SECURITY APPARATUS SESSION SHARING
First Claim
1. A method comprising:
- establishing, by a first application executing on an electronic device, a session with a security apparatus of the electronic device;
receiving, by the first application, a token enabling the first application to utilize the security apparatus; and
providing, by the first application, the token to a second application executing on the electronic device, wherein the token enables the second application to utilize the security apparatus.
6 Assignments
0 Petitions
Accused Products
Abstract
An electronic device includes multiple applications that can access a smart card or other security apparatus. A first application that is to use the security apparatus prompts a user for a security string such as a PIN or password. Upon receipt of the PIN or password, the first application unlocks the security apparatus for use. Additionally, the first application receives a token from a security service that interfaces with the security apparatus. The token can be shared by the first application with other applications. For example, the first application can share the token with other trusted applications. The other applications that receive the token can refrain from issuing a prompt for a security string and receiving a response from the user. The token can be used instead of the security string to obtain access to the security apparatus.
28 Citations
20 Claims
-
1. A method comprising:
-
establishing, by a first application executing on an electronic device, a session with a security apparatus of the electronic device; receiving, by the first application, a token enabling the first application to utilize the security apparatus; and providing, by the first application, the token to a second application executing on the electronic device, wherein the token enables the second application to utilize the security apparatus. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A machine readable storage medium having stored thereon executable instructions for causing one or more processors to perform operations comprising:
-
establishing, by a first application executing on an electronic device, a session with a security apparatus of the electronic device; receiving, by the first application, a token enabling the first application to utilize security apparatus; and providing, by the first application, the token to a second application executing on the electronic device, wherein the token enables the second application to utilize the security apparatus. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus comprising:
-
one or more processors; and a machine readable storage medium communicably coupled to the one or more processors, the machine readable storage medium configured to store instructions, that when executed by the one or more processors cause the apparatus to; establish, by a first application, a session with a security apparatus; receive, by the first application, a token enabling the first application to utilize the security apparatus; and provide, by the first application, the token to a second application, wherein the token enables the second application to utilize the security apparatus. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification