Setting up a security access system
First Claim
1. A machine-implemented method comprising:
- sending an access key from a module to a system to enable the system to generate a passcode;
wherein a passcode is not stored on the module after the sending of the passcode.
1 Assignment
0 Petitions
Accused Products
Abstract
In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after the receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the acccess key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
84 Citations
12 Claims
-
1. A machine-implemented method comprising:
-
sending an access key from a module to a system to enable the system to generate a passcode;
wherein a passcode is not stored on the module after the sending of the passcode. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A machine-implemented method comprising:
-
acquiring user data;
extracting user information from the user data;
storing the user information;
applying a one-way method to the user information, therein generating an encryption key;
sending the encryption key to a system to enable the system to generate a passcode based on the encryption key; and
storing the encryption key on a module;
wherein the passcode is not stored on the module.
-
-
9. A machine-implemented method comprising:
-
installing one or more instructions that require an access key on a system;
wherein the system does not store the access key. - View Dependent Claims (10, 11, 12)
-
Specification