Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device
First Claim
Patent Images
1. A system for implementing a trusted counter in a personal communication device, comprising:
- a secure module comprising a first storage device;
a second storage device;
a third storage device; and
a processor in communication with said secure module, said second and said third storage devices configured to;
execute authentication of said second storage device by said secure module;
request a counter value from second storage device to said secure module;
writing a secured state information and counter value from said secure module to said third storage device.
3 Assignments
0 Petitions
Accused Products
Abstract
Method, system and computer program product for implementing a trusted counter in a personal communication device. In particular, the method, system and computer program product utilizes cryptography and an external, read-write storage device that stores important state information that cannot be modified without detection. Using the present invention, the counter can be implemented in a personal even if state information is stored in an insecure storage device.
97 Citations
22 Claims
-
1. A system for implementing a trusted counter in a personal communication device, comprising:
-
a secure module comprising a first storage device;
a second storage device;
a third storage device; and
a processor in communication with said secure module, said second and said third storage devices configured to;
execute authentication of said second storage device by said secure module;
request a counter value from second storage device to said secure module;
writing a secured state information and counter value from said secure module to said third storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. The method for implementing a trusted counter in a personal communication device, comprising a first storage device within a secure module, a second storage device, and a third storage device, the method comprising:
-
authenticating a second storage device;
receiving a counter value from said second storage device to said secure module;
creating a secure state information and counter value in said second storage device using a cryptographic transform;
storing said secured counter value in said third storage device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer program product for implementing a trusted counter in a personal communication device comprising a first storage device within a secure module, a second storage device, and a third storage device, the method comprising:
-
a computer readable medium;
program code in said computer readable medium for authenticating second storage device;
program code in said computer readable medium for requesting a counter value from said second storage device;
program code in said computer readable medium for creating a secure state information and counter value in a second storage device based on said counter value from said first storage device; and
program code in said computer-readable medium for storing said secure counter value in a third storage device. - View Dependent Claims (21, 22)
-
Specification