Receiving an access key
First Claim
1. A machine-implemented method comprising:
- receiving an access key;
performing an action that requires the access key as a part of performing the action for the action to be performed properly;
erasing the access key prior to receiving a next access key; and
receiving a next access key.
1 Assignment
0 Petitions
Accused Products
Abstract
In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
83 Citations
24 Claims
-
1. A machine-implemented method comprising:
-
receiving an access key; performing an action that requires the access key as a part of performing the action for the action to be performed properly; erasing the access key prior to receiving a next access key; and receiving a next access key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 11, 20, 21, 22, 23, 24)
-
-
9. A machine-implemented method comprising:
-
receiving from a module a request to perform a task, the receiving occurring anytime after setting up for the module is complete; and in response to the receiving, sending a stored passcode to the module from which the request originated. - View Dependent Claims (13)
-
-
10. A machine-implemented method comprising:
-
receiving a request to execute one or more encryption instructions; in response, sending a stored passcode to a module from which the request originated; receiving an access key; generating a new passcode based on the access key; executing the one or more encryption instructions based on the access key; erasing the access key; erasing the stored passcode; and storing the new passcode. - View Dependent Claims (14, 15)
-
-
12. A machine-implemented method comprising:
-
receiving an access key; performing an action that requires the access key as a part of performing the action for the action to be performed properly; and erasing the access key prior to receiving a next access key; the next access key is not stored at a device that performed the task during a period between the erasing and performing another task requiring the next access key.
-
-
16. A machine-implemented method comprising:
-
after a device is set up, receiving an access key at the device; performing an action that requires the access key; and erasing the access key.
-
-
17. A method comprising:
-
after an unsecured device and a secured module are set up, receiving at the unsecured device from the secured module, a request to perform an action that requires authorization; in response to the receiving, the unsecured system sends a first passcode to the secure module; in reply to the sending of the first passcode, if the first passcode is correct, receiving at the unsecured system a first encryption key from the secure module; in response to receiving at the unsecured system the first encryption key, encrypting or decrypting data with the first encryption key, and generating a second passcode, that is different from the first passcode, by at least applying a function to the first encryption key; at the unsecured system, erasing the first passcode and replacing the first passcode with the second passcode; and after the encrypting or decrypting of the data is complete and before a second encryption key is received at the unsecured device, erasing the first encryption key at the unsecured system; the first encryption key and second encryption key are different values that are based on one or more values that results from applying a function to biometric information, the function being one for which computing an inverse is computationally intractable. - View Dependent Claims (18)
-
-
19. A machine-implemented method comprising:
-
receiving an access key; performing an action that requires the access key as a part of performing the action for the action to be performed properly; and erasing the access key prior to receiving a next access key; the access key is based on a value that results from applying a function to user information that is expected to be unique to the user, the function being one for which computing an inverse is computationally intractable.
-
Specification