Methods and arrangements for mapping widely disparate portable tokens to a static machine concentric cryptographic environment
First Claim
1. A hierarchical object-based interface method for use in a machine capable of connecting to portable-token devices, the interface method comprising:
- identifying when a portable-token device has been connected to the machine;
upon identifying that the portable-token device has been connected to the machine, causing a processing unit within the machine to instantiate portable-token device control object logic operatively configured to manage the portable-token device;
causing the portable-token device control object logic to further instantiate container control object logic operatively configured to manage a specific key container associated with the portable-token device;
causing the container control object logic to further instantiate key pair control object logic operatively configured to manage individual key pairs provided by the portable-token device; and
causing at least one control object logic selected from a group of control object logic that includes the portable-token device control object logic, the container control object logic and the key pair control object logic to further instantiate certificate list object logic operatively configured to enumerate over a set of certificate objects associated with the at least one control object.
2 Assignments
0 Petitions
Accused Products
Abstract
Various methods and arrangements are provided to form an interface that allows portable token devices to be used within static machine concentric cryptographic environments. One example of a portable token device is a smart card that can be read or other accessed by a computer through a smart card reader. A cryptographic API, associated with the operating system of the computer, is configured to separate the applications from the cryptographic functions that require the portable tokens. The cryptographic API accesses a smart card cryptographic server provider (SC-CSP) that is configured to work with a smart card cryptographic provider (SCCP) program as part of the interface. This SC-CSP/SCCP interface determines that the requested cryptographic function requires a specific smart card and requests that the user provide the appropriate smart card. The SC-CSP and SCCP are object-oriented and utilize method invocation to provide an efficient and reliable interface that can support a variety of different portable tokens and cryptographic needs.
-
Citations
19 Claims
-
1. A hierarchical object-based interface method for use in a machine capable of connecting to portable-token devices, the interface method comprising:
-
identifying when a portable-token device has been connected to the machine;
upon identifying that the portable-token device has been connected to the machine, causing a processing unit within the machine to instantiate portable-token device control object logic operatively configured to manage the portable-token device;
causing the portable-token device control object logic to further instantiate container control object logic operatively configured to manage a specific key container associated with the portable-token device;
causing the container control object logic to further instantiate key pair control object logic operatively configured to manage individual key pairs provided by the portable-token device; and
causing at least one control object logic selected from a group of control object logic that includes the portable-token device control object logic, the container control object logic and the key pair control object logic to further instantiate certificate list object logic operatively configured to enumerate over a set of certificate objects associated with the at least one control object. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable medium having computer-executable instructions for performing acts comprising:
-
within a machine that is configurable to connect to at least one portable-token device, establishing a hierarchical object-based interface by identifying when a portable-token device has been connected to the machine, causing a processing unit within the machine to instantiate portable-token device control object logic operatively configured to manage the portable-token device, causing the portable-token device control object logic to further instantiate container control object logic operatively configured to manage a specific key container associated with the portable-token device, causing the container control object logic to further instantiate key pair control object logic operatively configured to manage individual key pairs provided by the portable-token device, and causing at least one control object logic selected from a group of control object logic that includes the portable-token device control object logic, the container control object logic and the key pair control object logic to further instantiate certificate list object logic operatively configured to enumerate over a set of certificate objects associated with the at least one control object. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification