Claims
- 1. A method for logging a new user into a data processing device with an operating system and an application program, comprising the sequential steps of:
in a first step, determining authentication data for authenticating a user; defining an identity and access rights depending on the authentication data; and providing access, depending on the defined access rights, for at least one of the application program and sensitive data; the method being independent of restarting the operating system or the application program.
- 2. The method according to claim 1, further comprising:
displaying a user interface, depending on the defined access rights; performing a user switch process step that causes the method to begin again at the first step, content of a user interface remaining unchanged until access rights have been defined again.
- 3. The method according to claim 2, wherein the content of the user interface is reduced if the renewed definition of access rights defines a more limited scope than the previous definition allowed.
- 4. The method according to claim 3, further comprising:
generating a warning message indicating a reduction in content and that the user has an opportunity to begin the method at the first step again before the reduction.
- 5. The method according to claim 1, further comprising:
displaying a user interface in accordance with the access rights that are defined; deleting, by a User Logout procedure, content of a user interface; and starting the method from the first step again.
- 6. The method according to claim 1, further comprising:
logging all access to the application program and all access to the sensitive data together with the respectively defined identity.
- 7. The method according to claim 1, further comprising:
activating a screen saver by a defined condition to make a user interface illegible; and beginning the method from the first step again.
- 8. The method according to claim 7, wherein the defined condition is some amount of elapsed time.
- 9. The method according to claim 1, further comprising:
blocking all access rights based upon a failed attempt to authenticate a user in the first step.
- 10. A computer program that is configured to run on a data processing device to run the method according to claim 1.
- 11. A data storage media having a program is stored upon it which can work with a data processing device to run the method according to claim 1.
Priority Claims (1)
| Number |
Date |
Country |
Kind |
| 10256078.1 |
Nov 2002 |
DE |
|
CROSS-REFERENCES TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Application No. 60/430,206, filed Dec. 2, 2002, herein incorporated by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60430206 |
Dec 2002 |
US |