PC Security Lock Device Using Permanent ID and Hidden Keys
First Claim
1. A system for securing data in a local computer, the system comprising:
- a secure dongle, the secure dongle comprising;
a communications port configured to communicate with a local computer;
a permanent memory, the memory comprising a permanent unique identification code, a permanent asymmetrical encryption key pair, a permanent asymmetrical signature key pair, and a permanent vault file encryption key; and
a processor, wherein the processor is configured to generate and verify signatures using the permanent asymmetrical signature key pair; and
,a software package configured for installation on the local computer, the software package configured, upon installation on the local computer, to request specific identification information from the dongle.
0 Assignments
0 Petitions
Accused Products
Abstract
The invention is a method, system, and apparatus providing user control and security of a PC system. Using the hardware and associated installation software, the system is capable of uniquely securing a PC system without the need for name and password entry. The secure USB device contains a unique asymmetrical key pair, unique device ID, secure storage area, and the firmware to control all of this. In providing the security and control, one embodiment of the invention does not require biomechanical devices or name and password entry systems. There are no passwords and login names to be found, and the encryption/decryption keys are protected from exposure. This provides a more secure environment, as the keys are protected from exposure. The user is in control of the PC system and the data which is desired to be kept secure.
-
Citations
20 Claims
-
1. A system for securing data in a local computer, the system comprising:
-
a secure dongle, the secure dongle comprising; a communications port configured to communicate with a local computer; a permanent memory, the memory comprising a permanent unique identification code, a permanent asymmetrical encryption key pair, a permanent asymmetrical signature key pair, and a permanent vault file encryption key; and a processor, wherein the processor is configured to generate and verify signatures using the permanent asymmetrical signature key pair; and
,a software package configured for installation on the local computer, the software package configured, upon installation on the local computer, to request specific identification information from the dongle. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A dongle for providing access to secure data, the dongle comprising:
-
a communication port; a processor configured to generate and verify signatures; a permanent memory, the memory comprising; a permanent unique identification code; a permanent asymmetrical email encryption key pair comprising a public encryption key and a private decryption key; a permanent asymmetrical signature key pair comprising a public signature key and a private signature key; and a permanent vault file encryption key, - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A method for securing data on a local computer, the method performed in conjunction with the local computer and a secure device and a remote master server, wherein the secure device is configured to be secured to or placed adjacent to the local computer and to communicate with the local computer, the secure device having a unique identification number, an email encryption key comprising an email public-private key pair, and a signature generating key comprising a signature public-private key pair, the local computer having a storage medium having data thereon, the method comprising:
-
providing the secure device with the unique identification number, the email encryption key, and the signature generating key pre-installed in a permanent memory of the secure device; installing a first portion of secure device support software onto the local computer, wherein the secure device support software is configured to interact with the secure device; establishing and confirming the existence of an internet connection between the local computer and remote master server; communicatively connecting the secure device with the local computer, wherein the secure device is secured to or placed adjacent to the local computer; generating, within the secure device, a secure device signature using a private signature generation key from the signature public-private key pair; transmitting the secure device signature to the local computer; storing the secure device signature on the local computer; and transmitting unique identifying information of the secure device to the master server via the internet connection; confirming, at the master server, the authenticity of the unique identifying information of the secure device; authorizing, by the master server, of installation of a remaining portion of the secure device support software onto the local computer; transmitting, from the master server to the local computer, the authorization of the installation of the remaining portion of the secure device support software onto the local computer; and installing the remaining portion of the secure device support software onto the local computer. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification