Secure sharing of personal devices among different users
First Claim
1. A method of securely sharing personal devices among different users, the method comprising:
- a) registering a first personal device utilized by a first primary user with a first registry server;
b) registering a second personal device utilized by a second primary user with a second registry server;
c) launching an application on the first personal device by the first primary user; and
d) facilitating secure migration of the application from the first personal device to the second personal device as a function of security information contained in the first and second registry servers.
2 Assignments
0 Petitions
Accused Products
Abstract
A registry architecture for securely sharing personal devices among different users is disclosed. The registry architecture is a distributed architecture that includes at least one registry server communicating over a network with at least one personal device. The architecture provides verification and authorization of users and applications on personal devices registered with the registry server. In addition, secure migration of applications between a first personal device and at least one second personal device may be performed as a function of the registry architecture. Further, the ability to securely share a personal device among different users is provided by identification of potential users of the personal device within the registry architecture.
139 Citations
50 Claims
-
1. A method of securely sharing personal devices among different users, the method comprising:
-
a) registering a first personal device utilized by a first primary user with a first registry server;
b) registering a second personal device utilized by a second primary user with a second registry server;
c) launching an application on the first personal device by the first primary user; and
d) facilitating secure migration of the application from the first personal device to the second personal device as a function of security information contained in the first and second registry servers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of securely migrating an application operating on a first personal device to a second personal device, the method comprising:
-
a) initiating the migration;
b) transmitting to the second personal device a list of personal devices associated with a user of the first personal device;
c) authenticating the user with login information entered with a third personal device identified in the list;
d) transmitting authentication approval to the second personal device; and
e) migrating the application from the first personal device to the second personal device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of securely migrating an application operating on a first personal device to a second personal device, the method comprising:
-
a) transmitting application-related information and a user name from a first personal device to a second personal device;
b) authenticating the first personal device and the application with the second personal device as a function of a registry server;
c) transmitting a privilege level and resource capability of the second personal device to the first personal device;
d) confirming the privilege level and resource capability of the second personal device with the first personal device; and
e) migrating the application from the first personal device to the second personal device. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A method of authentication and authorization of an application and a user desiring to migrate the application, the method comprising:
-
a) registering a first and second personal device with a registry server;
b) the user launching an application on the first personal device;
c) receiving application-related information from the first personal device at the registry server;
d) enabling the second personal device as a function of the application-related information to receive login information from the user;
e) transmitting to the registry server at least one of the login information and the application-related information; and
f) authenticating the user and the application with the registry server as a function of at least one of the login information and the application-related information to approve the migration. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A system for sharing personal devices among different users, the system comprising:
-
a first personal device and a second personal device;
at least one registry server in communication with the first and second personal devices, the registry server comprising a database, the database comprising security information for at least one of the first and second personal devices, wherein the registry server is operable to authorize execution and secure migration of an application between the first personal device and the second personal device. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50)
-
Specification