Security system for high level transactions between devices
First Claim
Patent Images
1. A system for securing data transactions between a remote device and a host device, the remote device comprising:
- an interface adapted for operative connection between the host device and the remote device;
a managing controller operatively connected to the interface, the managing controller for controlling data transactions between the remote device and host device; and
, a hardware random number generator (HRNG) controller operatively connected to the managing controller for providing non-deterministic random number data for data encryption to the managing controller.
0 Assignments
0 Petitions
Accused Products
Abstract
The invention provides a security system and methods for high level transactions between devices. The system includes a non-deterministic hardware random number generator to provide multi-level encryption between a remote and host device.
62 Citations
48 Claims
-
1. A system for securing data transactions between a remote device and a host device, the remote device comprising:
-
an interface adapted for operative connection between the host device and the remote device;
a managing controller operatively connected to the interface, the managing controller for controlling data transactions between the remote device and host device; and
,a hardware random number generator (HRNG) controller operatively connected to the managing controller for providing non-deterministic random number data for data encryption to the managing controller. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A dongle for controlling and managing data communications between a host device and the dongle, comprising:
-
an interface adapted for operative connection between the host device and the dongle;
a managing controller operatively connected to the interface, the managing controller for receiving and providing data to and from the host device and for receiving and providing data to and from a hardware random number generator controller operatively connected to the managing controller, the HRNG controller for providing non-deterministic random number data to the managing controller. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 48)
-
-
39. A method of enrolling a specific remote device with a host device comprising the steps of:
-
a. generating and storing a non-deterministic ID number in the remote device;
b. encrypting the ID number to a first level with a non-deterministic ID decrypt key;
c. encrypting the first level encrypted ID number to a second level with a public key;
d. passing the second level encrypted ID number to the host device;
e. decrypting the second level encrypted ID number in the host device with the public key to the first level and storing the first level encrypted ID number in the host device.
-
-
40. A method of verifying the enrollment of a specific remote device with a host device comprising the steps of:
-
a. requesting a first level encrypted non-deterministic ID number from the host device by the remote device;
b. receiving and decrypting the first level encrypted non-deterministic ID number with a previously generated and stored non-deterministic ID decrypt key; and
,c. verifying equivalency between the decrypted non-deterministic ID number of step b) with a previously generated and stored non-deterministic ID number in the remote device.
-
-
41. A method of transferring data between a remote device previously enrolled with a host device comprising the steps of:
-
a. encrypting a data packet with a non-deterministic data decrypt key;
b. encrypting an ID number with a non-deterministic ID decrypt key;
c. appending the encrypted data packet of step a) to the encrypted ID number of step b) with the ID decrypt key of step b) to form an encrypted data packet;
d. encrypting the encrypted data packet of step c) with a public key to form a second level encrypted data packet;
e. passing the second level encrypted data packet to the host device; and
,f. decrypting the second level encrypted data packet of step e) with the public key and data decrypt key to retrieve the data packet. - View Dependent Claims (42)
-
-
43. A system for enrolling a user with a service provider to allow access to the service provider from a non-secure location comprising the steps of:
-
at a secure or non-secure location for enrolling the user, a) providing a user with a character personal identification number (PIN);
b) providing a user with a voice PIN;
c) having a user speak the voice PIN into a voiceprint processor to create a secure-location voice print file of the voice PIN;
d) storing the character PIN and voice print file in an authorized user database. - View Dependent Claims (44, 45, 46, 47)
-
Specification