System and Method for Enabling Seamless Transfer of a Secure Session
First Claim
1. An information handling system comprising:
- a memory; and
a processor to execute instructions stored in the memory to cause the processor to at least;
send identification information to a second information handling system in response to an identification request broadcast from the second information handling system via a short-range communication;
receive first authentication information for a local application and a remote service from the second information handling system;
receive a copy of the local application, wherein the copy of the local application includes session data from a secure session between the local application and the remote service, and keys used to encrypt and decrypt information sent during the secure session;
authenticate a user for the copy of the local application and for the remote service prior to the user logging on to the information handling system based on the first authentication information;
receive an updated copy of the local application from the second information handling system;
receive second authentication information from the user to access the information handling system;
authenticate the user to the information handling system based on the second authentication information; and
automatically initiate a secure session between the copy of the local application and the remote service when the user is authenticated to the information handling system.
14 Assignments
0 Petitions
Accused Products
Abstract
An information handling system includes a memory and a processor to execute instructions stored in the memory, which causes the processor to at least: send identification information to a second information handling system in response to an identification request broadcast from the second information handling system via a short-range communication; receive first authentication information for a local application and a remote service from the second information handling system; receive a copy of the local application; authenticate a user for the copy of the local application and for the remote service prior to the user logging on to the information handling system; receive second authentication information from the user to access the information handling system; authenticate the user to the information handling system; and automatically initiate a secure session between the copy of the local application and the remote service when the user is authenticated to the information handling system.
108 Citations
18 Claims
-
1. An information handling system comprising:
-
a memory; and a processor to execute instructions stored in the memory to cause the processor to at least; send identification information to a second information handling system in response to an identification request broadcast from the second information handling system via a short-range communication; receive first authentication information for a local application and a remote service from the second information handling system; receive a copy of the local application, wherein the copy of the local application includes session data from a secure session between the local application and the remote service, and keys used to encrypt and decrypt information sent during the secure session; authenticate a user for the copy of the local application and for the remote service prior to the user logging on to the information handling system based on the first authentication information; receive an updated copy of the local application from the second information handling system; receive second authentication information from the user to access the information handling system; authenticate the user to the information handling system based on the second authentication information; and automatically initiate a secure session between the copy of the local application and the remote service when the user is authenticated to the information handling system. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
sending, from a first device, identification information to a second device in response to an identification request broadcast from the second device via a short-range communication, wherein the short-range communication is selected from a group consisting of a blue tooth communication and a near field communication; receiving first authentication information for a local application and a remote service from the second device; receiving a copy of the local application, wherein the copy of the local application includes session data from a secure session between the local application and the remote service, and keys used to encrypt and decrypt information sent during the secure session; authenticating, at the first device, a user for the copy of the local application and for the remote service prior to the user logging on to the first device based on the first authentication information; receiving an updated copy of the local application from the second device; receiving, at the first device, second authentication information from the user to access the first device; authenticating the user to the first device based on the second authentication information; and automatically initiating a secure session between the copy of the local application and the remote service when the user is authenticated to the first device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method comprising:
-
receiving, at a device, authentication information for a local application and a remote service from the user; authenticating, at the device, the user for the local application and for the remote service based on the authentication information; creating a list of trusted devices for a user prior to when the user is authenticated for the local application and the remote service; detecting, by the device, a nearby device when the user is authenticated for the local application and for the remote service; receiving identification information from the nearby device; received the list of trusted devices; verifying the nearby device as a trusted device when the identification information for the device is located in the list of trusted devices; sending the authentication information for the local application and the remote service to the nearby device when the nearby device is verified, wherein the nearby device uses the authentication information for the local application and the remote service to pre-authenticate the nearby device for the local application and the remote service prior to the user accessing the nearby device; initiating a secure session between the local application and the remote service; and sending an update to the local application and the secure session with the remote service to the nearby device. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
12. (canceled)
Specification