Security system and method
First Claim
1. A system for providing secure access to a computing resource comprising:
- a computing device accessible to a user after a local authentication of said user; and
, an authentication server connectable to said computing device via a connection after said local authentication and operable to provide access to said computing resource after a remote authentication of said user, said server further operable to maintain said remote authentication after said user has terminated said local authentication such that after said user re-establishes local authentication said server provides access to said resource.
2 Assignments
0 Petitions
Accused Products
Abstract
A security system and method is provided. In an embodiment, a personal integrated circuit (“PIC”), is provided that can be presented to a laptop computer. The PIC includes a digital certificate personal to an authorized user and is operable to automatically install the certificate on the laptop computer once presented into the computer and once the user enters a valid password respective to the PIC. At this point, the laptop presents the certificate to a server via a network, and the certificate is checked for validity. If valid, the user is then permitted to log into the server. Having logged into the server, the user can remain logged in even as the PIC is removed and presented to different computing devices that are also able to connect to the server via the network. Typically, the user is only able to access the server through the computing device to which the PIC is attached. The user is automatically logged out of the server after a predefined period of inactivity or according to such other criteria as may be desired.
-
Citations
32 Claims
-
1. A system for providing secure access to a computing resource comprising:
-
a computing device accessible to a user after a local authentication of said user; and
,an authentication server connectable to said computing device via a connection after said local authentication and operable to provide access to said computing resource after a remote authentication of said user, said server further operable to maintain said remote authentication after said user has terminated said local authentication such that after said user re-establishes local authentication said server provides access to said resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
- 12. An authentication server for connection with a computing device that is accessible to a user after a local authentication of said user, said authentication server connectable to said computing device via a connection after said local authentication and operable to provide access to said computing resource after a remote authentication of said user, said server further operable to maintain said remote authentication after said user has terminated said local authentication such that after said user re-establishes local authentication said server provides access to said resource.
-
23. A method of providing secure access to a computing resource comprising the steps of:
-
performing a local authentication of a user at a computing device;
performing a remote authentication at an authentication server connectable to said computing device via a connection after said local authentication;
providing access to said computing resource via said authentication server after said remote authentication; and
,maintaining said remote authentication after said user has terminated said local authentication. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method of providing secure access to a computing resource comprising:
-
sending a digital certificate from a computing device to a server;
receiving a remote user authentication at said server from said computing device and determining if said remote user authentication is valid;
terminating said method if said user authentication is not valid;
generating security keys at said server and delivering a requisite portion of those keys to said computing device;
conducting communications between said server and said computing device using said security keys; and
,maintaining said remote user authentication when said computing device disconnects from said server.
-
Specification