System and method for controlling the right to use an item
First Claim
1. A system for controlling a right to use an item, said system comprising:
- a server operating on a plurality of inputs to generate a result; and
a security object disconnected from the server and configured to receive the result and determine whether to grant the right to use the item based on the result.
5 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are provided for controlling the right to use an item. A user seeking the use of the item may communicate to a server a code identifying a security object and any other information requested by the server. The server may use the code to retrieve a key associated with the security object. The server may execute a cryptographic algorithm on at least the key and a time-dependent input to generate a one-time password, which the server may report to the user. The one-time password may be used to successfully gain access to the security object item only once within a predetermined period of time. The security object, which is disconnected from the server, may receive from the user the one-time password and execute a cryptographic algorithm on a locally-retrieved key and a time-dependent input to generate another one-time password. If the one-time passwords match, the user may be granted access to the item.
15 Citations
37 Claims
-
1. A system for controlling a right to use an item, said system comprising:
-
a server operating on a plurality of inputs to generate a result; and
a security object disconnected from the server and configured to receive the result and determine whether to grant the right to use the item based on the result. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for controlling a right to use an item, said system comprising:
-
a server operating on a plurality of inputs to generate a result for use by a security object that is disconnected from the server, wherein the security object is configured to receive the result and determine whether to grant the right to use the item based on the result; and
a database including at least one of the plurality of inputs. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A security object, disconnected from a server, for controlling a right to use an item, said security object comprising:
-
a user interface configured to receive a first result generated by the server; and
a use control device operating on a plurality of inputs to generate a second result and comparing the first and second results to determine whether to grant the right to use the item. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A method for controlling a right to use an item, comprising:
-
a server accessing a code used to identify a security object that controls the right to use the item and that is disconnected from the server; and
the server generating a result based on the code such that the right to use the item is determined by the security object based on the result. - View Dependent Claims (26, 27, 28, 29, 30, 31)
-
-
32. A method for controlling a right to use an item, comprising:
-
providing a code used to identify a security object that controls the right to use the item; and
receiving a first result based on the code and generated by a server that is disconnected from the security object. - View Dependent Claims (33, 34, 35, 36, 37)
-
Specification