METHOD AND SYSTEM FOR COMMUNICATION BETWEEN A USB DEVICE AND A USB HOST
First Claim
Patent Images
1. A method for providing efficient communication between a computer and a plug-and-play secure token connected to the computer, comprising:
- upon establishing a physical connection between the computer and the plug-and-play secure token, enumerating the secure token as a device of a first type and as a device of a second type;
launching on the computer a host agent stored on the secure token;
operating the computer according to instructions of a driver for devices of the first type to receive messages communicated in a protocol associated with devices of the first type from the secure token;
operating the computer according to instructions of a driver of devices of the second type to review messages communicated in a protocol associated with devices of the second type from the secure token;
operating the computer according to instructions stored in the host agent to;
receive messages of a first type from the secure token communicated in a protocol associated with messages of the first type via the driver for devices of the first type;
received messages of a second type from the secure token communicated in a protocol associated with messages of the second type via the driver for devices of the second type; and
in response to detecting that message of the first type indicative of an availability of a data in a data buffer, retrieving the available data from the data buffer by sending a message of the second type to the secure token; and
operating the secure token according to instructions of a card-agent program including instructions to;
write data to a second data buffer of the secure token;
upon having written data to the second data buffer, sending a message of the first type indicative of the availability of data in the second data buffer;
upon receiving a message of the second type requesting access to the data buffer, transmitting the contents of the second data buffer using the protocol associated with messages of the second type.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure portable electronic device for providing secure services when used in conjunction with a host computer having a central processing unit use two hardware device protocols readily supported by computer operating systems. Other systems and methods are disclosed.
56 Citations
18 Claims
-
1. A method for providing efficient communication between a computer and a plug-and-play secure token connected to the computer, comprising:
-
upon establishing a physical connection between the computer and the plug-and-play secure token, enumerating the secure token as a device of a first type and as a device of a second type; launching on the computer a host agent stored on the secure token; operating the computer according to instructions of a driver for devices of the first type to receive messages communicated in a protocol associated with devices of the first type from the secure token; operating the computer according to instructions of a driver of devices of the second type to review messages communicated in a protocol associated with devices of the second type from the secure token; operating the computer according to instructions stored in the host agent to; receive messages of a first type from the secure token communicated in a protocol associated with messages of the first type via the driver for devices of the first type; received messages of a second type from the secure token communicated in a protocol associated with messages of the second type via the driver for devices of the second type; and in response to detecting that message of the first type indicative of an availability of a data in a data buffer, retrieving the available data from the data buffer by sending a message of the second type to the secure token; and operating the secure token according to instructions of a card-agent program including instructions to; write data to a second data buffer of the secure token; upon having written data to the second data buffer, sending a message of the first type indicative of the availability of data in the second data buffer; upon receiving a message of the second type requesting access to the data buffer, transmitting the contents of the second data buffer using the protocol associated with messages of the second type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A plug-and-play secure token with means for being connected to a computer, wherein the improvement comprises:
-
a card-agent program that upon establishing a physical connection between the computer and the plug-an-play secure token, enumerating the secure token as a device of a first type and as a device of a second type; a host agent stored on the secure token for execution on the host computer, the host agent comprising; a driver for devices of the first type to receive messages communicated in a protocol associated with devices of the first type from the secure token, and a driver of devices of the second type to receive messages communicated in a protocol associated with devices of the second type from the secure token; logic to receive messages of a first type from the secure token communicated in a protocol associated with messages of the first type via the driver for devices of the first type; logic to receive messages of a second type from the secure token communicated in a protocol associated with messages of the second type via the driver for devices of the second type; and logic to in response to detecting that message of the first type indicative of an availability of a data in a data buffer, retrieving the available data from the data buffer by sending a message of the second type to the secure token; and the card-agent further comprising instructions to cause the secure token to; write data to a second data buffer of the secure token; upon having written data to the second data buffer, sending a message of the first type indicative of the availability of data in the second data buffer; upon receiving a message of the second type requesting access to the data buffer, transmitting the contents of the second data buffer using the protocol associated with messages of the second type. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification