Framework and technology to enable the portability of information cards
First Claim
Patent Images
1. A method for accessing an information card, comprising:
- identifying a pluggable card store that is available at a machine;
interfacing with the pluggable card store using a pluggable card provider;
receiving a security policy from a relying party;
receiving an identifier of an information card in the pluggable card store from a user;
transmitting requirements for a security token based on the identified information card to an identity provider;
receiving the security token from the identity provider; and
transmitting the security token to the relying party.
8 Assignments
0 Petitions
Accused Products
Abstract
When a user connects a pluggable card store to a machine, the machine plugs a pluggable card provider into a card provider registry. The pluggable card store can be an object portable to the user, or can be a remote store available via some connection, such as an FTP connection. The user can then use the information cards stored on the pluggable card store in a transaction.
171 Citations
24 Claims
-
1. A method for accessing an information card, comprising:
-
identifying a pluggable card store that is available at a machine; interfacing with the pluggable card store using a pluggable card provider; receiving a security policy from a relying party; receiving an identifier of an information card in the pluggable card store from a user; transmitting requirements for a security token based on the identified information card to an identity provider; receiving the security token from the identity provider; and transmitting the security token to the relying party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. An article, comprising a non-transitory storage medium, said non-transitory storage medium having stored thereon instructions that, when executed by a machine, result in:
-
identifying a pluggable card store that is available at a machine; interfacing with the pluggable card store using a pluggable card provider; receiving a security policy from a relying party; receiving an identifier of an information card in the pluggable card store from a user; transmitting requirements for a security token based on the identified information card to an identity provider; receiving the security token from the identity provider; and transmitting the security token to the relying party. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification