The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Dec. 29, 2009
Filed:
Apr. 15, 2003
Andrew P. Sinclair, Redmond, WA (US);
John E. Brezak, Jr., Woodinville, WA (US);
Eric Flo, Sammamish, WA (US);
Chris Guzak, Kirkland, WA (US);
Sean O. Lyndersay, Seattle, WA (US);
Sterling Reasor, Bellevue, WA (US);
Richard B. Ward, Redmond, WA (US);
Andrew P. Sinclair, Redmond, WA (US);
John E. Brezak, Jr., Woodinville, WA (US);
Eric Flo, Sammamish, WA (US);
Chris Guzak, Kirkland, WA (US);
Sean O. Lyndersay, Seattle, WA (US);
Sterling Reasor, Bellevue, WA (US);
Richard B. Ward, Redmond, WA (US);
Microsoft Corporation, Redmond, WA (US);
Abstract
Computers on a local computer network, such as a home network or a small business network, are formed into a secured network group that provides common user access control and enables resource sharing among the computers in the group. A computer on the local network discovers whether there are secured network groups existing on the local network. If one secured network group is found, the computer indicates to a second computer in the group its desire to join the group, and establishes trust with that computer, such as by entering a proper user name and password, or a secret identification number. Once the trust is established, the first computer joins the group. Within the secured network group, user accounts and user profiles are replicated to each of the computers in the group. The establishment of trust and the replication of user accounts and profiles among the computers in the group enable the implementation of security policies and user access control in a group-wide manner.