Method, apparatus, and system for sending credentials securely
First Claim
Patent Images
1. A method comprising:
- connecting to a remote server using a software application executing in a first local operating environment;
determining in the first local operating environment that the remote server requires a user credential to complete a transaction;
requesting from the first local operating environment to a second local operating environment via a secure interface, that the second local operating environment authenticate the user credential to the remote server;
authenticating with the second local operating environment the user credential in response to the request from the first local operating environment;
communicating the user credential of the user to the remote server from the second local operating environment to initiate a secure session with the remote server; and
communicating in the secure session from the first local operating environment with the remote server.
1 Assignment
0 Petitions
Accused Products
Abstract
A software application executing in a first local operating environment may be used to connect to a remote server that requires a credential of a user to complete a transaction. In a second local operating environment that operates external to the first local environment, a user may be authenticated based on a user input received in the second local operating environment. The credential of the user may be securely communicated to the remote server from the second local operating environment. Other embodiments are described and claimed.
-
Citations
21 Claims
-
1. A method comprising:
-
connecting to a remote server using a software application executing in a first local operating environment; determining in the first local operating environment that the remote server requires a user credential to complete a transaction; requesting from the first local operating environment to a second local operating environment via a secure interface, that the second local operating environment authenticate the user credential to the remote server; authenticating with the second local operating environment the user credential in response to the request from the first local operating environment; communicating the user credential of the user to the remote server from the second local operating environment to initiate a secure session with the remote server; and communicating in the secure session from the first local operating environment with the remote server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
a computing platform to host a first local operating environment and a second local operating environment, the second local operating environment to operate external to the first local operating environment, the first operating environment to execute a first software application to connect to a remote server, to determine that the remote server requires a user credential to complete a transaction, and to request via a secure interface, and to request via a secure interface that the second local operating environment authenticate the user credential to the remote server, the second local operating environment to execute a second software application to authenticate the user credential in response to the request, and to communicate the user credential of the user to the remote server, wherein the first local operating environment is to communicate in the secure session with the remote server; and an input device to collect the user input for reception in the second local operating environment. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method comprising:
-
connecting to a remote application from a host operating environment; determining with the host operating environment that the remote application requires a user credential for completion of a transaction; determining that the remote application supports completing the transaction from a secure local operating environment, the secure local operating environment operating external to the host operating environment; providing an out-of-band connection for the remote application to communicate with the secure local operating environment, the out-of-band connection being inaccessible to the host operating environment; receiving in the secure local operating environment via the out-of-band connection a string for completing the transaction; in the secure local operating environment, determining a user is authorized to complete the transaction based on a user input to the secure local operating environment, the user input received by the secure local operating environment in a secure input mode not visible to the host operating environment; and in response to determining the user is authorized to complete the transaction, communicating the user credential to the remote application via the out-of-band connection. - View Dependent Claims (16, 17)
-
-
18. A non-transitory processor-readable storage medium having stored thereon instructions that, if executed by a processor, cause the processor to perform a method comprising:
-
connecting to a remote server using a software application executing in a first local operating environment; determining in the first local operating environment that the remote server requires a user credential to complete a transaction; requesting from the first local operating environment to a second local operating environment via a secure interface, that the second local operating environment authenticate the user credential to the remote server; authenticating with the second local operating environment the user credential in response to the request from the first local operating environment; communicating the user credential of the user to the remote server from the second local operating environment to initiate a secure session with the remote server; and communicating in the secure session from the first local operating environment with the remote server. - View Dependent Claims (19, 20, 21)
-
Specification