×

Interoperable credential gathering and access modularity

  • US 7,577,659 B2
  • Filed: 10/24/2003
  • Issued: 08/18/2009
  • Est. Priority Date: 10/24/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method executed on a single local machine having a processor executing computer-executable instructions stored in a memory, the method comprising:

  • initializing, by a native operating system (OS) on the local machine, a logon user interface (UI);

    initializing, with the logon UI on the single local machine, a plurality of different coexisting credential provider modules, each for translating respectively different types of credentials into a common credential protocol, the common credential protocol being compatible with the native OS of the local machine, each said credential provider module logging a user on with the native OS on the local machine via the logon UI to access the local machine using one of a plurality of corresponding different input devices in communication with the local machine;

    receiving a first said credential from the user at a first one of said input devices in communication with the local machine;

    translating the first credential with a first one of said credential provider modules corresponding to the first input device that is in communication with the local machine;

    communicating the translated first credential having the common credential protocol through a credential provider Application Program Interface (API) to the logon UI of the native OS, wherein the credential provider API is configured to interface with each of the plurality of different coexisting credential provider modules;

    passing the translated first credential having the common credential protocol to an OS logon module of the native OS from the logon UI;

    calling the OS logon module for the native OS to authenticate the translated credential having the common credential protocol against a credential database; and

    logging the user on with the native OS to access the local machine when the authentication is successful.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×