Methods and systems for secure shared smartcard access
First Claim
Patent Images
1. A method of accessing a secure computer, the method comprising:
- capturing an authentication state of a security token in response to a verification of user authentication information;
providing the authentication state to at least one application requiring authentication with the security token; and
accessing the at least one application.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment generally relates to a method of accessing a secure computer. The method includes capturing an authentication state of a security token in response to a verification of user authentication information. The method also includes providing the authentication state to at least one application requiring authentication with the security token and accessing the at least one application.
104 Citations
22 Claims
-
1. A method of accessing a secure computer, the method comprising:
-
capturing an authentication state of a security token in response to a verification of user authentication information; providing the authentication state to at least one application requiring authentication with the security token; and accessing the at least one application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for secure access, comprising:
-
a computing machine configured to access a multi-user multi-machine system; a security device interface with the computing machine, the security device configured to accept a security token for accessing the computing machine; and a security daemon configured to be executing on the computing machine, wherein the security daemon is configured to initiate a session and capture an authentication state of a security token in response to a verification of user inputted authentication information and bind the authentication state to the session. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of sharing a security token, the method comprising:
-
providing the security token to a plurality of users, each user assigned respective initial authentication information and in combination with the security token identifies each user; creating a respective session state for each user; creating an associated authentication state for each respective session state in response to verification of the respective initial authentication information with the security token; and binding the respective session state for each user with the associated authentication state to provide access to secure applications, wherein the authentication state of held by session state provides access to secure applications cleared for access for the respective user.
-
Specification