CONTROLLED AND CLIENT-SIDE AUTHENTICATION MODULE
First Claim
1. A computerized method of accessing a secure resource using an application associated with a user'"'"'s computing device, wherein the application is programmed, in part, to monitor user browsing activity and wherein the application has associated therewith one or more predefined Uniform Resource Locaters (URLs) to trusted sites, each having an associated trusted root certificate and security key, the method comprising:
- the application detecting a user attempt to log into a secure resource;
the application scanning in-process browser processes to identify a browser process that is in a login state;
the application associating the browser process in a login state with one of the trusted sites;
the application initiating a new browser session with the trusted site using the associated predefined URL;
the application obtaining a login password from the user;
the application supplying to the trusted site the associated security key and login password; and
the user'"'"'s computer displaying subsequent browsing activity.
4 Assignments
0 Petitions
Accused Products
Abstract
A computerized method of accessing a secure resource using an application associated with a user'"'"'s computing device is provided. The application is programmed, in part, to monitor user browsing activity and wherein the application has associated therewith one or more predefined Uniform Resource Locaters (URLs) to trusted sites, each having an associated trusted root certificate and security key. The method includes the application detecting a user attempt to log into a secure resource, the application scanning in-process browser processes to identify a browser process that is in a login state, the application associating the browser process in a login state with one of the trusted sites, the application initiating a new browser session with the trusted site using the associated predefined URL, the application obtaining a login password from the user, the application supplying to the trusted site the associated security key and login password, and the user'"'"'s computer displaying subsequent browsing activity.
-
Citations
15 Claims
-
1. A computerized method of accessing a secure resource using an application associated with a user'"'"'s computing device, wherein the application is programmed, in part, to monitor user browsing activity and wherein the application has associated therewith one or more predefined Uniform Resource Locaters (URLs) to trusted sites, each having an associated trusted root certificate and security key, the method comprising:
-
the application detecting a user attempt to log into a secure resource; the application scanning in-process browser processes to identify a browser process that is in a login state; the application associating the browser process in a login state with one of the trusted sites; the application initiating a new browser session with the trusted site using the associated predefined URL; the application obtaining a login password from the user; the application supplying to the trusted site the associated security key and login password; and the user'"'"'s computer displaying subsequent browsing activity. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-readable medium having stored thereon computer-executable instructions, wherein the instructions have associated therewith one or more predefined Uniform Resource Locaters (URLs) to trusted sites, each having an associated trusted root certificate and security key, wherein the instructions program an associated computing device to:
-
monitor user browsing activity to thereby detect a user attempt to log into a trusted site; scan in-process browser processes to identify a browser process that is in a login state; associate the browser process in a login state with one of the trusted sites; initiate a new browser session with the trusted site using the associated predefined URL; obtain a login password from the user; and supply to the trusted site the associated security key and login password to thereby allow the user to access the trusted site. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer-implemented method for securely accessing online resources, comprising:
-
providing an application for execution on a user computer, wherein the application has associated therewith one or more predefined Uniform Resource Locaters (URLs) to trusted sites, each having an associated trusted root certificate and security key; a user executing the application on the user computer; the application monitoring user browsing activity; the application detecting a user attempt to log into a secure resource; the application scanning in-process browser processes to identify a browser process that is in a login state; the application associating the browser process in a login state with one of the trusted sites; the application initiating a new browser session with the trusted site using the associated predefined URL; the application obtaining a login password from the user; the application supplying to the trusted site the associated security key and login password; and the user'"'"'s computer displaying subsequent browsing activity. - View Dependent Claims (12, 13, 14, 15)
-
Specification