Secured Execution Environments and Methods
First Claim
1. A method of providing a secured portable execution environment device, the method comprising the following steps:
- providing a user with access to a configuration server;
using the configuration server to present a device configuration interface through which the user can (a) select a plurality of applications, and (b) submit a user authentication token;
using the configuration server to store the selected ones of the applications in a memory of the portable execution environment device, wherein the portable execution environment device has a computing host interface;
storing an application launcher in the memory;
establishing a secured container within the memory; and
using the configuration server to configure the application launcher to (a) allow launching of any one of the selected ones of the applications in a volatile memory of a host computer system coupled to the computing host interface, and (b) access the secured container through the computing host interface, when the user authenticates its identity via the user authentication token; and
providing the portable execution environment device to the user.
0 Assignments
0 Petitions
Accused Products
Abstract
A secured portable execution environment device could be provided by a business as a fee-based service, where a user selects applications that he wishes to license and methods of securing and backing up the execution environment. The device could be provided as a portable flash drive, which could then be plugged into any computer with any operating system to access the execution environment saved on the drive. When the user executes an application launcher on the flash drive and authenticates his identity, the application launcher allows the user to access secure applications saved on the flash drive and secure data saved in the application launcher environment.
93 Citations
20 Claims
-
1. A method of providing a secured portable execution environment device, the method comprising the following steps:
-
providing a user with access to a configuration server; using the configuration server to present a device configuration interface through which the user can (a) select a plurality of applications, and (b) submit a user authentication token; using the configuration server to store the selected ones of the applications in a memory of the portable execution environment device, wherein the portable execution environment device has a computing host interface; storing an application launcher in the memory; establishing a secured container within the memory; and using the configuration server to configure the application launcher to (a) allow launching of any one of the selected ones of the applications in a volatile memory of a host computer system coupled to the computing host interface, and (b) access the secured container through the computing host interface, when the user authenticates its identity via the user authentication token; and providing the portable execution environment device to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification