Remote access terminal security
First Claim
1. A method of remote terminal access comprising the steps of:
- (a) transferring an encrypted decryption key from a central computer to a physically secure coprocessor,(b) coupling said physically secure coprocessor to said remote terminal,(c) transferring an encrypted file from said coprocessor to said central computer to enable the central computer to identify the coprocessor which generated the encrypted file, and(d) examining said encrypted file at said central computer to verify that a specific coprocessor has created said encrypted file before authorizing access to said central computer by said remote terminal.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention provides a method of securing remote terminal access to a central computer. The method uses the services of a physically secure coprocessor which is, or will be, coupled to the remote terminal for the purposes of effecting remote access to the central computer. The method comprises transferring an encrypted decryption key from the central computer to the physically secure coprocessor. The coupling between the coprocessor and remote terminal allows a file to be encrypted which can confirm that the remote terminal (which is the source of the encrypted file) has or had access to the specific coprocessor to which the encrypted decryption key had previously been transferred. Thereafter the encrypted file is transferred to the central computer and is examined there to confirm that the source of the file has access to the specific coprocessor which received the encrypted decryption key. Access is allowed, by the remote terminal, to the central computer after confirmation is produced by the examination at the central computer.
246 Citations
14 Claims
-
1. A method of remote terminal access comprising the steps of:
-
(a) transferring an encrypted decryption key from a central computer to a physically secure coprocessor, (b) coupling said physically secure coprocessor to said remote terminal, (c) transferring an encrypted file from said coprocessor to said central computer to enable the central computer to identify the coprocessor which generated the encrypted file, and (d) examining said encrypted file at said central computer to verify that a specific coprocessor has created said encrypted file before authorizing access to said central computer by said remote terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification