Method for serving a plurality of applications by a security token
First Claim
1. A method for serving a plurality of application programs by a security token, the method comprising the steps of:
- providing to each of said applications a credential for accessing a service provided by said security token, wherein the credential of any application differs from the credential of any other said application;
upon requesting said service by one of said application programs, authenticating the user thereof; and
upon positively authenticating said user by said token, providing said service to said application.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to a method for serving a plurality of application programs by a security token, the method comprising the steps of: providing to each of said applications a credential for accessing a service provided by said security token, wherein the credential of one application differs from the credential of each of the other applications; upon requesting the service by one of the application programs, authenticating the user thereof; and upon positively authenticating the user by the token, providing the service to the application. The method may further comprise the step of: upon positively authenticating a user: providing to the application a marker; caching the marker; and upon requesting the service by the application program a subsequent time on the session, retrieving the cached user identity information, and presenting the information to the token. According to a preferred embodiment of the invention, the marker remains valid for a time period.
21 Citations
7 Claims
-
1. A method for serving a plurality of application programs by a security token, the method comprising the steps of:
-
providing to each of said applications a credential for accessing a service provided by said security token, wherein the credential of any application differs from the credential of any other said application;
upon requesting said service by one of said application programs, authenticating the user thereof; and
upon positively authenticating said user by said token, providing said service to said application. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification