PORTABLE ENCRYPTION AND AUTHENTICATION SERVICE MODULE
First Claim
11. The portable, hand-held electronic device of claim 1, wherein the software instructions further configure the processor to decrypt the information.
1 Assignment
0 Petitions
Accused Products
Abstract
Portable, hand-held electronic devices and methods to allow a user to anonymously utilize a host device are presented. The host device includes a processor to communicate with an application having a target network address. The portable, hand-held electronic devices includes an onboard database that stores user credential information and a portable encryption and authentication service module (PPEASM) that allows to make a secure communication channel with the host device. The PPEASM configures the processor of the host device to instantiate a virtual machine and render an encrypted messaging interface for communicating between the virtual machine and the application in the host device. Then, PPEASM can also configure the processor to negotiate authentication of the user with the application by utilizing the user credential information and information received through the encrypted messaging interface.
-
Citations
21 Claims
- 11. The portable, hand-held electronic device of claim 1, wherein the software instructions further configure the processor to decrypt the information.
-
11-1. A method of authenticating a user to access an application having a target network address, comprising:
-
causing a processor of a host device to instantiate a virtual machine on top of a native operating system (OS) running on the host device, wherein the virtual machine stores user credential information associated with the user; instantiating, by the virtual machine, a Transmission Control Protocol/Internet Protocol (TCP/IP) messaging server having an IP address different from any IP address of the host device; rendering, by the virtual machine, an encrypted messaging interface that utilizes that TCP/IP messaging server to communicate with the application over a TCP/IP networking layer; and negotiating, by the virtual machine, authentication of the user with the application by utilizing the user credential information and information received through the encrypted messaging interface.
-
-
12-1. The method of claim 11, wherein the application runs on top of the native OS.
Specification