In one embodiment, an electronic device is used to authenticate an
identity of a user to determine that the user is permitted to access
restricted information on a server. In response to the electronic device
authenticating the identity of the user, a software module on a computer
operated by the user is permitted to access the restricted information.
In another embodiment, an electronic device is used to authenticate an
identity of a user. In response to the electronic device authenticating
the identity of the user, the settings on a computer are altered to
correspond to settings on the electronic device.