Apparatus and method for providing secured communications
First Claim
1. A method for ensuring secured communications between a system employing a hardware agent and a remote system, the method comprising:
- establishing a communication link between the hardware agent and the remote system;
transmitting a message from the remote system to the system;
outputting a unique digital certificate from the system to the remote system;
returning a response to the message, the response encrypted with a private key associated with the hardware agent;
decrypting the digital certificate to obtain a public key associated with the hardware agent;
decrypting the response with the public key associated with the hardware agent; and
maintaining communications if the response is identical to that expected by the remote system.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method to provide reliable electronic distribution of information between a first system and a second system remotely located from the first system coupled together by a communication link. The method comprises storing a public key, a private key, and signed key parameters in a semiconductor device associated with the first system. The signed key parameters are output from the semiconductor device to the second system via the communication link. Then, the first system is authenticated by the second system; and the information is transmitted from the second system to the first system, provided the first system is authenticated.
91 Citations
27 Claims
-
1. A method for ensuring secured communications between a system employing a hardware agent and a remote system, the method comprising:
-
establishing a communication link between the hardware agent and the remote system;
transmitting a message from the remote system to the system;
outputting a unique digital certificate from the system to the remote system;
returning a response to the message, the response encrypted with a private key associated with the hardware agent;
decrypting the digital certificate to obtain a public key associated with the hardware agent;
decrypting the response with the public key associated with the hardware agent; and
maintaining communications if the response is identical to that expected by the remote system. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for ensuring secured communications between a system employing a hardware agent and a remote system, the method comprising:
-
establishing a communication link between the hardware agent and the remote system;
outputting a unique digital certificate from the system to the remote system;
decrypting the digital certificate to obtain a public key associated with the hardware agent;
transmitting a message from the remote system to the system;
returning a response to the message, the response encrypted with a private key associated with the hardware agent;
decrypting the response with the public key associated with the hardware agent; and
maintaining communications if the response is identical to that expected by the remote system. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method to provide reliable electronic distribution of information between a first system and a second system remotely located from the first system coupled together by a communication link, the method comprising:
-
storing a public key, a private key, and signed key parameters in a semiconductor device associated with the first system;
outputting the signed key parameters from the semiconductor device to the second system via the communication link;
authenticating the first system by the second system; and
transmitting the information from the second system to the first system provided the first system is authenticated. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A method comprising:
-
establishing a communication link between a first system employing a hardware agent and a second system remotely located from the first system;
receiving a unique digital certificate from the first system by the second system;
recovering a public key associated with the hardware agent from the unique digital certificate;
outputting a message from the second system to the first system;
receiving a response to the message, the response being encrypted with a private key associated with the hardware agent;
decrypting the response with the public key associated with the hardware agent; and
maintaining communications if the response is identical to that expected by the second system. - View Dependent Claims (23, 24, 25, 26, 27)
-
Specification