TRUSTED STORAGE AND DISPLAY
First Claim
Patent Images
1. A storage token removeably attachable to a computer comprising:
- a port for removably coupling to the computer, the port supporting bi-directional data communication;
a memory with a hierarchical file system;
a display;
an input; and
a processor executing a token operating system that displays a hierarchical memory location and a confirmation message when access to the hierarchical memory location is requested by the computer.
2 Assignments
0 Petitions
Accused Products
Abstract
A storage token has a display and a keyboard, or other input device, that allows a user to view a request to access a memory location and enter a response to the request. The display allows presentation of details of the request, such as a pathname to a requested memory location, metadata describing a cryptographic key for use in a transaction confirmation, and/or transaction details which are awaiting verification by a credential stored on the token. The storage token may also include a cryptographic engine and a secure memory allowing signing data returned in response to the request.
9 Citations
20 Claims
-
1. A storage token removeably attachable to a computer comprising:
-
a port for removably coupling to the computer, the port supporting bi-directional data communication; a memory with a hierarchical file system; a display; an input; and a processor executing a token operating system that displays a hierarchical memory location and a confirmation message when access to the hierarchical memory location is requested by the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of operating a storage token with a user interface integral to the storage token, the method comprising:
-
coupling the storage token to a host; accepting a request for access to the storage token from the host; displaying the request for access to the storage token on the user interface, including a reference to a type of the request; receiving an instruction via the user interface corresponding to the request; and providing a signed response to the host. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of controlling access to data stored in a storage token having computer-readable storage, a display, a plurality of keys, and a cryptographic unit, the method comprising:
-
coupling the storage token to a computer and creating a session; receiving a request via the session for access to the computer-readable storage; displaying the request, including a name corresponding to one of a memory location and a cryptographic key; receiving a personal identification number (PIN) via the plurality of keys; verifying that the PIN corresponds to an authorized entity; retrieving data corresponding to the request when the PIN is verified; signing the data to form a signed data; and responding to the request with the signed data. - View Dependent Claims (20)
-
Specification