A method and apparatus for transferring data in response to authentication information. Authentication information is transmitted from a client computer to a server computer to authorize access to restricted data. Invocation information is transmitted from the server computer to the client computer in response to the authentication information. A first application is invoked in the client computer using the invocation information. The restricted data is then transmitted from the server computer to the first application program in the client computer based on the access authorized by the authentication information.

 
Web www.patentalert.com

< Inspected secure communication protocol

> Method and system for verifying the authenticity of a first communication participants in a communications network

> Methods, systems, and computer program products that centrally manage password policies

~ 00595