Portable encryption and authentication service module
First Claim
1. A portable, hand-held electronic device, through which a user can anonymously utilize a host device comprising a processor to communicate with a target application having a target network address, wherein the host device includes a native operating system (OS), the portable, hand-held electronic device comprises:
- an onboard database that stores user credential information; and
an onboard memory storing software instructions that, when executed by the processor, configure the processor to perform the steps of(a) receiving IP addresses associated with the host device;
(b) instantiating a virtual machine that runs on top of the native OS, wherein the virtual machine comprises a Transmission Control Protocol/Internet Protocol (TCP/IP) messaging server having an IP address different from any of the received IP address of the host device,(c) rendering an encryption and decryption service on the virtual machine for encrypting and decrypting data between the onboard database and the virtual machine,(d) rendering an encrypted messaging interface on the host device that utilizes the TCP/IP messaging server for encrypting and decrypting data between the virtual machine and the target application over a TCP/IP networking layer,(e) negotiating a data encryption protocol with the target application through a private portable encryption authentication and service module (PPEASM) interface associated with the application to enable encrypting and decrypting data between the target application and a PPEASM application, and(f) negotiating authentication of the user with the target application by utilizing the user credential information and information received at the encrypted messaging interface from the PPEASM application with user credential information on the onboard database accessed via the encryption and decryption service.
1 Assignment
0 Petitions
Accused Products
Abstract
Portable, hand-held electronic devices and methods to allow a user to anonymously utilize a host device are presented. The host device includes a processor to communicate with an application having a target network address. The portable, hand-held electronic devices includes an onboard database that stores user credential information and a portable encryption and authentication service module (PPEASM) that allows to make a secure communication channel with the host device. The PPEASM configures the processor of the host device to instantiate a virtual machine and render an encrypted messaging interface for communicating between the virtual machine and the application in the host device. Then, PPEASM can also configure the processor to negotiate authentication of the user with the application by utilizing the user credential information and information received through the encrypted messaging interface.
18 Citations
21 Claims
-
1. A portable, hand-held electronic device, through which a user can anonymously utilize a host device comprising a processor to communicate with a target application having a target network address, wherein the host device includes a native operating system (OS), the portable, hand-held electronic device comprises:
-
an onboard database that stores user credential information; and an onboard memory storing software instructions that, when executed by the processor, configure the processor to perform the steps of (a) receiving IP addresses associated with the host device; (b) instantiating a virtual machine that runs on top of the native OS, wherein the virtual machine comprises a Transmission Control Protocol/Internet Protocol (TCP/IP) messaging server having an IP address different from any of the received IP address of the host device, (c) rendering an encryption and decryption service on the virtual machine for encrypting and decrypting data between the onboard database and the virtual machine, (d) rendering an encrypted messaging interface on the host device that utilizes the TCP/IP messaging server for encrypting and decrypting data between the virtual machine and the target application over a TCP/IP networking layer, (e) negotiating a data encryption protocol with the target application through a private portable encryption authentication and service module (PPEASM) interface associated with the application to enable encrypting and decrypting data between the target application and a PPEASM application, and (f) negotiating authentication of the user with the target application by utilizing the user credential information and information received at the encrypted messaging interface from the PPEASM application with user credential information on the onboard database accessed via the encryption and decryption service. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of authenticating a user to access a target application having a target network address, comprising:
-
causing a processor of a host device to instantiate a virtual machine on top of a native operating system (OS) running on the host device, wherein the virtual machine stores user credential information associated with the user; receiving IP addresses associated with the host device; instantiating, by the virtual machine, a Transmission Control Protocol/Internet Protocol (TCP/IP) messaging server having an IP address different from any of the received IP address associated with the host device; rendering, by the virtual machine, an encryption and decryption service for encrypting and decrypting data between an onboard database storing the user credential information and the virtual machine, rendering, by the host device, an encrypted messaging interface that utilizes the TCP/IP messaging server to encrypt and decrypt data with the target application over a TCP/IP networking layer; negotiating a data encryption protocol with the target application through a private portable encryption authentication and service module (PPEASM) interface associated with the application to enable encryption and decryption of data between the target application and a PPEASM application; and negotiating, by the virtual machine, authentication of the user with the target application by utilizing the user credential information and information received at the encrypted messaging interface from the PPEASM application with user credential information on the onboard database accessed via the encryption and decryption service. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification