Secure method for enabling/disabling power to a computer system following two-piece user verification
First Claim
1. A method for enabling or disabling power in a computer system incorporating circuitry for communicating with an external token that includes a cryptographic algorithm and an encryption key, the computer system further incorporating a secure power-on process or other secure operating mode and a power supply providing at least one power supply voltage to computer system components, the method comprising the steps of:
- providing a user password to the computer system;
communicatively coupling the external token to the computer system;
providing the user password to the cryptographic algorithm stored in the token;
encrypting the user password with the cryptographic algorithm and the encryption key to produce a system password;
comparing the system password with a stored value; and
enabling or disabling at least one power supply voltage in response to the result of said step of comparing the system password with a value stored in the computer system.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for enabling power to all or portions of a computer system based upon the results of a two-piece user verification process that is completed as part of a secure power-up procedure. At some point during the secure power-up procedure, the computer user provides an external token or smart card that is coupled to the computer through specialized hardware. The token or smart card is used to store an encryption algorithm furnished with an encryption key that is unique or of limited production. The computer user is then required to enter a plain text user password. Once entered, the user password is encrypted using the encryption algorithm contained in the external token to create a system password. The system password is compared to a value stored in secure memory. If the two values match, the power-on sequence is completed and power to the computer system and/or secured computer resources is enabled. If the two values do not match, power to the entire computer system and/or secured computer resources is disabled. The two-piece nature of the authorization process requires the presence of both the user password and the external token in order to generate the system password.
-
Citations
18 Claims
-
1. A method for enabling or disabling power in a computer system incorporating circuitry for communicating with an external token that includes a cryptographic algorithm and an encryption key, the computer system further incorporating a secure power-on process or other secure operating mode and a power supply providing at least one power supply voltage to computer system components, the method comprising the steps of:
-
providing a user password to the computer system; communicatively coupling the external token to the computer system; providing the user password to the cryptographic algorithm stored in the token; encrypting the user password with the cryptographic algorithm and the encryption key to produce a system password; comparing the system password with a stored value; and enabling or disabling at least one power supply voltage in response to the result of said step of comparing the system password with a value stored in the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer system having security capabilities that operate in conjunction with an external token containing a cryptographic algorithm and an encryption key, comprising:
-
a system bus; a processor coupled to said system bus; communication circuitry coupled to said processor for communicating with the external token; a power supply providing at least one power supply voltage to computer system components; power-on code stored in a processor readable medium such that, upon execution, the processor performs the steps of; receiving a user password; providing the user password to the external token; receiving a system password from the external token, wherein the system password is an encrypted version of the user password; comparing the system password with a stored value; and enabling or disabling at least one power supply voltage from said power supply in response to the result of said step of comparing the system password with a value stored in the computer system. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
Specification