×

Secure privilege elevation by way of secure desktop on computing device

  • US 7,832,004 B2
  • Filed: 08/10/2006
  • Issued: 11/09/2010
  • Est. Priority Date: 08/10/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method with regard to a computing device having a user desktop on which a relatively less-secure user application is executed during normal operation of the computing device, and also having a secure desktop instantiated as a system level process by the operating system and having a security level elevated from a security level of the user desktop on which a relatively more-secure secure application is executed upon a request thereto from the user application, the method for securely collecting information from a user at the computing device with regard to the secure application at the secure desktop, and comprising:

  • accessing the secure desktop using an access interface executing on the secure desktop of the computing device to securely collect the information from the user;

    receiving the request from the user application on the user desktop and in response thereto generating a background display image including a visual representation of the user application;

    visually presenting the access interface on the secure desktop in conjunction with the requesting user application of the user desktop such that the access interface is visually coupled to the requesting user application and is visually perceived by the user along with such requesting user application, further comprising;

    automatically switching the computing device from the user desktop to the secure desktop after the background display image has been generated; and

    after switching to a secure desktop;

    executing the access interface on the secure desktop and in conjunction therewith securely displaying a visual representation of the access interface in a foreground on the secure desktop on the monitor, the visual representation of the access interface including one or more prompts for securely collecting the information from the user, whereby the visual representation of the access interface is in the foreground of the monitor and the visual representation of the requesting user application is in the background display image in the background of the monitor such that the access interface is visually coupled to the requesting user application and is visually perceived by the user along with such requesting user application.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×