×

Controlling access to a process using a separate hardware device

  • US 8,850,558 B2
  • Filed: 02/02/2009
  • Issued: 09/30/2014
  • Est. Priority Date: 03/03/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for controlling access to a process to be executed on a data processing system, comprising:

  • detecting a coupling of a security device to the data processing system, wherein the security device is a portable hand-held separate hardware device from the data processing system and stores a plurality of authentication data items for a plurality of processes that are executable on the data processing system, wherein each authentication data item is stored in the security device in association with an indicator of a corresponding process in the plurality of processes;

    identifying, by an access agent executing on the data processing system, the process to be executed on the data processing system;

    determining, by the access agent, whether an access script exists for the identified process in a corresponding authentication data item stored in the security device;

    retrieving, by the access agent from the security device, in response to determining that an access script does exist for the process in the authentication data item, the authentication data item that is associated with the identified process to be executed on the data processing system based on an identifier of the process to be executed on the data processing system;

    in response to retrieving the authentication data item, injecting, by the access agent, the retrieved authentication data item into the identified process, wherein each authentication data item comprises an access script defining a set of operations to be played back to automatically authenticate a user to a corresponding process; and

    in response to determining that the access script does not exist for the identified process in a corresponding authentication data item, capturing, by the access agent, logon information entered by the user for the identified process and storing the logon information in a corresponding authentication data item in the security device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×