Secure pin entry into a security chip
First Claim
Patent Images
1. A computer system comprising:
- a processor;
machine readable storage media for storing programs performable by the processor;
input means for receiving input from a user;
a display device for providing visual output from the software applications to the user;
a system bus connecting the processor to the display device and the input means;
an interface adapter for transferring input from the user at the input means to the system bus;
a security chip requiring a personal identifier code from the user for performance of at least one of the programs in the storage media; and
interposer means for routing the personal identifier code from the input means to the security chip independently of the system bus.
2 Assignments
0 Petitions
Accused Products
Abstract
A personal computer furnishes a secure path for a security chip of the personal computer for entry of a personal identification number code (PIN). The path is not sniffable or surreptitiously detectable by software. The security chip is removably mounted on a daughter card rather than hardwired to the motherboard of the personal computer. With proper authorization, an interposer may be inserted between the daughtercard and the motherboard. When the PIN becomes necessary, it need not be entered through a keyboard and transmitted to the daughtercard over a bus where it is capable of surreptitious detection or interception. The PIN is instead entered directly from a keypad into the daughtercard.
-
Citations
29 Claims
-
1. A computer system comprising:
-
a processor;
machine readable storage media for storing programs performable by the processor;
input means for receiving input from a user;
a display device for providing visual output from the software applications to the user;
a system bus connecting the processor to the display device and the input means;
an interface adapter for transferring input from the user at the input means to the system bus;
a security chip requiring a personal identifier code from the user for performance of at least one of the programs in the storage media; and
interposer means for routing the personal identifier code from the input means to the security chip independently of the system bus. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 15, 16, 17, 18, 19, 20, 21, 22, 23, 25, 26, 27, 28, 29)
-
-
14. A computer system comprising:
-
a processor;
machine readable storage media for storing programs performable by the processor;
input means for receiving input from a user;
a display device for providing visual output from the software applications to the user;
a system bus connecting the processor to the display device and the input means;
an interface adapter for transferring input from the user at the input means to the system bus a security chip requiring a personal identifier code from the user for performance of at least one of the programs in the storage media;
a direct communication channel for transferring user input from the input means to the security chip; and
interposer means for routing the personal identifier code over the direct communication channel to the security chip.
-
-
24. A method of transferring a personal identifier code to a security chip in a personal computer system comprising the steps of:
-
entering the personal identifier code in a security entry input to the personal computer in response to a request from a processor of the computer over a computer system bus;
receiving the personal identifier code in an interposer connected between the security entry input and the security chip; and
transferring the personal identifier code from the interposer independently of the computer system bus.
-
Specification