Tamper detection and secure power failure recovery circuit
First Claim
1. A security system comprising:
- a token comprising;
volatile random access memory for storing security data for use during a step of secure authentication;
an interface for providing communication between the token and a host system when coupled thereto; and
a processor for performing the steps of;
receiving via the interface authentication data;
authenticating the token for performing security functions in response to correct authentication data;
providing via the interface secure information in response to correct authentication data;
storing within the token security data relating to the security information in response to correct authentication data; and
re-authenticating the token for performing security functions in response to receipt of the secure information after a reset of the token has occurred.
13 Assignments
0 Petitions
Accused Products
Abstract
A security system is disclosed, including a token as well as a host system. The token consists of volatile random access memory for storing security data for use during a step of secure authentication, an interface for providing communication with a host system when coupled thereto, and a processor. The processor performs the steps of authenticating a host system and the token, providing secure information to the host system upon authentication therewith, and re-authenticating the host system and the token in response to receipt of the secure information after a reset of the token has occurred. Alternatively, the token contains an internal voltage source for providing a supply voltage to the security system for a predetermined amount of time, when an external voltage source providing a supply voltage to the security system is disrupted, a tamper detection device for detecting an absence of a ground connected to the token and for providing a tamper signal when a ground is detected as absent, and a volatile random access memory clear circuit for clearing the security data within the volatile random access memory in response to the tamper signal.
83 Citations
22 Claims
-
1. A security system comprising:
a token comprising;
volatile random access memory for storing security data for use during a step of secure authentication;
an interface for providing communication between the token and a host system when coupled thereto; and
a processor for performing the steps of;
receiving via the interface authentication data;
authenticating the token for performing security functions in response to correct authentication data;
providing via the interface secure information in response to correct authentication data;
storing within the token security data relating to the security information in response to correct authentication data; and
re-authenticating the token for performing security functions in response to receipt of the secure information after a reset of the token has occurred. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A method for secure re-authentication of a secure server comprising the steps of:
-
transmitting authentication data from a host system to a token for authenticating to the token;
receiving key data at the host system in response to the transmitted authentication data and provided by the token;
storing the key data on the host system in non-volatile memory thereof;
storing re-authentication data within the token based on the key data provided to the host system;
upon a resumption of power following a power failure resulting in a power outage to the host system, providing the key data from the host system to the token for secure re-authentication therewith;
determining if the key data is correct key data associated with the stored re-authentication data; and
,when the key data is correct key data associated with the stored re-authentication data, re-authentication the host system and the token. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A security system comprising:
a token comprising;
volatile random access memory for storing security data for use during a step of secure authentication;
an internal voltage source for providing a supply voltage to the security system for a predetermined amount of time, when an external voltage source providing a supply voltage to the security system is disrupted;
an interface for providing communication with a host system when coupled thereto;
a tamper detection device for detecting an absence of a ground connected to the token and for providing a tamper signal when a ground is detected as absent; and
a volatile random access memory clear circuit for clearing the security data within the volatile random access memory in response to the tamper signal. - View Dependent Claims (20)
-
21. A method for secure re-authentication of a secure server comprising the steps of:
-
storing re-authentication data within memory within a token;
detecting a presence of a ground coupled to the token; and
,when a ground is other than coupled to the token, erasing the re-authentication data within the memory. - View Dependent Claims (22)
-
Specification