Uniform modular framework for a host computer system
4 Assignments
0 Petitions
Accused Products
Abstract
A security framework for a host computer system which allows a host to control access to a compliant security token by ensuring enforcement of established security policies administered by a middleware application. Processing between the host computer system and the security token is performed using one or more modular security application agents. The modular security application agents are counterpart applications to security applications installed in the security token and may be retrieved and installed upon to ensure compatibility between counterpart token and host security applications. The security policies are a composite of host security policies and token security policies which are logically combined by the middleware application at the beginning of a session.
-
Citations
74 Claims
-
1-54. -54. (canceled)
-
55. A security system, comprising:
-
a security token having retrievable token security policies; and a host computer system having retrievable host security policies and a token access control application that generates a combined set of security policies using at least one of the host security policies and the token security policies, wherein the host computer enforces the set of security policies when the compliant security token is used to perform a security function. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73)
-
-
74. A method of implementing a security system, comprising:
-
providing a security token having retrievable token security policies; and a host computer system enforcing the set of security policies when the compliant security token is used to perform a security function, wherein the host computer has retrievable host security policies and a token access control application that generates a combined set of security policies using at least one of the host security policies and the token security policies.
-
Specification