Dual-Interface Key Management
First Claim
1. A method comprising:
- receiving key-management information at an access card;
storing the key-management information in a memory of the access card, whereinsaid storing stores the key-management information as stored key-management information,the access card is configured such that the stored key-management information cannot be modified in response to information received via a first interface of the access card,the key-management information is received via a second interface of the access card, andthe second interface is distinct from the first interface;
generating an access request based at least in part on the stored key-management information; and
transmitting the access request from the access card via the first interface.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a device includes a first interface, a second interface, a memory, and a processor coupled to the first and second interfaces and to the memory. The processor is configured to receive key-management information via the second interface, and to store the key-management information in a protected portion of the memory as stored key-management information. The processor is also configured to perform a challenge-response authentication interaction via the first interface. The challenge-response authentication interaction is based at least in part on the stored key-management information. The device is configured to prevent data in the protected portion of the memory from being modified in response to information received via the first interface.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving key-management information at an access card; storing the key-management information in a memory of the access card, wherein said storing stores the key-management information as stored key-management information, the access card is configured such that the stored key-management information cannot be modified in response to information received via a first interface of the access card, the key-management information is received via a second interface of the access card, and the second interface is distinct from the first interface; generating an access request based at least in part on the stored key-management information; and transmitting the access request from the access card via the first interface. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A device comprising:
-
a first interface; a second interface, distinct from the first interface; a memory; and a processor coupled to the first interface, the second interface, and the memory, wherein the processor is configured to receive key-management information via the second interface, the processor is configured to store the key-management information in a protected portion of the memory as stored key-management information, the processor is configured to perform a challenge-response authentication interaction via the first interface, the challenge-response authentication interaction is based at least in part on the stored key-management information, and the device is configured to prevent data in the protected portion of the memory from being modified in response to information received via the first interface. - View Dependent Claims (9, 10)
-
-
11. A system comprising:
-
means for receiving key-management information at an access card, wherein the access card comprises a first interface, a second interface, distinct from the first interface, and a memory, and the key-management information is received via the second interface; means for storing the key-management information in the memory, wherein the means for storing stores the key-management information as stored key-management information, and the access card is configured such that the stored key-management information cannot be modified in response to information received via the first interface; means for generating an access request based at least in part on the stored key-management information; and means for transmitting the access request from the access card via the first interface. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A computer-readable storage medium having encoded thereon instruction executable by one or more processors to perform acts comprising:
-
receiving key-management information at an access card, wherein the access card comprises a first interface, a second interface, distinct from the first interface, and a memory, and the key-management information is received via the second interface; storing the key-management information in the memory, wherein the storing stores the key-management information as stored key-management information, and the access card is configured to prevent the stored key-management information from being modified in response to information received via the first interface; generating an access request based at least in part on the stored key-management information; and transmitting the access request from the access card via the first interface.
-
-
18. A system comprising:
-
an interface; a memory; and a processor coupled to the interface and to the memory, wherein the processor is configured to receive challenge data according to an authentication protocol via the interface, process the challenge data to obtain key-management information from the challenge data, and store the key-management information in the memory. - View Dependent Claims (19, 20)
-
Specification