NETWORKED COMPUTER IDENTITY ENCRYPTION AND VERIFICATION
First Claim
1. A method for communication, comprising:
- initiating a communication session over a network between a remote computer and a local computer, which has a central processing unit (CPU) and an input device;
storing a record at the remote computer of an identification code that is associated with the input device of the local computer and is inaccessible to the CPU;
receiving data input by a user to the local computer via the input device;
generating at the local computer a cryptographic signature over the data and the identification code using a processor other than the CPU;
transmitting the signature to the remote computer; and
decrypting the signature at the remote computer in order to authenticate the data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for communication includes initiating a communication session over a network between a remote computer (24) and a local computer (20), which has a central processing unit (CPU) (40) and an input device (30). A record is stored at the remote computer of an identification code that is associated with the input device of the local computer and is inaccessible to the CPU. When data input by a user to the local computer is received via the input device, a cryptographic signature over the data and the identification code is generated at the local computer using a processor (46) other than the CPU. The signature is transmitted to the remote computer and is decrypted at the remote computer in order to authenticate the data.
-
Citations
22 Claims
-
1. A method for communication, comprising:
-
initiating a communication session over a network between a remote computer and a local computer, which has a central processing unit (CPU) and an input device; storing a record at the remote computer of an identification code that is associated with the input device of the local computer and is inaccessible to the CPU; receiving data input by a user to the local computer via the input device; generating at the local computer a cryptographic signature over the data and the identification code using a processor other than the CPU; transmitting the signature to the remote computer; and decrypting the signature at the remote computer in order to authenticate the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. Apparatus for use in a communication session over a network between a remote computer and a local computer, which has a central processing unit (CPU), the apparatus comprising:
-
an input device comprising an input transducer, for receiving data input by a user to the local computer; and a processor, which is coupled to the input transducer and is configured to generate, using an identification code that is recorded by the remote computer and is inaccessible to the CPU, a cryptographic signature over the data and the identification code for transmission of the signature to the remote computer, wherein the signature is decryptable by the remote computer in order to authenticate the data. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification