Abstract:
A static password is converted into a One-Time Authenticator (OTA) in accordance with a one-time keyboard map. The one-time keyboard map is generated in accordance with a nonce and a secret shared by the user entering the static password and an intended recipient. In response to receiving a prompt to enter a password, a user positions a display cursor within a designated display area. In response thereto, the keyboard driver generates the one-time keyboard map to remap the entered static password. The remapped password is converted into an OTA and transmitted instead of the static password. When the display cursor is moved out of the designated display area, the one-time keyboard map is no longer used to convert keystrokes and the keyboard mapping reverts back to its previous, original configuration.
Abstract:
The use of one resource access policy to populate a second resource access policy. One of more fields of the first resource access policy are each to be used to populate corresponding one or more fields of the second resource access policy. After identifying the field(s) of the first resource access policy, and identifying their corresponding field of the second resource access policy, the information from the source fields of the first resource access policy are then used to populate the destination fields of the second resource access policy. This may be done in an automated fashion thereby allowing for at least the possibility of the transition from one type of resource access security to another.
Abstract:
The use of one resource access policy to populate a second resource access policy. One of more fields of the first resource access policy are each to be used to populate corresponding one or more fields of the second resource access policy. After identifying the field(s) of the first resource access policy, and identifying their corresponding field of the second resource access policy, the information from the source fields of the first resource access policy are then used to populate the destination fields of the second resource access policy. This may be done in an automated fashion thereby allowing for at least the possibility of the transition from one type of resource access security to another.
Abstract:
A static password is converted into a One-Time Authenticator (OTA) in accordance with a one-time keyboard map. The one-time keyboard map is generated in accordance with a nonce and a secret shared by the user entering the static password and an intended recipient. In response to receiving a prompt to enter a password, a user positions a display cursor within a designated display area. In response thereto, the keyboard driver generates the one-time keyboard map to remap the entered static password. The remapped password is converted into an OTA and transmitted instead of the static password. When the display cursor is moved out of the designated display area, the one-time keyboard map is no longer used to convert keystrokes and the keyboard mapping reverts back to its previous, original configuration.
Abstract:
Cryptographic service software embodied on a hard disc or a floppy disc electronically communicates with a standard operating system of a personal computer. The operating system has an application space and a kernel space. The cryptographic service software performs cryptographic services in the kernel space of the operating system. The cryptographic service software includes a kernel space level application programming interface and a cryptographic service module having a library of encryption algorithms.