Systems and Methods for Credential Management Between Electronic Devices
First Claim
1. A method on a first electronic device for enabling a user to access a secure website, the method comprising:
- using a browser application to detect navigation to a login page of the secure website, the secure website requiring user credentials for access thereto;
detecting a presence of a second electronic device proximal to the first electronic device;
authenticating, by a processor of the first electronic device, the first electronic device to the second electronic device;
sending, to the second electronic device, an identification of the secure website;
receiving, from the second electronic device, user credentials based on the identification of the secure website; and
populating the login page with the user credentials.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments are provided for managing user credentials that enable access to secure websites. According to certain aspects, a browser device connects (230) to a website server that hosts a secure website. The browser device initiates (236) a credential request and enters (238) a discovery routine with a mobile device. After establishing (240) a secure channel with the mobile device, the browser device sends (248) an identification of the secure website to the mobile device, which identifies (250) corresponding user credentials and sends (252) the user credentials to the browser device. The browser device populates (254) a login page with the user credentials and accesses (256) the secure website.
36 Citations
22 Claims
-
1. A method on a first electronic device for enabling a user to access a secure website, the method comprising:
-
using a browser application to detect navigation to a login page of the secure website, the secure website requiring user credentials for access thereto; detecting a presence of a second electronic device proximal to the first electronic device; authenticating, by a processor of the first electronic device, the first electronic device to the second electronic device; sending, to the second electronic device, an identification of the secure website; receiving, from the second electronic device, user credentials based on the identification of the secure website; and populating the login page with the user credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method in a first electronic device of providing user credentials for access to a secure website, the method comprising:
-
detecting a presence of a second electronic device proximal to the first electronic device; authenticating, by a processor of the first electronic device, the first electronic device to the second electronic device; receiving, from the second electronic device, an identification of the secure website; identifying, by a credential manager application of the first electronic device, the user credentials based on the identification of the website; and sending the user credentials to the second electronic device, wherein the second electronic device uses the user credentials with a browser application to access the secure website. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. An electronic device for enabling a user to access a secure website, comprising:
-
a memory storing a browser application configured to detect navigation to a login page of the secure website, the secure website requiring user credentials for access thereto; a communication module configured to connect to an additional electronic device; and a processor configured to interface with the memory and the communication module, and to perform operations comprising; detecting a presence of the additional electronic device proximal to the first electronic device, authenticating the electronic device to the additional electronic device, causing the communication module to send, to the additional electronic device, an identification of the secure website, receiving, from the additional electronic device via the communication module, user credentials based on the identification of the secure website, and populating the login page with the user credentials. - View Dependent Claims (19, 20, 21, 22)
-
Specification