Trusted Mobile Device Based Security
2 Assignments
0 Petitions
Accused Products
Abstract
A method for performing user security operations using a mobile communications device includes, storing at least one security credential for a user in the mobile communications device, receiving a request from a client computer to perform an action requiring the stored at least one security credential, wherein the request includes information regarding a service application for which the action is requested, determining a response to the request based upon at least one user configured personal security preference at the mobile communications device, and transmitting the determined response to the client computer. Corresponding system and computer program products are also described.
83 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method for performing user security operations using a mobile communications device, comprising:
-
receiving at the mobile communications device, a first request sent from a first client computer and a second request sent from a second client computer, wherein the first and second requests are responsive to simultaneous access by from the first and second client computers to at least one service application executing in at least one remote server through communication between each of the first and second client computers and the remote server and the communication not being via the mobile communications device; accessing a first rule and a second rule stored in the mobile communications device in response respectively to the first and second requests, wherein the first rule includes a personal security configuration associated with the first client computer and the second rule includes a personal security configuration associated with the second client computer; performing a first action in accordance with the first rule using at least one security credential stored in the mobile communications device to generate a response to the first client computer, wherein the at least one security credential is associated with a user; performing a second action in accordance with the second rule using the at least one security credential to generate a response to the second client computer; and transmitting the generated first and second responses to respectively the first client computer and the second client computer. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A system for user security operations using a mobile communications device, comprising:
a mobile communications device including; a processor; at least one memory coupled to the processor; at least one communications interface coupled to the processor and configured to establish communication links from the mobile communications device to a first client computer and a second client computer; a credential configuration module configured to, when executed by the processor, store at least one security credential for the user in the at least one memory; a client request receiver configured to, when executed by the processor; receiving at the mobile communications device, a first request sent from a first client computer and a second request sent from a second client computer, wherein the first and second requests are responsive to simultaneous access by from the first and second client computers to at least one service application executing in at least one remote server through communication between each of the first and second client computers and the remote server and the communication not being via the mobile communications device; access at least a first rule and a second rule stored in the mobile communications device in response respectively to the first and second requests, wherein the first rule includes a personal security configuration associated with the first client computer and the second rule includes a personal security configuration associated with the second client computer; a request validation module configured to, when executed by the processor; perform a first action in accordance with the first rule using the at least one security credential to generate a response to the first client computer, wherein the at least one security credential is associated with a user; and perform a second action in accordance with the second rule using the at least one security credential to generate a response to the second client computer; and a client response transmitter configured to, when executed by the processor, transmit the generated first and second responses to respectively the first client computer and the second client computer. - View Dependent Claims (35, 36, 37, 38)
-
39. A computer program product comprising a computer readable storage medium having computer program logic stored thereon that, when executed by a processor, cause the processor to perform operations comprising:
-
receiving at the mobile communications device, a first request sent from a first client computer and a second request sent from a second client computer, wherein the first and second requests are responsive to simultaneous access by from the first and second client computers to at least one service application executing in at least one remote server through communication between each of the first and second client computers and the remote server and the communication not being via the mobile communications device; accessing a first rule and a second rule stored in the mobile communications device in response respectively to the first and second requests, wherein the first rule includes a personal security configuration associated with the first client computer and the second rule includes a personal security configuration associated with the second client computer; performing a first action in accordance with the first rule using at least one security credential stored in the mobile communications device to generate a response to the first client computer, wherein the at least one security credential is associated with a user; performing a second action in accordance with the second rule using the at least one security credential to generate a response to the second client computer; and transmitting the generated first and second responses to respectively the first client computer and the second client computer. - View Dependent Claims (40)
-
Specification