Not Applicable.
Not Applicable.
The present invention relates generally to a data processing system, method and computer program product and more specifically to a secure end-to-end wireless communications connection between a security token enabled computer system and an intelligent remote device having a security token operatively coupled thereto.
In high security operating environments, the US National Institute of Standards and Technology (NIST) specifies in FIPS PUB 140-2, “Security Requirements For Security tokens,” for security levels 3 and 4 that critical security parameters (CSP) such as authentication data, passwords, PINs, CSPs, biometric samples, secret and private cryptographic keys be entered into or output from a security token in an encrypted form, generally using some form of physical and/or logical trusted path or secure messaging channel to prevent interception of the critical security parameters.
The security tokens referred to in this specification include hardware based security devices such as cryptographic modules, smart cards, integrated circuit chip cards, portable data carriers (PDC), personal security devices (PSD), subscriber identification modules (SIM), wireless identification modules (WIM), USB token dongles, identification tokens, secure application modules (SAM), hardware security modules (HSM), secure multi-media token (SMMC), trusted platform computing alliance chips (TPCA) and like devices.
Attempts at providing a physical trusted path include the use of cryptographic hardware devices installed between input devices such as the keyboard and possibly the mouse. An example of such a cryptographic interface device is disclosed in U.S. Pat. No. 5,841,868 to Helbig. However, the hardware expenditures and added administrative burden greatly increases the cost of the computer system.
In another approach, U.S. Pat. No. 4,945,468 to Carson, et al., a trusted path is generated by providing a new virtual terminal window which allows secure entry of CSPs. The new virtual terminal window is effectively isolated from other running processes. This method is a reasonably secure approach but does not extend the trusted path to peripheral security devices such as cryptography modules, security tokens and biometric scanners.
In yet another approach, US patent application 2002/0095587 to Doyle, et al. discloses a wireless SSL or equivalent connection which utilizes negotiated time-limited cryptography keys to maintain a chain of trust between interconnected security devices. However, the mechanism disclosed relies heavily on multiple public key cryptography key pairs which is difficult to maintain and may reduce overall performance due to relatively slow transaction processing when employed using a smart card. In addition, negotiation of time-limited cryptography keys relies on devices containing a system clock for changing of cryptographic keys. Smart cards and like devices do not include system clocks and thus are reliant of their host for providing event timing which may introduce security concerns when the host is not trusted.
Cryptographic mechanisms are available in the relevant art which could be adapted to encrypt an incoming CSP with a cryptographic key for secure transport through a security token enabled and eventual decryption by a security executive installed within the security token. However, the cryptographic mechanism employed by the security token enabled computer system must provide a sufficient level of security to prevent interception of the cryptographic keys used in encrypting the CSP and furthermore limits vulnerability to a replay type attack.
Another common vulnerability in the relevant art relates to the lack of ability to bind a CSP to a session, which potentially allows an unlocked security token to be accessed by an unauthorized entity. To address this potential vulnerability, the CSP is typically cached or stored and presented by software to the security token each time access is required. The cached or stored CSPs are likewise vulnerable to interception or compromise by an unauthorized entity.
Therefore, it would be highly advantageous to provide a secure CSP transport system which limits an intruder's ability to intercept a cryptographic key during wireless communications sessions, is relatively invulnerable to a replay type attack, minimizes requests for user input of CSPs already provided within a session and does not store or otherwise cache a CSP.
This invention addresses the limitations described above and provides an efficient secure end-to-end communications connection to securely exchange information between a security token enabled computer system and an intelligent remote device having a security token operatively coupled thereto. The method portion of the invention comprises the steps of performing a first security transaction which authenticates a security token to a security token enabled computer system, establishing a secure communications connection between the security token and the security token enabled computer system which incorporates a shared symmetric key set generated during the first security transaction, assigning at least one key from the shared symmetric key set to a dedicated communications channel accessible to the security token, and performing a second security transaction which authenticates a user to said security token.
In a related embodiment of the invention, additional steps are performed for signaling an affirmative result to the security token enabled computer system if the second security transaction is successful. In a related embodiment of the invention, the second security state is required before the secure communications connection is available for use by said security token.
The first security transaction is accomplished using a challenge/response protocol which incorporates an asymmetric key pair. A challenge is generated by the security token enabled computer system and encrypted with the public key associated with the security token.
