Computer-implemented method and system, computer-readable medium
A computer and user technology, applied in computer security devices, computing, transmission systems, etc., can solve problems such as difficulty in obtaining proprietary avatar information in the authentication user interface, poor user experience, and short use time of small text files
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] System and method implementations described herein involve a web browser or the identity of a web browser acting as an operating system for use by installed web applications. With the user's consent, the web browser can generate a unique encryption key pair for each (user, origin) pair. The public key can become the user identity of the origin (ie, web application). The key pair can be synchronized between clients so that the user does not need to enter new authentication credentials (except perhaps for browser logins) each time the user wishes to use a different web application at a different client.
[0018] Figure 1A An example web browser application 101 that can display a user interface 103 including tabs 105 , 107 and 109 is illustrated. In one implementation, tab 105 may display selectable icons for web applications 111 , 113 , 115 , and 117 . The systems and methods described herein can be used to preserve and provide a secure browser user identity that can ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


