Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for credential management on a portable device

A technology of portable equipment and user credentials, applied in the field of computer systems, can solve problems such as unsatisfied

Inactive Publication Date: 2006-01-04
SYMBOL TECH INC
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] While proxy servers have attempted to alleviate the related problems described above, there remains a substantial unmet need for a system and / or method that facilitates managing user credentials at a remote device.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for credential management on a portable device
  • Method and apparatus for credential management on a portable device
  • Method and apparatus for credential management on a portable device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention is now described with reference to the drawings, wherein like reference numerals refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the invention. It may be evident, however, that the invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the present invention.

[0025] The terms "element" and "module" as used in this application are intended to refer to a computer-related entity, which in execution may be hardware, a combination of software and hardware, software or software. For example, a computer element or module may be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and / or a computer. By way of example,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and / or method that enables a user to manage credential information for approving communications with various network and / or server components. A portable device is provided that facilitates management of a user credential that can be used to connect to a network ( e.g. , wireless, wired). The portable device includes an input component and a retention component. The input component defines a selected input method to input the user credential into the portable device. The retention component defines a parameter for storing the user credential in accordance with a user-defined selection. Additionally, the portable device can include a data store ( e.g. , cache memory) that retains the user credential and a purging component configured to subsequently erase the user credential in accordance with the user-defined selection.

Description

technical field [0001] The present invention relates generally to computer systems, and more particularly to systems and / or methods for managing user credentials for authenticating various network and / or server elements. Background technique [0002] As wired and wireless network technologies advance, there is an ongoing and increasing need to establish security systems and procedures to prevent unauthorized network access. [0003] Today, most networks utilize requirements for successful compliance with security procedures (eg, authentication) in order to successfully connect to a network. These security programs prevent unauthorized network access. For example, when two or more wireless users (eg, a mobile client and server) want to establish a level of security, they typically "authenticate." [0004] Typically, network authentication requires credentials (eg, login names, passwords) identifying authorized users to successfully connect to the network, thereby accessing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/10H04L9/32G06F21/20G06F1/00G06F1/16G06F15/00G06F21/00G06K9/00H04K1/00
CPCG06F1/1696G06F21/34G06F1/1684G06F1/1626G06F15/00G06F17/00
Inventor A·达戈斯蒂诺D·A·梅耶G·德拉拉塔V·阿塞洛
Owner SYMBOL TECH INC