ISOLATED AUTHENTICATION DEVICE AND ASSOCIATED METHODS
First Claim
1. A method for using an authentication device, comprising the steps of:
- receiving a document in electronic form;
creating a hash based on the document with a processor in the authentication device;
encrypting the hash with a private key in the authentication device; and
forwarding or send the document with the encrypted hash.
0 Assignments
0 Petitions
Accused Products
Abstract
An isolated authentication device and related methods to provide a reliable means of authenticating the identity of its user to a network resource or server or other resource, and of authenticating the identity of a network resource or server or other resource to the device'"'"'s user. The isolated authentication device may be attached to or in communication with a host device, such as a mobile telephone, personal digital or data assistant, GPS multifunction device, portable music player, wristband watch, personal computer, or similar device. A constrained operating system provides limited functionality, including authentication, data transfer, and cryptographic functions. Encrypted image, fingerprint, password, and/or personal identification number data is stored in read-only or protected nonvolatile memory. Input may be provided by means of a numeric or alphanumeric keypad, and images and information may be displayed on a screen. The device may be used to digitally sign a document, or a key to a lock.
-
Citations
11 Claims
-
1. A method for using an authentication device, comprising the steps of:
-
receiving a document in electronic form;
creating a hash based on the document with a processor in the authentication device;
encrypting the hash with a private key in the authentication device; and
forwarding or send the document with the encrypted hash. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of using an authentication device, comprising the steps of:
-
receiving a document in electronic form accompanied by an encrypted hash, said encrypted hash created by an authentication device based on the document and a private key;
decrypting the encrypted hash using the public key corresponding to the private key;
creating a confirmation hash based on the document using the same hash algorithm used by the authentication device; and
comparing the confirmation hash with the decrypted hash.
-
-
9. A method of using an authentication device, comprising the steps of:
-
receiving a signal from an authentication device by a lock to identify the authentication device;
verifying that the authentication device or its user is authorized to open the lock;
generating a random digital file and encrypting it using a public key associated with the authentication device;
sending the encrypted digital file to the authentication device for decryption using a private key paired with the public key;
receiving the decrypted digital file from the authentication device; and
unlocking the lock if the decrypted digital file from the authentication device matches the random digital file initially generated. - View Dependent Claims (10, 11)
-
Specification