The encrypted challenge is then sent to the security token. The security token decrypts the challenge using the private key counterpart to the public key and returns the clear text challenge to the security token enabled computer system for verification.
The public key is transferred to the security token enabled computer system by way of a digital certificate as part of the establishing the wireless communications connection.
The second security transaction authenticates the user to the security token by the user's critical security parameter which is provided directly or indirectly to the security token via the intelligent remote device. Once the second security transaction has been successfully completed the user is allowed access to one or more secure resources associated with the security token, security token enabled computer system or both.
In related embodiments of the invention, security states are maintained by the security token and security token enabled computer system. The security states are set by the successful completion of the first and second security transactions.
The secure communications connection is established by generating on the security token enabled computer system, a shared symmetric key set, encrypting one of the generated symmetric keys with the public key, sending the encrypted symmetric key to the security token, decrypting the symmetric key with the counterpart private key and assigning the decrypted symmetric key to a dedicated communications channel. The dedicated communications channel prevents the number of wireless secure communications connections with the security token from exceeding a predetermined limit. The predetermined limit is usually set to 1.
In another embodiment of the invention, user feedback is provided by the intelligent remote device which prompts the user to select either a local or remote authentication transaction and provide the critical security parameter.
In another embodiment of the invention authentication of the user is inhibited if outside a predefined range of a proximity sensor coupled to the security token enabled computer system.
In yet another embodiment of the invention, user sensory feedback is provided by the security token enabled computer system which indicates a remote authentication transaction is in progress. The user sensory feedback includes visual, tactile, aural or vibratory feedback.
A first systematic embodiment of the invention comprises a security token enabled computer system in wireless communications with an intelligent remote device having an operatively coupled security token thereto. The security token enabled computer systems includes a first security transaction means for at least authenticating the security token to the security token enabled computer system, and a first secure communications connection means for at least establishing a cryptographically encoded link between the security token enabled computer system and the security token. The first security transaction means includes a challenge/response protocol means and an asymmetric cryptography means. The first secure communications connection means includes a symmetric key set generation means and a secure symmetric key exchange means.
In a related embodiment of the invention, the security token enabled computer system further includes a first secure access means for allowing a user access to one or more secure resources following a receipt of an affirmative signal.
In another related embodiment of the invention, successful execution of the first security transaction means sets a first computer system security state and receipt of the affirmative result signaling sets a second computer system security state associated with the security token enabled computer system.
The intelligent remote device includes a security token interface means for at least operatively coupling the security token to the intelligent remote device, and a user interface means for at least receiving and routing a critical security parameter provided by the user to the security token interface means. The user interface means includes conditional means for conditionally receiving the critical security parameter. The conditional means is intended to limit or prevent receiving the critical security parameter until the cryptographically encoded link is established. The security token interface means includes security token communications means and electromagnetic power transfer means.
The security token includes a secure communications connection means for at least establishing the cryptographically encoded link in conjunction with the first secure communications connection means, a dedicated communications channel means for preventing a concurrent cryptographically encoded link from being established with the security token, a second security transaction means for at least authenticating the user to the security token using at least the critical security parameter and an affirmative signaling means for sending an affirmative signal to the security token enabled computer system following a successful completion of the second security transactions means. In an embodiment of the invention, the dedicated communications channel means includes a unique channel identifier means which is addressable by the security token enabled computer system.
In a related embodiment of the invention, establishment of the cryptographically encoded link sets a first token security state and successful execution of the second security transaction means sets a second token security state. In a related embodiment of the invention, the second security state is required before the secure communications connection is available for use by the security token.
A second systematic embodiment of the invention comprises a security token enabled computer system in processing communications with an intelligent remote device and a security token coupled to the intelligent remote device. The security token enabled computer system includes a first processor, a first memory coupled to the first processor, at least one remote authentication application operatively stored in a first portion of the first memory having logical instructions executable by the first processor to authenticate the security token, establish a secure end-to-end communications connection with the security token and allow a user access to one or more secure resources following a receipt of an affirmative signal sent from the security token.
The security token enabled computer system further includes a first wireless transceiver functionally coupled to the first processor and a public key associated with the security token retrievably stored in a second portion of the first memory.
The at least one remote authentication application further includes logical instructions executable by the first processor to generate a symmetric key set and perform a secure key exchange with the security token.
The intelligent remote device includes a second processor, a second memory coupled to the second processor, a security token interface coupled to the second processor, a user interface coupled to the second processor and at least one remote device interface application operatively stored in a portion of the second memory. The at least one remote device interface application includes logical instructions executable by the second processor to emulate a security token device interface locally coupled to at least the security token enabled computer system and conditionally receive and route a critical security parameter provided by the user via the user interface to the security token. The intelligent remote device further includes a second wireless transceiver functionally coupled to the second processor.
The communications and electromagnetic power interface includes inductive means, capacitive means or electric contact means to operatively couple the security token to the intelligent remote device. The at least one remote device interface application further includes logical instructions executable by the second processor to prevent receiving the critical security parameter from the user before establishment of the secure end-to-end communications connection.
The security token includes at least a third processor, a third memory coupled to the at least a third processor, a communications and electromagnetic power interface coupled to the at least a third processor and the security token interface and at least one token remote authentication application operatively stored in a first portion of the third memory.
The at least one token remote authentication application includes logical instructions executable by the at least a third processor to establish the secure end-to-end communications connection in conjunction with the security token enabled computer system, restrict the secure end-to-end communications connection to a single wireless secure communications connection, authenticate the user and send the affirmative signal to the security token enabled computer system, if the user is successfully authenticated. The security token further includes an private key retrievably stored in a second portion of the third memory and a reference critical security parameter retrievably stored in a third portion of the third memory. The private key is the counterpart to the public key. The user is authenticated by the at least one token remote authentication application by comparing the user's provided critical security parameter to the reference critical security parameter.
The restriction to the secure end-to-end communications connection is applied to a dedicated communications channel controlled by the at least one token remote authentication application. The dedicated communications channel includes a unique identifier addressable by the security token enabled computer system.
The public and private keys are incorporated into a challenge/response protocol used to authenticate the security token to the security token enabled computer system and are further used to perform a secure symmetric key exchange from the security token enabled computer system to the security token.
In another embodiment of the invention, a proximity sensor is coupled to the security token enabled computer system which inhibits either authentication or use of the secure communications channel if the security token is outside of a predefined range from the security token enabled computer system.
In a final embodiment of the invention, a computer program product is provided. The computer program product is embodied in a tangible form readable by a security token processor and includes executable instructions stored thereon for causing the security token processor to utilize one or more security token emulation services provided by an intelligent remote device processor, establish a secure end-to-end communications connection in conjunction with a security token enabled computer system processor, restrict the secure end-to-end communications connection to a single wireless secure communications connection, authenticate a user and send an affirmative signal to the security token enabled computer system processor if the user is successfully authenticated.
The computer program product further includes executable instructions stored thereon for causing the security token enabled computer system processor to authenticate the security token, establish the secure end-to-end communications connection with the security token, and allow a user access to one or more secure resources following a receipt of the affirmative signal sent from the security token.
The computer program product further includes executable instructions stored thereon for causing the intelligent remote device processor to provide the one or more security token emulation services to the security token processor, and receive and route a critical security parameter provided by the user via the user interface to the security token.
The tangible form of the computer program product includes magnetic media, optical media or logical media stored in a code format comprising byte code, compiled, interpreted, compilable and interpretable.
The features and advantages of the invention will become apparent from the following detailed description when considered in conjunction with the accompanying drawings. Where possible, the same reference numerals and characters are used to denote like features, elements, components or portions of the invention. It is intended that changes and modifications can be made to the described embodiment without departing from the true scope and spirit of the subject invention as defined by the claims.
FIG. 1—is a generalized block diagram of a security token enabled computer system.
FIG. 1A—is a generalized block diagram of an intelligent remote device.
FIG. 1B—is a generalized block diagram of a security token
FIG. 2—is a detailed block diagram of one embodiment of the invention where a security token enabled computer system is in processing communications with a security token equipped intelligent remote device over a wireless link.
FIG. 2A—is a detailed block diagram of the invention where an public key is transferred to the security token enabled computer system.
FIG. 2B—is a detailed block diagram of the invention where the security token receives an encrypted challenge generated by the security token enabled computer system as an initial part of an authentication challenge/response protocol.
FIG. 2C—is a detailed block diagram of the invention where the security token returns the clear text challenge to the security token enabled computer system as a final part of the authentication challenge/response protocol.
FIG. 2D—is a detailed block diagram of the invention where a symmetric key set is generated and a secure key exchange is performed between the security token enabled computer system and the security token.
FIG. 2E—is a detailed block diagram of the invention where a secure end-to-end communications connection is established between the security token enabled computer system and the security token.
FIG. 2F—is a detailed block diagram of the invention where a user's critical security parameter is provided to the intelligent remote device and routed to the operatively coupled security token to authenticate the user.
FIG. 2G—is a detailed block diagram of the invention where the intelligent remote device has successfully been authenticated to the security token enabled computer system.
FIG. 3—is a flow diagram illustrating the major steps associated with establishing the secure end-to-end communications connection between the security token enabled computer system and an intelligent remote device having a security token operatively coupled thereto.
This present invention provides an anonymous secure end-to-end communications connection which allows an intelligent remote device to emulate a locally connected security token device without requiring an actual physical connection to a security token enabled computer system. The anonymous secure end-to-end communications connection is established over a wireless communications network or link. The applications are envisioned to be programmed in a high level language using such as Java™, C++, C#, C or Visual Basic™.
Referring to
The security token enabled computer system 105 includes a processor 5c, a main memory 10c, a display 20c electrically coupled to a display interface 15c, a secondary memory subsystem 25c electrically coupled to a hard disk drive 30c, a removable storage drive 35c electrically coupled to a removable storage unit 40c and an auxiliary removable storage interface 45 electrically coupled to an auxiliary removable storage unit 50c.
A communications interface 55c subsystem is coupled to a wireless transceiver 60c and a wireless network or link 65, an optional security token 75 electrically coupled to a security token interface 70c and a user input interface 80c including a mouse and a keyboard 85, an optional biometric scanner 95c electrically coupled to an optional biometric scanner interface 90c and an optional proximity sensor 115c coupled to the communications interface 55c. The proximity sensor 115c prohibits remote authentications to be performed when a security token 75r (
The processor 5c, main memory 10c, display interface 15c secondary memory subsystem 25c and communications interface system 55c are electrically coupled to a communications infrastructure 100c. The security token enabled computer system 105 includes an operating system, at least one remote authentication application, other applications software, cryptography software capable of performing symmetric and asymmetric cryptographic functions, secure messaging software and device interface software. Referring to
A communications interface 55r subsystem is coupled to a wireless transceiver 60r and a wireless network or link 65, a security token 75 electrically coupled to a security token interface 70r and a user input interface 80r including a mouse and a keyboard 85r, and an optional biometric scanner 95r electrically coupled to an optional biometric scanner interface 90r.
The processor 5r, main memory 10r, display interface 15r secondary memory subsystem 25r and communications interface system 55r are electrically coupled to a communications infrastructure 100r. The intelligent remote device includes an operating system, at least one remote device interface application, other applications software, cryptography software capable of performing symmetric and asymmetric cryptographic functions, secure messaging software and device interface software.
Referring to
The processor 5t, optional cryptographic co-processor 5tc, volatile memory 10vm, non-volatile memory 10nvm, electrically erasable programmable read only memory (EEPROM) 10eeprom and communications interface 55t are electrically coupled to a communications infrastructure 100t. The EEPROM further includes a runtime operating environment, cryptography extensions incorporated into the operating system and capable of performing symmetric and asymmetric cryptographic functions compatible with the intelligent remote device and security token enabled cryptography software, at least one token remote authentication application, one or more critical security parameter protected secure resources coupled to the at least one token remote authentication application and a public key infrastructure (PKI) key pair functionally coupled to the at least one token remote authentication application.
The non-volatile memory 10nvm has operatively stored therein one or more reference critical security parameters which are verified against a user supplied critical security parameter by the at least one token remote authentication application to allow access to the one or more one or more critical security parameter protected secure resources.
Referring to
The intelligent remote device IRD 110 includes an operatively coupled wireless transceiver T/R260r, a security token interface STI 70r, a user input means UI 85 and a display DI 202r which provides a user with information related to available authentication options and authentication status.
The security token interface STI 70r includes optical, capacitive, inductive and direct electrical contact type interface devices and provides electromagnetic power and communications continuity with the intelligent remote device IRD 110. Lastly, at least one remote device interface application RDI 210 is installed in the intelligent remote device IRD 110.
The at least one remote device interface application RDI 210 is generally a middleware application which allows the intelligent remote device IRD 110 to emulate a local security token device peripheral coupled to the security token enabled computer system CS 105 without requiring an actual physical connection. When enabled, the at least one remote device interface application RDI 210 provides security token interface services for exchanging data with the security token enabled computer system, receiving a user's critical security parameter provided using the user interface UI 85r and routing the user's critical security parameter to the security token ST 75 for user authentication or verification.
