Claims
- 1. A system comprising:
a portable integrated circuit device having stored thereon an authentication application and a definition of a list of trusted applications; and a computer, coupled to communicate with the portable integrated circuit device, to,
form a secure connection between the portable integrated circuit device and an application running on the computer, request, via the application running on the computer, that the portable integrated circuit device unlock itself, receive the list of trusted applications from the portable integrated circuit device, and identify to the portable integrated circuit device whether the application is one of the applications in the list of trusted applications.
- 2. A system as recited in claim 1, wherein the portable integrated circuit device is further to authenticate itself to the application running on the computer.
- 3. A system as recited in claim 1, wherein the portable integrated circuit device is to unlock itself only if the application is one of the applications on the list of trusted applications.
- 4. A system as recited in claim 3, wherein:
the portable integrated circuit device, in unlocking itself, makes private information stored thereon accessible to the application; and the portable integrated circuit device includes a signaling device to notify a user of the portable integrated circuit device that it is safe to use the computer.
- 5. A system as recited in claim 4, wherein the signaling device includes an indicator light.
- 6. A system as recited in claim 1, wherein the portable integrated circuit device is to unlock itself only if both the application and the operating system executing on the computer are each one of the applications on the list of trusted applications.
- 7. An apparatus comprising:
a processor; and a nonvolatile memory, coupled to the processor, that stores both data and a program that, when a request to access the data is received, causes the processor to allow access to the data only if the requester can prove that the requester is an application on a list of trusted applications maintained by the apparatus.
- 8. An apparatus as recited in claim 7, wherein the apparatus comprises a smart card.
- 9. An apparatus as recited in claim 7, wherein the program further causes the processor to:
send, to the requester, a challenge; receive a response to the challenge from the requester; verify the response; and determine whether the requester is an application on the list of trusted applications only after the response is verified
RELATED APPLICATIONS
[0001] This is a continuation of application Ser. No. 09/287,699, filed Apr. 6, 1999, entitled “Method and Apparatus for Authenticating an Open System Application to a Portable IC Device”, which is hereby incorporated by reference, and which is a continuation-in-part of application Ser. No. 09/266,207, filed Mar. 10, 1999, entitled “System and Method for Authenticating an Operating System to a Central Processing Unit, Providing the CPU/OS with Secure Storage, and Authenticating the CPU/OS to a Third Party”, which claims the benefit of U.S. Provisional Application No. 60/105,891, filed Oct. 26, 1998, entitled “System and Method for Authenticating an Operating System to a Central Processing Unit, Providing the CPU/OS with Secure Storage, and Authenticating the CPU/OS to a Third Party”.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60105891 |
Oct 1998 |
US |
Continuations (1)
|
Number |
Date |
Country |
Parent |
09287699 |
Apr 1999 |
US |
Child |
10619153 |
Jul 2003 |
US |
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
09266207 |
Mar 1999 |
US |
Child |
09287699 |
Apr 1999 |
US |