System, Device and Method for Secure Handling of Key Credential Information Within Network Servers
First Claim
1. A method for secure handling by a server of credential information for performing a transaction wherein the credential information is received through a network interface of the server from a remote client over a communications network, the method comprising:
- a) before passage of the received credential information to the processor of the server, detecting the received credential information;
b) after detecting the received credential information, preventing any passage of the credential information to the processor of the server;
c) comparing the credential information to previously stored credentials information of a credentials memory and determining an authorization outcome from the comparing; and
,d) supplying to the processor of the server the authorization outcome.
0 Assignments
0 Petitions
Accused Products
Abstract
A method comprising, providing a server accessing a network through a network interface card, the network interface card receiving a message from a remote client, the message comprising credentials for performing a request, in response to the network interface card receiving the message, the network interface card preventing the credentials from being provided to the server and checking the credentials against those previously stored in a directly attached memory; and the network interface card indicating to the server the outcome of attempting to perform the request, wherein the credentials remain inaccessible to the server during the method.
13 Citations
14 Claims
-
1. A method for secure handling by a server of credential information for performing a transaction wherein the credential information is received through a network interface of the server from a remote client over a communications network, the method comprising:
-
a) before passage of the received credential information to the processor of the server, detecting the received credential information; b) after detecting the received credential information, preventing any passage of the credential information to the processor of the server; c) comparing the credential information to previously stored credentials information of a credentials memory and determining an authorization outcome from the comparing; and
,d) supplying to the processor of the server the authorization outcome. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for use with a server for secure handling of credential information for performing a transaction wherein the credential information is received through a network interface of the server from a remote client over a communications network, the system comprising:
-
(a) secure handling circuitry connected to the network interface and configured for;
I) communicating with a credentials memory;
II) before passage of the received credential information to the processor of the server, detecting the received credential information;
III) after detecting the received credential information, preventing any passage of the credential information to a processor of the server;
IV) comparing the credential information to previously stored credentials information of a credentials memory;
V) determining an authorization outcome from the comparing; and
, VI) supplying to the processor of the server the authorization outcome; and
,(b) credentials memory connected to the secure handling circuitry and comprising the previously stored credentials information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification