Method and apparatus for operating a computer in a secure mode
First Claim
1. A method for providing a secure computing environment, comprising:
- providing a portable encryption control device;
attaching the portable encryption control device to a computing device;
triggering a bus reset on the computer in response to attaching the portable encryption control device;
enabling a user to control and customize the portable encryption control device features through a system tray utility program;
authenticating the user as a valid owner of a smart card;
initializing the encryption control device through a challenge/response protocol with the smart card if the valid owner is authenticated;
activating an encryption/decryption engine of the encryption control device to enable access to data in a secure computing environment if the challenge response protocol is executed successfully;
enabling the user to add a secondary user to the smart card; and
setting the secondary user'"'"'s level of access to the portable encryption control device.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for activating an encryption control device that is in communication with a computer for providing a secure computing environment for a user is provided. The method initiates with providing a card for insertion into a card reader of the encryption control device. The card is configured to receive and pass data. Next, a biometric identifier is received from the user. The biometric identifier enables validation of the user as the authorized owner of the card. Then, a challenge/response protocol between the encryption control and the inserted card is run. The challenge/response protocol establishes that the card and the encryption control device are compatible. Next, an encryption engine of the encryption control device is activated to create a secure computing environment if the user is validated as the authorized owner of the card and the challenge/response protocol is successfully executed.
70 Citations
19 Claims
-
1. A method for providing a secure computing environment, comprising:
-
providing a portable encryption control device; attaching the portable encryption control device to a computing device; triggering a bus reset on the computer in response to attaching the portable encryption control device; enabling a user to control and customize the portable encryption control device features through a system tray utility program; authenticating the user as a valid owner of a smart card; initializing the encryption control device through a challenge/response protocol with the smart card if the valid owner is authenticated; activating an encryption/decryption engine of the encryption control device to enable access to data in a secure computing environment if the challenge response protocol is executed successfully; enabling the user to add a secondary user to the smart card; and setting the secondary user'"'"'s level of access to the portable encryption control device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12)
-
-
11. A method for activating an encryption control device that is in communication with a computer for providing a secure computing environment for a user, comprising:
-
providing a card for insertion into a card reader of the portable encryption control device, the card being configured to receive and pass data; attaching the portable encryption device to the computer; triggering a bus reset on the computer in response to attaching the portable encryption control device; enabling a user to control and customize the portable encryption control device features through a system tray utility program, the enabling including, tracking unauthorized attempts made to access the portable encryption control device, and allowing for remote shutdown of the portable encryption control device; receiving a biometric identifier from the user, the biometric identifier enabling validation of the user as the authorized owner of the card; running a challenge/response protocol between the encryption control device and the inserted card, the challenge/response protocol establishing that the inserted card and the encryption control device are compatible; and activating an encryption/decryption engine of the encryption control device to create a secure computing environment if the user is validated as the authorized owner of the card and challenge response protocol is successfully executed; enabling the user to add a secondary user to the smart card; and setting the secondary user'"'"'s level of access to the portable encryption control device. - View Dependent Claims (13, 14)
-
-
15. A method for operating a computer in a secure mode, comprising:
-
attaching a portable encryption control device (ECD) to the computer; triggering a bus reset on the computer in response to attaching the portable encryption control device; enabling a user to control and customize the portable encryption control device features through a system tray utility program; authenticating the user as a valid owner of the smart card, the authenticating further including, receiving a biometric identifier from the user, and comparing the received biometric indicator with the stored biometric indicator for a match; activating an encryption/decryption engine of the encryption control device to create a secure operating mode if the user is authenticated; enabling the user to add a secondary user to the smart card upon authentication; and setting the secondary user'"'"'s level of access to the portable encryption control device. - View Dependent Claims (16, 17, 18, 19)
-
Specification