Claims
- 1. A field programmable electronic smart card terminal capable of acting as a token device for allowing secure communication between a user and an application provided by a service provider, comprising:
a token personality logic; a smart card reader adapted to receive and communicate with a smart card having stored thereon a user identification data, wherein with a smart card received by said smart card reader said token personality logic can generate a token device personality using said user authentication data; and, a communications mechanism for communicating an element of said token device personality to an application provided by a service provider.
- 2. The terminal of claim 1 wherein said token device personality is erased when the smart card is removed from the smart card reader.
- 3. The terminal of claim 1 further comprising a unique terminal identifier associated with said smart card terminal.
- 4. The terminal of claim 3 wherein with a smart card received by said smart card reader said token personality logic can generate a token device personality using a combination of said user authentication data and said terminal identifier.
- 5. The terminal of claim 1 wherein said user identification data is copied to said smart card terminal.
- 6. The terminal of claim 5 wherein said user identification data is erased when the smart card is removed from the smart card reader.
- 7. The terminal of claim 1, further comprising:
a computing mechanism; and, a memory device storing at least one application provided by the service provider and capable of being loaded and executed by said computing mechanism.
- 8. The terminal of claim 7, wherein at least one of said applications is configured to accept a PIN number from one of a set of terminal users, and maintain confidentiality and provide access to other functions and/or applications of said token device only as corresponding to the user identified by the accepted PIN.
- 9. The token of claim 7, wherein at least one of said applications supports security paradigms, including at least one of time and/or event based passwords, challenge response, and signatures.
- 10. The token of claim 7, further comprising at least one of a timing mechanism connected to said computing mechanism and utilized by the token or any of said applications in performing clock and/or event based security paradigms.
- 11. The terminal of claim 7, wherein said applications include a connected mode application that configures said token in a connected mode such that said token acts as a slave to a computer connected to said token.
- 12. The terminal of claim 1 wherein said terminal device operates physically unconnected from the service provider.
- 13. The terminal of claim 12 wherein said communications mechanism is a display configured to communicate a PIN element of a token device personality in response to a user input.
- 14. The terminal of claim 13 wherein the user input is data as communicated from the service provider in the form of a question to be interpreted by the token device.
- 15. The terminal of claim 1, further comprising an output mechanism connected to said computing mechanism configured to transmit secured data from said token to a remotely connected device.
- 16. The terminal of claim 15, wherein said output mechanism comprises at least one of an infra red device, scanning device, telephone line connection, network connection, and universal serial bus port.
- 17. The terminal of claim 1, including a data encryptor for encrypting data wherein said encrypting data is performed via at least one of DES, Triple DES, and other encryption processes.
- 18. The terminal of claim 1, including:
a computing mechanism; and, a memory device storing at least one application provided by the service provider and capable of being loaded and executed by said computing mechanism; wherein at least one of said applications supports an electronic wallet.
- 19. The terminal of claim 18, wherein the electronic wallet application includes modules for displaying current balances, and a predetermined number of last previous transactions of the wallet.
- 20. A method of accessing a secure application, comprising the steps of:
providing a generic smart card reader terminal, wherein said generic smart card reader terminal includes:
a generic token personality logic, a smart card reader adapted to receive and communicate with a smart card, and, a communications mechanism for communicating said token device personality to a host service; receiving at said generic smart card reader a user smart card having stored thereon a user identification data; generating a token device personality using said user authentication data; and, accessing a secure application using an element of said token device personality.
- 21. The method of claim 20, further comprising the step of:
erasing said token device personality when the smart card is removed from the smart card reader.
- 22. The terminal of claim 20 further comprising the step of
associating a unique terminal identifier with each smart card terminal.
- 23. The method of claim 22 wherein said step of generating includes the step of:
generating a token device personality using a combination of said user authentication data and said unique terminal identifier.
- 24. The method of claim 20 further comprising the step of:
copying said user identification data to said smart card terminal.
- 25. The method of claim 24 further comprising the step of:
erasing said identification data when the smart card is removed from the smart card reader.
- 26. The method of claim 20 including the step of:
operating said terminal device unconnected from the service provider
- 27. The method of claim 20 including the steps of:
receiving information from the service provider in the form of a question; entering said question into the terminal device; receiving a response to said question; and, communicating said response to the service provider.
- 28. The method of claim 27 wherein the question is a request for a PIN.
- 29. The method of claim 28 wherein said step of entering a question is via a keypad attached to the device, and said step of receiving a response is via a display attached to the device.
- 30. The method of claim 20 including the step of:
operating said terminal device via a connection to a client computer in communication with the service provider.
- 31. The method of claim 30 including the steps of:
receiving information from the service provider in the form of a question; entering said question into the terminal device; receiving a response to said question; and, communicating said response to the service provider.
- 32. The method of claim 31 wherein the question is a request for a PIN
- 33. The method of claim 32 wherein said steps of entering a question and receiving a response is via the client computer connected to the device.
- 34. A method of providing a user with secure access to a service provider application, comprising the steps of:
distributing to a plurality of users a plurality of generic smart card reader terminals, wherein each of said generic smart card reader terminals includes:
a generic token personality logic, a smart card reader adapted to receive and communicate with a smart card, and, a communications mechanism for communicating said token device personality to a host service; receiving at said generic smart card reader a user's smart card having stored thereon a user identification data; allowing a user to generate a token device personality using said user authentication data; and, allowing one of said users to access a secure application provided by a service provider, using an element of said token device personality.
- 35. The method of claim 35, further comprising the step of:
erasing said token device personality when the smart card is removed from the smart card reader.
- 36. The method of claim 35 further comprising the step of:
associating a unique terminal identifier with each smart card terminal.
- 37. The method of claim 36 wherein said step of generating includes the step of:
generating a token device personality using a combination of said user authentication data and said unique terminal identifier.
- 38. The method of claim 34 further comprising the step of:
copying said user identification data to said smart card terminal.
- 39. The method of claim 24 further comprising the step of:
erasing said identification data when the smart card is removed from the smart card reader.
- 40. The method of claim 20 including the step of:
allowing said user to operate said terminal device unconnected from the service provider.
- 41. The method of claim 20 including the step of:
allowing said user to operate said terminal device via a connection to a client computer in communication with the service provider.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority from provisional application “Factory to Field Programming and Advances Relating to Digipass 100/800/Series and Related Tokens”, application Ser. No. 60/183,640, filed Feb. 18, 2000 and incorporated herein by reference.
[0002] The present application is related to the following United States Patents and Patent Applications, which patents/applications are assigned to the owner of the present invention, and which patents/applications are incorporated by reference herein in their entirety:
[0003] U.S. Pat. No. 4,599,489, entitled, “Solid State Key For Controlling Access To Computer Software”;
[0004] U.S. Pat. No. 4,609,777, entitled, “Solid State Key For Controlling Access to Computer Software”;
[0005] U.S. Pat. No. 4,819,267, entitled, “Solid State Key For Controlling Access to Computer Systems And To Computer Software And/Or For Secure Communications”; and
[0006] U.S. patent application Ser. No. 09/500,533, entitled “Security Access And Authentication Token With Private Key Transport Functionality”, filed Feb. 9, 2000, currently pending.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60183640 |
Feb 2000 |
US |