The at least one remote device interface application RDI 210 further provides user prompts and feedback via a display DI 20r.
The security token ST 75 is operatively coupled to the security token interface device STI 70r by a connection means 60t and includes a public and a private key pair Kpub 225t, Kpri 230 and a reference critical security parameter CSPr 235 retrievably stored in the token memory. At least one token remote access application TRA 215 is likewise installed in the token memory.
The at least one token remote access application TRA 215 allows the security token ST 75 to establish a secure end-to-end communications connection in conjunction with the security token enabled computer system CS 105, restrict the secure end-to-end communications connection to a single wireless secure communications connection by way of a dedicated wireless communications channel Wc 220w, authenticate a user by comparing a user's provided critical security parameter to the reference critical security parameter CSPr 235 and optionally send an affirmative signal to the security token enabled computer system CS 105 if the user is successfully authenticated. Local communications channel Lc1, Lc2, Lcn 220 allows multiple communications sessions to be established when the ST 75 is locally connected to either the intelligent remote device IRD 110 or security token enabled computer system CS 105.
The dedicated wireless communications channel Wc 220w restricts the number of communications sessions which can be established remotely. The at least one token remote access application TRA 215 includes an authentication state table 240, 245 which requires fulfillment before access 250t is allowed to one or more secure token resource SRt 255t. In one embodiment of the invention, the communication session is not available to the security token ST 75 until the authentication state table 240, 245 is properly set by authentication of the user.
The security token enabled computer system 105 includes a wireless transceiver T/R1 compatible with the wireless transceiver T/R2 installed on the intelligent remote device IRD 110 and at least one remote access application RAA 205. The at least one remote access application RAA 205 is generally a middleware application which allows the security token enabled computer system CS 105 to authenticate the security token ST 75, establish the secure end-to-end communications connection with the security token ST 75 over the wireless link 65 and allow the user access 250c to one or more secure resources following a receipt of an affirmative signal sent from the security token ST 75. In another embodiment of the invention, the affirmative signal is optional.
In one embodiment of the invention, the at least one remote access application RAA 205 includes an authentication state table 260, 265 which requires fulfillment before access 250c is allowed to the one or more secure computer system resource SRc 255c. 105. The security token enabled computer system 105 further includes a display 20c which provides a user with information related at least to authentication status 203c.
The messaging protocol used to communicate with the security token ST 75 includes an ISO 7816 compliant communications protocol. Protocol conversion between higher level packet communications protocols and the lower level ISO 7816 communications protocol may be accomplished by either the remote access application RAA 205 installed on the security token enabled computer system CS 110 or by the remote device interface RDI 210 installed on the intelligent remote device IRD 110.
A secure arrangement for exchanging APDU commands and responses between the security token ST 75 and security token enabled computer system CS 105 is described in co-pending U.S. patent application Ser. No. 09/844,246, filed Apr. 30, 2001, entitled, “Method And System For Establishing A Remote Connection To A Personal Security Device,” which is herein incorporated by reference in its entity.
Extensible authentication protocols (EAP) as described in the internet standards RFC 2284 or RFC 2716 may be incorporated into the communications connection as well.
The authentication state tables 240, 245, 260, 265 may be part of a pre-established set of security policies. In one embodiment of the invention, access requirements are determined by the security policies maintained within the security token ST 75 as is described in co-pending U.S. patent application Ser. No. 10/402,960 to a common assignee filed on Apr. 1, 2003, entitled “Uniform Framework for Security Tokens,” and herein incorporated by reference.
Additional security policies may be combined with the security policies established for the security token as is described in co-pending U.S. patent application Ser. No. 10/425,028 to a common assignee filed on Apr. 29, 2003, entitled “Uniform Modular Framework For A Host Computer System,” and likewise herein incorporated by reference.
Referring to
In an alternate embodiment of the invention, no user interaction is required to initiate the secure end-to-end communications connection. In the alternate embodiment of the invention, the communications handshaking between the two wireless transceivers T/R160c, T/R260r automatically causes execution of the at least one token remote access application 215.
In the preferred embodiment of the invention, a public key Kpub 225t or duplicate thereof. Kpub 225c, is sent to the security token enabled computer system CS 105 in an X.509 certificate where it is retrievably stored. The public key Kpub 225c will be used to authenticate the security token ST 75 to the security token enabled computer system CS 105 and to perform a secure symmetric key exchange between the security token enabled computer system CS 105 and security token ST 75.
Referring to
The display DI 20c associated with the security token enabled computer system CS 105 provides user feedback 205c that a remote authentication transaction has been initiated. The at least one token remote access application TRA 215 receives and decrypts 275d the cryptogram [C]Kpub 280c using the counterpart private key Kpri 230 generating the token clear text response [C] 270r to the challenge.
Referring to
Referring to
The at least one remote access application RAA 205 encrypts 275e one of the symmetric keys KSt 285t using the public key Kpub 225c and the resulting cryptogram [KSt]Kpub 290t is then sent over the wireless link 65 to the security token ST 75. In one embodiment of the invention, a channel identifier Wc 220w is included in a message header associated with the cryptogram which specifies the dedicated communications channel in which the symmetric key is to be used. The at least one token remote access application TRA 215 receives and decrypts 275d the cryptogram [KSt]Kpub 290t using the counterpart private key Kpri 230 restoring the token's shared symmetric key KSt 285t.
Referring to
Referring to
The user's critical security parameter CSPu 235 is compared 227 to the reference critical security parameter CSPr 235r by the token remote access application TRA 215. If a match is found between the user's critical security parameter CSPu 235 and the reference critical security parameter CSPr 235r, the critical security parameter CSP 245 element of the token's authentication state table is fulfilled. If the critical security parameter fails this second authentication transaction processing ends and a new attempt to establish the secure end-to-end communications connection will need to be performed.
Referring to
The user display DI 20r associated with intelligent remote device IRD 110 optionally provides at least visual indication 208r that a secure messaging session is in progress. Likewise, the user display DI 20c associated with the security token enabled computer system CS 105 provides at least visual indication 207c that access has been granted remotely. Other types of visual, aural and vibratory feedback are envisioned as well.
Referring to
The security token enabled computer system authenticates 315 the security token using a challenge/response protocol, whereby a challenge is generated, encrypted using the received public key, then transmitted to the security token over the wireless communications connection. The security token receives the cryptogram and decrypts the challenge using a private key counterpart of the public key. The clear text challenge is then returned to the security token enabled computer system for authentication. If the security token is not authenticated 320 processing ends 370. If the security token is authenticated 320, a symmetric key set is generated on the security token enabled computer system 325 and a secure key exchange 330 performed with the security token, whereby at least one of the symmetric keys is encrypted using the public key and sent over the wireless communications connection to the security token.
The received encrypted symmetric key is decrypted using the private key, assigned to a dedicated communications channel and the dedicated communications channel locked if a predetermined limit of preexisting wireless communications connections is not exceeded 335. If the predetermined limit is exceeded 345, processing ends 375. The predetermined limit is usually set to 1 in the preferred embodiment of the invention.
A first security state is set by either or both the security token and/or security token enabled computer system which indicates that a secure communications channel has been established. In one embodiment of the invention, the secure communications channel is not enabled until the user is authenticated as described below.
If the predetermined limit is not exceeded 345, the user is prompted 350 to provide his or her critical security parameter to the intelligent remote device. The provided critical security parameter is then authenticated 355 by the security token by comparing a reference critical security parameter to the received critical security parameter. If the user is not authenticated 360, processing ends. If the user is authenticated 355, an affirmative result signal is optionally generated by the security token and sent to the security token enabled computer system 365. Receipt of the affirmative result signal allows access to one or more secure resources 370. Processing ends 375 normally at the conclusion of the secure communications session by the user, removal of the security token from the intelligent remote device or moving outside of a predetermined proximity range from the security token enabled computer system.
The foregoing described embodiments of the invention are provided as illustrations and descriptions. They are not intended to limit the invention to precise form described. In particular, it is contemplated that functional implementation of the invention described herein may be implemented equivalently in hardware, software, firmware, and/or other available functional components or building blocks. No specific limitation is intended to a particular security token operating environment. Other variations and embodiments are possible in light of above teachings, and it is not intended that this Detailed Description limit the scope of invention, but rather by the claims that follow herein.
This application is a continuation in part to U.S. patent applications: Ser. No. 10/424,783, filed Apr. 29, 2003, entitled, “Universal Secure Messaging For Cryptographic Modules,” now abandoned and Ser. No. 09/880,795, filed Jun. 15, 2001, entitled, “Method, System And Apparatus For A Portable Transaction Device” now abandoned. This application is a related application of the application, entitled “Intelligent Remote Device,” by inventors named Eric Le Saint and Dominique Fedronic and which was filed on Dec. 22, 2003. The three aforementioned co-pending US patent applications are herein incorporated by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
4945468 | Carson et al. | Jul 1990 | A |
4993068 | Piosenka et al. | Feb 1991 | A |
5131038 | Puhl et al. | Jul 1992 | A |
5276735 | Boebert et al. | Jan 1994 | A |
5309501 | Kozik et al. | May 1994 | A |
5347580 | Molva et al. | Sep 1994 | A |
5448045 | Clark | Sep 1995 | A |
5491752 | Kaufman et al. | Feb 1996 | A |
5499297 | Boebert | Mar 1996 | A |
5546463 | Caputo et al. | Aug 1996 | A |
5577121 | Davis et al. | Nov 1996 | A |
5638444 | Chou et al. | Jun 1997 | A |
5655148 | Richman et al. | Aug 1997 | A |
5742756 | Dillaway et al. | Apr 1998 | A |
5778071 | Caputo et al. | Jul 1998 | A |
5802176 | Audebert | Sep 1998 | A |
5821854 | Dorinski et al. | Oct 1998 | A |
5841868 | Helbig, Sr. | Nov 1998 | A |
5842118 | Wood, Jr. | Nov 1998 | A |
5878142 | Caputo et al. | Mar 1999 | A |
5887065 | Audebert | Mar 1999 | A |
5937068 | Audebert | Aug 1999 | A |
5953424 | Vogelesang et al. | Sep 1999 | A |
6002427 | Kipust | Dec 1999 | A |
6005942 | Chan et al. | Dec 1999 | A |
6016476 | Maes et al. | Jan 2000 | A |
6038551 | Barlow et al. | Mar 2000 | A |
6070240 | Xydis | May 2000 | A |
6075860 | Ketcham | Jun 2000 | A |
6076075 | Teicher | Jun 2000 | A |
6084968 | Kennedy et al. | Jul 2000 | A |
6108789 | Dancs et al. | Aug 2000 | A |
6169804 | Ryan, Jr. et al. | Jan 2001 | B1 |
6173400 | Perlman et al. | Jan 2001 | B1 |
6175922 | Wang | Jan 2001 | B1 |
6178504 | Fieres et al. | Jan 2001 | B1 |
6189099 | Rallis et al. | Feb 2001 | B1 |
6198823 | Mills | Mar 2001 | B1 |
6216230 | Rallis et al. | Apr 2001 | B1 |
6233683 | Chan et al. | May 2001 | B1 |
6308317 | Wilkinson et al. | Oct 2001 | B1 |
6373946 | Johnston | Apr 2002 | B1 |
6378073 | Davis et al. | Apr 2002 | B1 |
6385729 | DiGiorgio et al. | May 2002 | B1 |
6397328 | Pitchenik et al. | May 2002 | B1 |
6425084 | Rallis et al. | Jul 2002 | B1 |
6459704 | Jandrell | Oct 2002 | B1 |
6481632 | Wentker et al. | Nov 2002 | B2 |
6490679 | Tumblin et al. | Dec 2002 | B1 |
6547150 | Deo et al. | Apr 2003 | B1 |
6570610 | Kipust | May 2003 | B1 |
6588660 | Buescher et al. | Jul 2003 | B1 |
6601771 | Charrin | Aug 2003 | B2 |
6609199 | DeTreville | Aug 2003 | B1 |
6657956 | Sigaud | Dec 2003 | B1 |
6694436 | Audebert | Feb 2004 | B1 |
6738901 | Boyles et al. | May 2004 | B1 |
6748532 | Digiorgio et al. | Jun 2004 | B1 |
6763315 | Xydis | Jul 2004 | B2 |
6788956 | Bos et al. | Sep 2004 | B2 |
6877094 | DiGiorgio et al. | Apr 2005 | B1 |
6931529 | Kunzinger | Aug 2005 | B2 |
