Claims
- 1. A portable device comprising:
a) a body; b) memory within the body containing software for executing on a host computing device; c) an interface associated with the memory and adapted to facilitate interaction with the host computing device; d) the software adapted to automatically execute on the host computing device in association with a computing session, and, in association with termination of the computing session, instruct the host computing device to remove records pertaining to the computing session from the host computing device to enhance privacy associated with the computing session.
- 2. The portable device of claim 1 wherein the software is further adapted to instruct the host computing device to detect instructions from the user indicating the termination of the computing session.
- 3. The portable device of claim 1 wherein the software is further adapted to instruct the host computing device to detect disassociation of the portable device from the host computing device to indicate termination of the computing session.
- 4. The portable device of claim 1 wherein the software is adapted to instruct the host computing device to delete one or more of the group consisting of browsing histories, cookies, preferences, favorites, and bookmarks from one or more of the group consisting of system memory, cache, and disk drives.
- 5. The portable device of claim 1 wherein the software is further adapted to instruct the host computing device to automatically execute on the host computing device after the host computing device recognizes the presence of the portable device and instruct the host computing device to launch a program on the host computing device.
- 6. The portable device of claim 5 wherein the software is further adapted to instruct the host computing device to customize the user interface for the program for the computing session based on the data.
- 7. The portable device of claim 6 wherein the software is further adapted to provide an authentication routine to execute on the host computing device, the authentication routine including receiving authentication indicia from a user via an interface on the host computing device and determining if the authentication indicia received from the user matches authentication indicia stored in the memory.
- 8. The portable device of claim 1 wherein the software is further adapted to provide an authentication routine to execute on the host computing device, the authentication routine including receiving authentication indicia from the user via an interface on the host and determining if the authentication indicia received from the user matches authentication indicia stored in the memory.
- 9. The portable device of claim 1 wherein the software is adapted to emulate a file system resident on a memory device on the host computing device when interacting with the host computing device.
- 10. The portable device of claim 1 wherein the software and data are adapted to appear as a file system to the host computing device.
- 11. The portable device of claim 1 wherein the interface is adapted to directly interface a port in the host computing device.
- 12. The portable device of claim 1 wherein the interface is adapted to provide a wireless interface with the host computing device.
- 13. The portable device of claim 1 wherein the software includes a plurality of keylets that are independently executable on the host computing device to provide at least one function.
- 14. A portable device comprising:
a) a body; b) memory within the body containing software for executing on a host computing device; c) an interface associated with the memory and adapted to facilitate interaction with the host computing device; d) the software adapted to automatically execute on the host computing device in association with a computing session and store select information associated with the computing session in the memory instead of on the host computing device, wherein the host computing device would normally store the select information on the host computing device when the portable device is not present.
- 15. The portable device of claim 14 wherein the software is further adapted to instruct the host computing device to remove records pertaining to the computing session from the host computing device to enhance privacy associated with the computing session.
- 16. The portable device of claim 15 wherein the software is further adapted to instruct the host computing device to remove the records pertaining to the computing session from the host computing device, in association with termination of the computing session.
- 17. The portable device of claim 14 wherein the software is further adapted to instruct the host computing device to detect instructions from the user indicating the termination of the computing session.
- 18. The portable device of claim 14 wherein the software is further adapted to instruct the host computing device to detect disassociation of the portable device from the host computing device to indicate termination of the computing session.
- 19. A computer readable medium including software to reside on a portable device capable of interacting with a plurality of host computing devices, the software comprising instructions to:
a) automatically execute on the host computing device in association with a computing session; and b) in association with termination of the computing session, instruct the host computing device to remove records pertaining to the computing session from the host computing device to enhance privacy associated with the computing session.
- 20. The computer readable medium of claim 19 wherein the software is further adapted to detect instructions from the user indicating the termination of the computing session.
- 21. The computer readable medium of claim 19 wherein the software is further adapted to detect disassociation of the portable device from the host computing device to indicate termination of the computing session.
- 22. The computer readable medium of claim 19 wherein the software is adapted to delete one or more of the group consisting of browsing histories, cookies, preferences, favorites, and bookmarks from one or more of the group consisting of system memory, cache, and disk drives.
- 23. The computer readable medium of claim 19 wherein the software is further adapted to automatically execute on the host computing device after the host computing device recognizes the presence of the portable device and instruct the host computing device to launch a program on the host computing device.
- 24. The computer readable medium of claim 23 wherein the software is further adapted to customize the user interface for the program for the computing session based on the data.
- 25. The computer readable medium of claim 24 wherein the software is further adapted to provide an authentication routine to execute on the host computing device, the authentication routine including receiving authentication indicia from a user via an interface on the host and determining if the authentication indicia received from the user matches authentication indicia stored in the memory.
- 26. The computer readable medium of claim 19 wherein the software is further adapted to provide an authentication routine to execute on the host computing device, the authentication routine including receiving authentication indicia from a user via an interface on the host and determining if the authentication indicia received from the user matches authentication indicia stored in the memory.
- 27. A method comprising:
a) facilitating a computing session at a host computing device with a portable device associated with the host computing device, the portable computing device containing software capable of being executed on the host computing device; and b) in association with termination of the computing session, executing the software to instruct the host computing device to remove records pertaining to the computing session from the host computing device to enhance privacy associated with the computing session.
- 28. The method of claim 27 further comprising detecting instructions from the user indicating the termination of the computing session.
- 29. The method of claim 27 further comprising detecting disassociation of the portable device from the host computing device and determining termination of the computing session upon detecting disassociation of the portable device from the host computing device.
- 30. The method of claim 27 further comprising:
a) executing an authentication function based on the software; b) receiving authentication indicia from a user via an interface on the host; and c) determining if the authentication indicia received from the user matches authentication indicia stored on the portable device.
- 31. The method of claim 30 further comprising:
a) executing the software on a host computing device; b) launching a program resident on the host computing device based on the software; c) accessing configuration information for the software stored on the portable memory device; and d) customizing the configuration for the program on the host computing device based on the configuration information.
- 32. The method of claim 27 further comprising:
a) executing the software on a host computing device; b) launching a program resident on the host computing device based on the software; c) accessing configuration information for the software stored on the portable memory device; and d) customizing the configuration for the program on the host computing device based on the configuration information.
Parent Case Info
[0001] This application claims the benefit of provisional application serial No. 60/243,816, filed Oct. 27, 2000, entitled PORTABLE PRIVACY AND CONFIGURATION FOR COMPUTER AND WEB BASED APPLICATIONS, the disclosure of which is incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60243816 |
Oct 2000 |
US |