Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryption algorithm
First Claim
1. A method for enabling or disabling power in a computer system incorporating circuitry for communicating with an external token that includes a cryptographic algorithm and an encryption key, the computer system further incorporating a secure power-on process or other secure operating mode and a power supply providing at least one power supply voltage to computer system components, the method comprising the steps of:
- providing a user password to the computer system;
communicatively coupling the external token to the computer system;
providing the user password to the cryptographic algorithm stored in the token;
encrypting the user password with the cryptographic algorithm and the encryption key to produce a system password;
comparing the system password with a stored value; and
enabling or disabling at least one power supply voltage in response to the result of said step of comparing the system password with a value stored in the computer system.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for permitting access to secured computer resources based upon a two-piece user verification process. In one embodiment of the invention, the user verification process is carried out during a secure power-up procedure. At some point during the secure power-up procedure, the computer user is required to provide an external token or smart card that is coupled to the computer through specialized hardware. The token or smart card is used to store an encryption algorithm furnished with an encryption key that is unique or of limited production. The computer user is then required to enter a plain text user password. Once entered, the user password is encrypted using the encryption algorithm contained in the external token to create a peripheral password. The peripheral password is compared to a value stored in either secure system memory or in memory contained within a secured resource itself. If the two values match, access to the secured resource is permitted. In an alternate embodiment of the invention, the two-piece authentication process is conducted during normal computer operation outside of the secure power-on sequence. In this embodiment of the invention, the user password is entered by means of a secure keyboard communications channel. In either embodiment, the two-piece nature of the authorization process requires the presence of both the user password and the external token in order to generate the peripheral password.
219 Citations
19 Claims
-
1. A method for enabling or disabling power in a computer system incorporating circuitry for communicating with an external token that includes a cryptographic algorithm and an encryption key, the computer system further incorporating a secure power-on process or other secure operating mode and a power supply providing at least one power supply voltage to computer system components, the method comprising the steps of:
-
providing a user password to the computer system; communicatively coupling the external token to the computer system; providing the user password to the cryptographic algorithm stored in the token; encrypting the user password with the cryptographic algorithm and the encryption key to produce a system password; comparing the system password with a stored value; and enabling or disabling at least one power supply voltage in response to the result of said step of comparing the system password with a value stored in the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer system having security capabilities that operate in conjunction with an external token containing a cryptographic algorithm and an encryption key, comprising:
-
a system bus; a processor coupled to said system bus; communication circuitry coupled to said processor for communicating with the external token; a power supply providing at least one power supply voltage to computer system components; security code stored in a processor readable medium such that, upon execution, the processor performs the steps of; receiving a user password; providing the user password to the external token; receiving a system password from the external token, wherein the system password is an encrypted version of the user password; comparing the system password with a stored value; and enabling or disabling at least one power supply voltage from said power supply in response to the result of said step of comparing the system password with a value stored in the computer system. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
Specification