×

Authentication for secure devices with limited cryptography

  • US 6,161,180 A
  • Filed: 08/29/1997
  • Issued: 12/12/2000
  • Est. Priority Date: 08/29/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for authenticating a secure device of the type that are built with full cryptography and are subject to various failures that leave them with only limited cryptography, the method comprising:

  • a. while the secure device is in a secure state in a secure environment, an installation authority initializing the device by installing a secret value in the device;

    b. transporting the device from the secure environment to an insecure environment, wherein an outside event alters the state of the device and changes the device from having full cryptography to only limited cryptography;

    c. transporting the device from the insecure environment to a secure environment, and then an authenticating authority reinitializing the device by using the secret value.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×