Authorization firmware for conducting transactions with an electronic transaction system and methods therefor
First Claim
1. A computer configured to signal approval of an electronic transaction request to an electronic transaction system remote from the computer, comprising:
- a central processing unit;
electronic authorization firmware embedded either on a computer'"'"'s motherboard or on a plug-in board that physically plugs into a computer'"'"'s motherboard such that it is located in the secure confines of the enclosure of the computer and in electronic communication with said central processing unit, said electronic authorization firmware including;
a memory circuit configured to store a user private key, and at least one of user identification data or firmware identification data, and encryption logic circuit coupled to said electronic transaction system, said encryption logic circuit configured to approve a transaction request by encrypting said transaction request using said user private key, said encrypted transaction request signifying the transaction approval to said electronic transaction system.
9 Assignments
0 Petitions
Accused Products
Abstract
A computer configured to authenticate a user to an electronic transaction system is disclosed. The computer includes a central processing unit and electronic authorization firmware disposed within the computer and in electronic communication with the central processing unit. The electronic authorization firmware includes a non-volatile memory circuit configured to store at least one of a user private key and user identification data and a firmware identification data. The electronic authorization firmware further includes decryption logic circuitry disposed between the non-volatile memory circuit and the electronic transaction system. The decryption logic circuitry is configured to prevent unauthorized access to at least one of the user private key and the user identification data in the non-volatile memory circuit. The electronic authorization firmware also includes encryption logic circuit coupled to the electronic transaction system and configured to transmit digital data encrypted using the user private key for transmission to the electronic transaction system. The digital data authenticates the user to the electronic transaction system, wherein the non-volatile memory is inaccessible by the central processing unit without traversing the decryption logic circuitry.
-
Citations
25 Claims
-
1. A computer configured to signal approval of an electronic transaction request to an electronic transaction system remote from the computer, comprising:
-
a central processing unit;
electronic authorization firmware embedded either on a computer'"'"'s motherboard or on a plug-in board that physically plugs into a computer'"'"'s motherboard such that it is located in the secure confines of the enclosure of the computer and in electronic communication with said central processing unit, said electronic authorization firmware including;
a memory circuit configured to store a user private key, and at least one of user identification data or firmware identification data, and encryption logic circuit coupled to said electronic transaction system, said encryption logic circuit configured to approve a transaction request by encrypting said transaction request using said user private key, said encrypted transaction request signifying the transaction approval to said electronic transaction system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
receiving at said electronic authorization firmware a first signal requesting configuration;
generating, using a key generation logic within said electronic authorization firmware, a user private key and a user public key;
storing said user private key at a non-volatile memory circuit within said electronic authorization firmware; and
outputting said user public key, thereby permitting said electronic transaction system to decrypt digital data previously encrypted with said user private key by said electronic authorization firmware.
-
-
11. The method of claim 10 wherein said user private key exists only in said non-volatile memory circuit of said electronic authorization firmware, said user private key is not transmitted from said electronic authorization firmware during said configuring or subsequent authenticating.
-
12. The method of claim 10 further comprising erasing said user private key if said electronic authorization firmware is tampered with.
-
13. The method of claim 10 further comprising erasing said user identification data if said electronic authorization firmware is tampered with.
-
14. The method of claim 10 wherein said electronic authorization firmware is embedded on a motherboard of a computer.
-
15. The method of claim 10 wherein said electronic authorization firmware is embedded on a plug-in board that is designed to plug into a motherboard of a computer.
-
16. The method of claim 10 wherein said electronic authorization firmware is embedded on a Chipset of a computer.
-
17. The computer of claim 1 wherein decryption logic circuitry is disposed between said memory circuit and said electronic transaction system, said decryption logic circuitry being configured to prevent unauthorized access to said at least one of said user private key and said user identification data in said memory circuit;
-
wherein said encryption logic circuit is configured to transmit digital data encrypted using said user private key for transmission to said electronic transaction system, said digital data authenticating said user to said electronic transaction system, and wherein said memory circuit is inaccessible by said central processing unit without traversing said decryption logic circuitry.
-
-
18. The computer of claim 17 wherein said memory circuit can be accessed only through said decryption logic circuitry.
-
19. The computer of claim 17 wherein said memory circuit is inaccessible from said central processing unit without traversing said decryption logic circuitry.
-
20. The computer of claim 1 wherein the memory is non-volatile.
-
21. The computer of claim 1 wherein the memory stores at least one of the user private key, user identification data and firmware identification data.
-
22. An electronic authorization firmware configured to be embedded in a computer, said electronic authorization firmware being configured to authenticate a user of said computer to an electronic transaction system, comprising:
-
a non-volatile memory circuit, embedded either on a computer'"'"'s motherboard or on a plug-in board that physically plugs into a computer'"'"'s motherboard such that it is located in the secure confines of the enclosure of the computer, configured to store at least one of a user private key and user identification data and firmware identification data;
decryption logic circuitry, embedded either on a computer'"'"'s motherboard or on a plug-in board that physically plugs into a computer'"'"'s motherboard such that it is located in the secure confines of the enclosure of the computer, disposed between said non-volatile memory circuit and said electronic transaction system, said decryption logic circuitry being configured to prevent unauthorized access to said at least one of said user private key and aid user identification data and firmware identification data in said non-volatile memory circuit, and encryption logic circuit, embedded either on a computer'"'"'s motherboard or on a plug-in board that physically plugs into a computer'"'"'s motherboard such that it is located in the secure confines of the enclosure of the computer, coupled to said electronic transaction system, said encryption logic circuit configured to transmit digital data encrypted using said user private key for transmission to said electronic transaction system, said digital data authenticating said user to said electronic transaction system. - View Dependent Claims (23, 24, 25)
-
Specification