Method and system for establishing trusted communication using a security device
First Claim
1. A method for providing a secure access from a security device at a local network location to a remote network location, the method comprising:
- at the security device, having a unique identifier (UID), a processor, and a memory;
obtaining, from a remote network location, a security software, and causing the security software to obtain a personal identification number (PIN) of a user, and the UID of the security device;
forwarding the PIN, the UID and the security software to the remote network location for generating a credential code using the PIN, the UID and the security software, comprising encrypting the credential code;
at the security device, obtaining the credential code from the remote network location, and verifying an authenticity of the PIN and the UID, without communicating over a network, comprising decrypting the credential code;
retrieving access credentials to the remote network location upon verifying the authenticity of the PIN and the UID; and
communicating to the remote network location using the retrieved access credentials.
2 Assignments
0 Petitions
Accused Products
Abstract
Method and system for secure access from a security device at a local network location to a remote network location are disclosed. At the security device having a unique identifier (UID), processor, and memory, a security software is obtained from a remote network location, the security software obtaining a personal identification number (PIN) of a user, and the UID of the security device. The PIN, the UID and the private security software are forwarded to the remote network location for generating a credential code, including encrypting the credential code. At the security device, the credential code is obtained from the remote network location, and authenticity of the PIN and the UID is verified, without communicating over a network, including decrypting the credential code. Upon verifying the authenticity of the PIN and the UID, access credentials to the remote network location are retrieved.
59 Citations
20 Claims
-
1. A method for providing a secure access from a security device at a local network location to a remote network location, the method comprising:
-
at the security device, having a unique identifier (UID), a processor, and a memory; obtaining, from a remote network location, a security software, and causing the security software to obtain a personal identification number (PIN) of a user, and the UID of the security device; forwarding the PIN, the UID and the security software to the remote network location for generating a credential code using the PIN, the UID and the security software, comprising encrypting the credential code; at the security device, obtaining the credential code from the remote network location, and verifying an authenticity of the PIN and the UID, without communicating over a network, comprising decrypting the credential code; retrieving access credentials to the remote network location upon verifying the authenticity of the PIN and the UID; and communicating to the remote network location using the retrieved access credentials. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for providing a secure access from a local network location to a remote network location, the system comprising:
-
a remote server computer at the remote network location; and a security device, having a unique identifier (UID), a processor, and a memory having computer readable instructions stored thereon, causing the processor to; obtain, from the remote network location, a security software, and causing the security software to obtain a personal identification number (PIN) of a user, and the UID of the security device; forward the PIN, the UID and the security software to the remote network location for generating a credential code using the PIN, the UID and the security software, comprising encrypting the credential code; at the security device, obtain the credential code from the remote network location, and verify an authenticity of the PIN and the UID, without communicating over a network, comprising decrypting the credential code; retrieve access credentials to the remote network location upon verifying the authenticity of the PIN and the UID; and communicate to the remote network location using the retrieved access credentials. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for providing a secure access from a local network location to a remote network location, the apparatus comprising:
-
a security device, having a unique identifier (UID), a processor, and a memory having computer readable instructions stored thereon, causing the processor to; obtain, from the remote network location, a security software, and causing the security software to obtain a personal identification number (PIN) of a user, and the UID of the security device; forward the PIN, the UID and the security software to the remote network location for generating a credential code using the PIN, the UID and the security software, comprising encrypting the credential code; at the security device, obtain the credential code from the remote network location, and verify an authenticity of the PIN and the UID, without communicating over a network, comprising decrypting the credential code; retrieve access credentials to the remote network location upon verifying the authenticity of the PIN and the UID; and communicate to the remote network location using the retrieved access credentials. - View Dependent Claims (17, 18, 19, 20)
-
Specification