Secure Storing and Offline Transferring of Digitally Transferable Assets
1 Assignment
0 Petitions
Accused Products
Abstract
A handheld electronic device enables securely transferring control of a valuable asset associated with a code. The device includes a processor, non-transitory data storage, and a communication component configured to transmit data external to the device. A case houses the components, and is mechanically tamper evident. Software stores within the data storage at least one code, prevents transmission of any code through the communication component without authorization by the user, invalidates the association of a particular code with respect to a particular asset when the software carries out at least one of (i) authorizing transmission of the particular code, and (ii) authenticating a valid transaction using the particular code and authorizing transmission of the digital signature through the communication component.
-
Citations
59 Claims
-
1. (canceled)
-
2. (canceled)
-
3. (canceled)
-
4. (canceled)
-
5. (canceled)
-
6. (canceled)
-
7. (canceled)
-
8. (canceled)
-
9. (canceled)
-
10. (canceled)
-
11. (canceled)
-
12. (canceled)
-
13. (canceled)
-
14. (canceled)
-
15. (canceled)
-
16. (canceled)
-
17. (canceled)
-
18. (canceled)
-
19. (canceled)
-
20. (canceled)
-
21. (canceled)
-
22. (canceled)
-
23. (canceled)
-
24. (canceled)
-
25. (canceled)
-
26. (canceled)
-
27. (canceled)
-
28. (canceled)
-
29. (canceled)
-
30. (canceled)
-
31. (canceled)
-
32. (canceled)
-
33. (canceled)
-
34. (canceled)
-
35. (canceled)
-
36. (canceled)
-
37. (canceled)
-
38. (canceled)
-
39. (canceled)
-
40. (canceled)
-
41. (canceled)
-
42. (canceled)
-
43. (canceled)
-
44. (canceled)
-
45. A method for constructing a token representing a right, the method comprising the steps of:
-
[1.1] constructing an enclosure adapted, when in a closed condition, to be easily susceptible to visible damage upon any attempted intrusion into the enclosure; and [1.2] enclosing within the enclosure; [1.2.1] a memory adapted to store; [1.2.1.1] a unique key; and [1.2.1.2] an association indicia adapted to be set in selected one of a first state representing an association of the key with the right and a second state representing a disassociation of the key with the right; [1.2.2] a communication facility adapted to receive a selected command and to transmit a response; [1.2.3] an indicator visible from outside the enclosure, adapted to display a selected one of a first state if the association indicia stored in the memory is in the first state, and a second state if the association indicia stored in the memory is in the second state; and [1.2.4] a computing device coupled to the memory, the communication facility and the indicator, the computing device being adapted to perform, in response to the command, the steps of; [1.2.4.1] reading the key from the memory; [1.2.4.2] transmitting the response via the communication facility, the response comprising a function of the key; and [1.2.4.3] setting the association indicia stored in the memory to the second state; [1.2.5] a power facility adapted to supply operating power to the processor, the memory, the communication facility and the indicator; wherein the token guarantees the association of the key with the right if and only if the indicator displays the first state and the enclosure displays no visible damage indicative of an attempted intrusion. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59)
[1.4] recording a first view of the pattern from a selective perspective; [1.5] storing, outside the enclosure, the recording the first view of the pattern; and [1.6] selectively comparing a second view of the pattern to the stored recording of the first view of the pattern to detect differences therebetween indicative of an authenticity of the enclosure.
-
-
47. The method of claim 45 wherein in step [1.2.1] the memory is further characterized as non-transitory.
-
48. The method of claim 45 wherein in step [1.2.2] the communication facility is further characterized as adapted wirelessly to receive the selected command and to transmit the response.
-
49. The method of claim 45 wherein in step [1.2.2] the communication facility is further characterized as adapted electrically to receive the selected command and to transmit the response.
-
50. The method of claim 45 wherein the power facility comprises a selected one of a battery and a radiated energy harvester.
-
51. The method of claim 45 wherein the indicator comprises a selected one of a light emitting facility, a sound emitting facility, and a tactile emitting facility.
-
52. The method of claim 45 wherein the key comprises a selected one of an internally generated code, an externally generated code, and a private key of a selected public-private key pair.
-
53. The method of claim 45 wherein the communication facility is prevented from transmitting a function of the key if the association indicia is in the first state.
-
54. The method of claim 45:
-
wherein the memory is further characterized as adapted to store a selected certificate of association indicative of the association of the key with the right; wherein the communication facility is further characterized as adapted to receive the certificate of association; and wherein the computing device is further characterized as being adapted to perform, in response to the certificate of association, the steps of; [1.2.4.4] storing in the memory the received certificate of association; [1.2.4.5] storing in the memory the association indicia in the first state; and [1.2.4.6] selectively transmitting the stored certificate of association via the communication facility.
-
-
55. The method of claim 45:
-
wherein the communication facility is further characterized as being adapted to receive a challenge and to transmit a proof of possession of the key in the memory; and wherein the computing device is further characterized as being adapted to perform, in response to the challenge, the steps of; [1.2.4.7] calculating the proof of possession as a function of the key and the challenge; and [1.2.4.8] selectively transmitting the calculated proof of possession via the communication facility.
-
-
56. The method of claim 45:
-
wherein step [1.2] is further characterized as enclosing within the enclosure a confirmation input facility adapted to be activated from outside the enclosure; and wherein the computing device is further characterized as being adapted to perform, only in response to an activation of the confirmation input facility, a selected one of steps [1.2.4.1], [1.2.4.2], [1.2.4.3], and, in addition, to perform the further step of; [1.2.4.9] calculating a function of the key.
-
-
57. A token adapted to practice the method of any of claims 45 to 56.
-
58. An electronic system comprising a token according to claim 57.
-
59. A computer readable medium including executable instructions which, when executed in a processing system, causes the processing system to perform according to step [1.2.4] of claim 45.
Specification