Controlling Access to a Process Using a Separate Hardware Device
0 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for automatic user authentication are described. The method includes receiving information at a device, the device including a credential container; storing the information at the credential container and performing cryptographic calculations on the received information and providing the encrypted information upon request.
-
Citations
41 Claims
-
1-21. -21. (canceled)
-
22. A method for controlling access to a process to be executed on a data processing system, comprising:
-
detecting a coupling of a security device to the data processing system, wherein the security device is a separate hardware device from the data processing system and stores a plurality of authentication data items for a plurality of processes that are executable on the data processing system, wherein each authentication data item is stored in the security device in association with an indicator of a corresponding process in the plurality of processes; identifying the process to be executed on the data processing system; retrieving, from the security device, an authentication data item that is associated with the identified process to be executed on the data processing system; and injecting the retrieved authentication data item into the identified process. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A security device, comprising:
-
a first storage device that stores a plurality of authentication data items for a plurality of processes that are executable on a computing device, wherein each authentication data item is stored in the first storage device in association with an indicator of a corresponding process in the plurality of processes; a communication controller through which the computing device accesses the authentication data items stored in the first storage device; and an application program interface through which the computing device may access security device services, wherein the application program interface provides an authentication data item, from the first storage, to the computing device via the communication controller in response to an identification of a process, corresponding to the authentication data item, that is to be executed on the computing device, and wherein the computing device injects the authentication data item received from the security device into the process to be executed on the computing device. - View Dependent Claims (36, 37, 38, 39, 40, 41)
-
Specification