Methods and systems for secure shared smartcard access
First Claim
Patent Images
1. A method of secure access, the method comprising:
- capturing, by a security daemon in a computer system, an authentication state of a security token in response to a verification of user authentication information;
receiving a request for authentication from at least one application requiring authentication with the security token;
providing, by the security daemon in response to the request, the authentication state to the at least one application requiring authentication with the security token, wherein the security daemon utilizes the authentication state to represent the security token in authentication requests; and
allowing access to the at least one application.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment generally relates to a method of accessing a secure computer. The method includes capturing an authentication state of a security token in response to a verification of user authentication information. The method also includes providing the authentication state to at least one application requiring authentication with the security token and accessing the at least one application.
216 Citations
22 Claims
-
1. A method of secure access, the method comprising:
-
capturing, by a security daemon in a computer system, an authentication state of a security token in response to a verification of user authentication information; receiving a request for authentication from at least one application requiring authentication with the security token; providing, by the security daemon in response to the request, the authentication state to the at least one application requiring authentication with the security token, wherein the security daemon utilizes the authentication state to represent the security token in authentication requests; and allowing access to the at least one application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for secure access, comprising:
-
a computing machine configured to access a multi user multi-machine system; a security device interface with the computing machine, the security device interface configured to accept a security token for accessing the computing machine; and a security daemon configured to be executing on the computing machine, wherein the security daemon is configured to; initiate a session and capture an authentication state of the security token in response to a verification of user inputted authentication information; bind the authentication state to the session; receive a request for authentication from an application requiring authentication with the security token, wherein the security daemon utilizes the authentication state to represent the security token in authentication requests; and provide the authentication state to the application requiring authentication with the security token. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method of sharing a security token among a plurality of users, each user assigned respective initial authentication information that in combination with the security token identifies each user, the method comprising:
-
creating a respective session state for each user; creating, by a security daemon a computer system, an associated authentication state for each respective session state in response to verification of the respective initial authentication information with the security token; and binding, by the security daemon, the respective session state for each user with the associated authentication state to provide access to secure applications, wherein the security daemon utilizes the associated authentication state to represent the security token to provide access to secure applications cleared for access for the respective user.
-
Specification