6993658 | Engberg et al. | Jan 2006 | B1 |
7020773 | Otway et al. | Mar 2006 | B1 |
7024689 | O'Donnell et al. | Apr 2006 | B2 |
7080782 | Charrin | Jul 2006 | B2 |
7114178 | Dent et al. | Sep 2006 | B2 |
7152230 | Sato et al. | Dec 2006 | B2 |
7162631 | Audebert et al. | Jan 2007 | B2 |
7225465 | Audebert et al. | May 2007 | B2 |
7269732 | Kilian-Kehr | Sep 2007 | B2 |
7269844 | Elteto et al. | Sep 2007 | B2 |
7302571 | Noble et al. | Nov 2007 | B2 |
7310734 | Boate et al. | Dec 2007 | B2 |
7324645 | Juopperi et al. | Jan 2008 | B1 |
7340600 | Corella | Mar 2008 | B1 |
7363486 | Audebert et al. | Apr 2008 | B2 |
7366703 | Gray et al. | Apr 2008 | B2 |
7409552 | Buttyan et al. | Aug 2008 | B2 |
7650647 | Hansmann et al. | Jan 2010 | B1 |
7907935 | Le Saint et al. | Mar 2011 | B2 |
8065718 | Grove et al. | Nov 2011 | B2 |
20010007815 | Philipsson | Jul 2001 | A1 |
20010012360 | Akkar et al. | Aug 2001 | A1 |
20010013830 | Garber et al. | Aug 2001 | A1 |
20010020897 | Takatori et al. | Sep 2001 | A1 |
20010021950 | Hawley et al. | Sep 2001 | A1 |
20010024066 | Fu et al. | Sep 2001 | A1 |
20010037312 | Gray et al. | Nov 2001 | A1 |
20010045451 | Tan et al. | Nov 2001 | A1 |
20020002684 | Fox et al. | Jan 2002 | A1 |
20020040936 | Wentker et al. | Apr 2002 | A1 |
20020046342 | Elteto et al. | Apr 2002 | A1 |
20020065625 | Xydis | May 2002 | A1 |
20020066042 | Matsumoto et al. | May 2002 | A1 |
20020069030 | Xydis | Jun 2002 | A1 |
20020089410 | Janiak et al. | Jul 2002 | A1 |
20020091921 | Kunzinger | Jul 2002 | A1 |
20020095587 | Doyle et al. | Jul 2002 | A1 |
20020145051 | Charrin | Oct 2002 | A1 |
20020169975 | Good | Nov 2002 | A1 |
20020171546 | Evans et al. | Nov 2002 | A1 |
20030005300 | Noble et al. | Jan 2003 | A1 |
20030041244 | Buttyan et al. | Feb 2003 | A1 |
20030154375 | Yang | Aug 2003 | A1 |
20040054717 | Aubry et al. | Mar 2004 | A1 |
20040088567 | Lamotte | May 2004 | A1 |
20050033702 | Holdsworth | Feb 2005 | A1 |
20050033703 | Holdsworth | Feb 2005 | A1 |
20050044385 | Holdsworth | Feb 2005 | A1 |
20050044393 | Holdsworth | Feb 2005 | A1 |
20050055452 | Suzuki et al. | Mar 2005 | A1 |
20050071282 | Lu et al. | Mar 2005 | A1 |
20050138421 | Fedronic et al. | Jun 2005 | A1 |
20070245148 | Buer | Oct 2007 | A1 |
20110252466 | Le Saint et al. | Oct 2011 | A1 |
Number | Date | Country |
---|---|---|
19724901 | Dec 1998 | DE |
0733971 | Sep 1996 | EP |
0737907 | Oct 1996 | EP |
0913979 | May 1999 | EP |
0949595 | Oct 1999 | EP |
0957651 | Nov 1999 | EP |
1061482 | Dec 2000 | EP |
1128335 | Aug 2001 | EP |
1132800 | Sep 2001 | EP |
2695364 | Mar 1994 | FR |
2738436 | Mar 1997 | FR |
2001249889 | Sep 2001 | JP |
9857510 | Dec 1998 | WO |
0049820 | Aug 2000 | WO |
0117310 | Mar 2001 | WO |
0198876 | Dec 2001 | WO |
0219664 | Mar 2002 | WO |
02089444 | Nov 2002 | WO |
02091316 | Nov 2002 | WO |
Number | Date | Country | |
---|---|---|---|
20040143730 A1 | Jul 2004 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10424783 | Apr 2003 | US |
Child | 10740920 | US | |
Parent | 09880795 | Jun 2001 | US |
Child | 10424783 | US |