Tokencode Exchanges for Peripheral Authentication
First Claim
Patent Images
1. An authentication method for use in a system comprising a peripheral configured for communication with a host device, the method comprising the steps of:
- generating a first code in the peripheral;
transmitting the first code from the peripheral to the host device, the first code being presentable by the host device to an authentication server for authentication;
receiving in the peripheral from the host device a second code provided to the host device by the authentication server; and
authenticating the second code in the peripheral.
14 Assignments
0 Petitions
Accused Products
Abstract
In a system comprising a transient storage device (TSD) or other type of peripheral configured for communication with a host device, a first one-time password or other type of code is generated in the peripheral and transmitted to the host device. The first code is presented by the host device to an authentication server for authentication. The host device receives a second one-time password or other type of code from the authentication server and transmits it to the peripheral for authentication.
-
Citations
25 Claims
-
1. An authentication method for use in a system comprising a peripheral configured for communication with a host device, the method comprising the steps of:
-
generating a first code in the peripheral;
transmitting the first code from the peripheral to the host device, the first code being presentable by the host device to an authentication server for authentication;
receiving in the peripheral from the host device a second code provided to the host device by the authentication server; and
authenticating the second code in the peripheral. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. An apparatus comprising:
-
a peripheral having a processor coupled to a memory, the peripheral being configured for communication with a host device;
wherein the peripheral is operative to generate a first code and to transmit the first code to the host device, the first code being presentable by the host device to an authentication server for authentication; and
wherein the peripheral is further operative to receive from the host device a second code provided to the host device by the authentication server, and to authenticate the second code. - View Dependent Claims (21, 22)
-
-
23. An authentication method for use in a system comprising a peripheral configured for communication with a host device, the method comprising the steps of:
-
receiving in the host device a first code from the peripheral;
transmitting the first code from the host device to an authentication server for authentication;
receiving in the host device a second code from the authentication server; and
transmitting the second code to the peripheral for authentication.
-
-
24. An authentication method for use in a system comprising a peripheral configured for communication with a host device, the method comprising the steps of:
-
receiving in an authentication server a first code delivered from the peripheral via the host device;
authenticating the first code in the authentication server; and
transmitting a second code from the authentication server to the host device, the second code being presentable by the host device to the peripheral for authentication.
-
-
25. A system comprising:
-
a peripheral;
a host device configured for communication with the peripheral; and
an authentication server configured for communication with the host device;
wherein a first code from the peripheral is delivered to the authentication server via the host device for authentication; and
wherein a second code from the authentication server is delivered to the peripheral via the host device for authentication.
-
Specification