ACCESS TO SOFTWARE APPLICATIONS
First Claim
1. A computing device comprising one or more data stores and one or more processors, the one or more data stores being configured to store:
- an operating system of the computing device; and
a set of executable code comprising first, second and third subsets of data, the first subset of data comprising first encrypted data and the second subset of data comprising second encrypted data, the first encrypted data being different from the second encrypted data, wherein, responsive to receipt of first authentication data for authenticating a first user, the computing device is arranged to decrypt said first encrypted data to generate first decrypted data, and to configure the third subset of data based on the first decrypted data so that the third subset of data is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the first user; and
responsive to receipt of second authentication data for authenticating a second user, the second authentication data being different from the first authentication data, the computing device is arranged to decrypt said second encrypted data to generate second decrypted data, and to configure the third subset of data based on the second decrypted data so that the third subset of data is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the second user.
5 Assignments
0 Petitions
Accused Products
Abstract
A computing device stores a set of executable code comprising first, second and third subsets of data. The first and second subsets of data comprise first and second encrypted data, respectively. Responsive to receipt of first authentication data for authenticating a respective user, the computing device is arranged to decrypt one of the first and second encrypted data to generate decrypted data, and to configure the third subset of data based on the decrypted data. The third subset of data, having been so configured, is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the respective user. Thus an application-level log in is provided.
-
Citations
24 Claims
-
1. A computing device comprising one or more data stores and one or more processors, the one or more data stores being configured to store:
-
an operating system of the computing device; and a set of executable code comprising first, second and third subsets of data, the first subset of data comprising first encrypted data and the second subset of data comprising second encrypted data, the first encrypted data being different from the second encrypted data, wherein, responsive to receipt of first authentication data for authenticating a first user, the computing device is arranged to decrypt said first encrypted data to generate first decrypted data, and to configure the third subset of data based on the first decrypted data so that the third subset of data is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the first user; and
responsive to receipt of second authentication data for authenticating a second user, the second authentication data being different from the first authentication data, the computing device is arranged to decrypt said second encrypted data to generate second decrypted data, and to configure the third subset of data based on the second decrypted data so that the third subset of data is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the second user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory computer-readable storage medium comprising computer-executable instructions which, when executed by a processor, cause a computing device to perform a method of authenticating a user, the computing device comprising one or more data stores configured to store an operating system of the computing device, and the method comprising:
-
storing, in the one or more data stores, a set of executable code comprising first, second and third subsets of data, the first subset of data comprising first encrypted data and the second subset of data comprising second encrypted data, the first encrypted data being different from the second encrypted data; responsive to receipt of first authentication data for authenticating a first user, decrypting said first encrypted data to generate first decrypted data, and to configure the third subset of data based on the first decrypted data so that the third subset of data is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the first user; and responsive to receipt of second authentication data for authenticating a second user, the second authentication data being different from the first authentication data, decrypting said second encrypted data to generate second decrypted data, and to configure the third subset of data based on the second decrypted data so that the third subset of data is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the second user.
-
-
24. A method of authenticating a user at a computing device, the computing device comprising one or more data stores configured to store an operating system of the computing device, and the method comprising:
-
storing, in the one or more data stores, a set of executable code comprising first, second and third subsets of data, the first subset of data comprising first encrypted data and the second subset of data comprising second encrypted data, the first encrypted data being different from the second encrypted data; responsive to receipt of first authentication data for authenticating a first user, decrypting said first encrypted data to generate first decrypted data, and to configure the third subset of data based on the first decrypted data so that the third subset of data is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the first user; and responsive to receipt of second authentication data for authenticating a second user, the second authentication data being different from the first authentication data, decrypting said second encrypted data to generate second decrypted data, and to configure the third subset of data based on the second decrypted data so that the third subset of data is executable by the one or more processors using the operating system to perform one or more tasks on behalf of the second user.
-
Specification