System and apparatus for limiting access to secure data through a portable computer to a time set with the portable computer connected to a base computer
First Claim
1. A method for providing access to secure data through a portable computing system during a specified time, wherein said method comprises:
- establishing a connection between said portable computing system and a base computing system to provide for transfer of data between said portable computing system and said base computing system;
verifying identity of said base computing system within said portable computing system;
resetting a timer within said portable computing system to run for a specified time; and
providing access to said secure data only when said timer is running.
3 Assignments
0 Petitions
Accused Products
Abstract
Access to secure data through a portable computing system is provided only when a timer within the system is running. The timer is reset with the portable system connected to a base system, either directly, as by a cable, or indirectly, as through a telephone network. In an initialization process, the portable and base systems exchange data, such as public cryptographic keys, which are later used to confirm that the portable system is connected to the same base system. In one embodiment, the initialization process also includes storing a password transmitted from the portable system within the base system, with this password later being required within the reset process.
-
Citations
38 Claims
-
1. A method for providing access to secure data through a portable computing system during a specified time, wherein said method comprises:
-
establishing a connection between said portable computing system and a base computing system to provide for transfer of data between said portable computing system and said base computing system;
verifying identity of said base computing system within said portable computing system;
resetting a timer within said portable computing system to run for a specified time; and
providing access to said secure data only when said timer is running. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method providing for access to secure data through a portable computing system, wherein said access to said secure data is limited to a specified time, and wherein said method comprises:
-
initializing a base computing system and said portable computing system to work together as a system by an initialization process comprising storing data identifying said base computing system within said portable computing system; and
resetting said portable computing system by a reset process following said initialization process including;
establishing a connection to transmit data between said portable computing system and a base computing system;
determining, using said data identifying said base computing system, that said connection has been made between said portable computing system and said base computing system;
setting a timer within said portable computing system to run until said specified time has expired;
determining if said timer is running; and
providing access to said secure data only when said timer is running. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for providing controlled access to secure data, wherein said system comprises:
-
a portable computing system providing said controlled access to secure data during a specified time, wherein said portable computing system includes first processing means, first storage means, and a timer;
a base computing system including second processing means and second storage means;
a connection between said portable computing system and said base computing system for transmitting data between said portable computing system and said base computing system; and
a first program, executing within said first processing means, causing said portable computing system to perform a process including;
determining if a public cryptographic key is stored in a first location within said first storage means;
in response to determining that a public cryptographic key is not stored in said first location, transmitting a request code, receiving said public cryptographic key, and storing said public cryptographic key in said first location;
transmitting a first code;
receiving a response to said first code;
determining from said response to said first code if a connection has been made to said base computing system; and
setting said timer to run until said specified time has expired;
a subroutine executing within said first processing means, causing said portable computing system to perform a process including;
determining if said timer is running; and
providing access to said secure data only when said timer is running; and
a second program, executing within said second processing means, causing said base computing system to perform a process including;
receiving said request code;
in response to receiving said request code, transmitting a public cryptographic key of said base computing system to said portable computing system;
receiving said first code; and
in response to receiving said first code, transmitting said response to said first code. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28)
-
-
29. A computer readable medium within a portable computing system, wherein said computer readable medium has computer readable instructions for performing a method comprising:
-
determining if a public cryptographic key is stored in a first location within said first storage means;
in response to determining that a public cryptographic key is not stored in said first location, transmitting a request code, receiving said public cryptographic key, and storing said public cryptographic key in said first location;
transmitting a first code;
receiving a response to said first code;
determining from said response to said first code if a connection has been made to a base computing system; and
setting a timer to run until a specified time has expired. - View Dependent Claims (30, 31, 32, 33, 34)
-
-
35. In a portable computing system having a user interface including a display and a keyboard, a method for limiting access to secure data to a specified time, wherein said method comprises:
-
displaying a screen location for entering a number;
accepting an input from said keyboard;
displaying said input from said keyboard in said screen location;
calculating a number determining said specified time as a function of said input from said keyboard;
generating a random number;
transmitting said random number to a base computing system;
receiving an encrypted number from said base computing system, decrypting said encrypted number with a public cryptographic key stored within said portable computing system to form a decrypted number;
determining if said random number matches said decrypted number; and
in response to determining that said random number matches said decrypted number, setting a timer within said portable computing system to run for said specified time, wherein said access to secure data is provided only when said time is running. - View Dependent Claims (36, 38)
-
-
37. In a portable computing system having a user interface including a display and a keyboard, a method for limiting access to secure data to a specified time, wherein said method comprises:
-
displaying a first screen location for entering a password and a second screen location for entering a number;
accepting a first input from said keyboard;
generating a password from said first input;
accepting a second input from said keyboard;
displaying said input from said keyboard in said second screen location;
calculating a number determining said specified time as a function of said second input from said keyboard;
generating a random number;
encrypting said password with a public cryptographic key stored in said portable computing system;
transmitting said random number to a base computing system;
receiving an encrypted number from said base computing system, decrypting said encrypted number with said public cryptographic key stored within said portable computing system to form a decrypted number;
determining if said random number matches said decrypted number; and
in response to determining that said random number matches said decrypted number, setting a timer within said portable computing system to run for said specified time, wherein said access to secure data is provided only when said time is running.
-
Specification