.   In order to return the workstation to its previous operating
state, the user is required by the operating system to re-enter the
password.
Thus, the user is required to re-authenticate his or her use of the
notepad, whenever there is a possibility that it has been left
unattended.

      Disclosed anonymously.