System and method for implementing a secure USB application device
First Claim
1. A system for implementing a secure token, the system comprising:
- a secure token including;
a first processor;
a first memory coupled to said first processor;
a first communication port coupled to said first processor;
a secure element coupled to said first processor for implementing a secure environment;
one or more applications stored on said first memory adapted to run on said first memory and said first processor; and
a host device including;
a second processor;
a second memory coupled to said second processor;
a second communication port coupled to said second processor and said first communication port;
an agent displayed on said host device;
wherein the agent launches one or more of said applications stored in the first memory on the secure token, and wherein the agent prevents said host device from accessing said first memory.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for implementing a secure USB token are described. In one aspect, the system for implementing a secure USB token, the system comprising: (1) a secure USB token including: a processor; a memory coupled to said processor; a communication port coupled to said processor, a secure element coupled to said processor, said secure element storing data for implementing a secure environment; one or more applications stored on said memory adapted to run on said memory and processor; and (2) a host device including: a processor; a memory coupled to said processor; a communication port coupled to said processor; and an agent displayed on the host device; wherein the agent launches one or more of the applications stored on the USB token, and wherein the agent prevents the host device from accessing the USB token'"'"'s memory.
8 Citations
41 Claims
-
1. A system for implementing a secure token, the system comprising:
-
a secure token including; a first processor; a first memory coupled to said first processor; a first communication port coupled to said first processor; a secure element coupled to said first processor for implementing a secure environment; one or more applications stored on said first memory adapted to run on said first memory and said first processor; and a host device including; a second processor; a second memory coupled to said second processor; a second communication port coupled to said second processor and said first communication port; an agent displayed on said host device; wherein the agent launches one or more of said applications stored in the first memory on the secure token, and wherein the agent prevents said host device from accessing said first memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A secure token for communicating with a host device, the secure token comprising:
-
a processor; a memory coupled to said processor; a communication port coupled to said processor and said host; a secure element coupled to said processor for implementing a secure environment; and one or more applications stored on said memory adapted to run on said memory and processor; wherein an agent launches one or more of said applications stored on the token, and wherein the agent prevents said host device from accessing the token memory. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A host device for implementing a secure token having applications stored in a memory, the system comprising a host device that includes:
-
a processor; a memory coupled to said processor; a communication port coupled to said processor and said token; and an agent displayed on said host device; wherein the agent launches one or more of said applications stored in the token memory, and wherein the agent prevents said host device from accessing the token memory. - View Dependent Claims (24, 25, 26, 27)
-
-
28. A method for implementing a secure token in communication with a host device, the method comprising:
-
storing one or more applications on the token'"'"'s memory; communicating instructions for displaying one or more agents on a host device; receiving, from said host device, instructions for launching one or more applications on said token; and receiving instructions preventing said host device from accessing said token memory. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A system for implementing a secure token, the system comprising:
-
a secure token including; means for running one or more applications; means for communicating with a host device; means for implementing a secure environment; and a host device including; means for running applications; means for communicating with a secure token; means for displaying an agent that can launch one or more of the applications stored on the token; and means for preventing the host device from accessing the token'"'"'s memory.
-
Specification