System and methods for maintaining and distributing personal security devices
First Claim
Patent Images
1. A method for securely providing information comprising the steps of:
- (a) at a storage server, receiving from a client information identifying a personal security device;
(b) in response to receiving said information identifying said personal security device, sending from the storage server to the client said personal security device;
(c) at an authentication server, receiving authentication information from the client; and
(d) responsive to said authentication information, sending from a key server to the client decryption information for decrypting said personal security device.
13 Assignments
0 Petitions
Accused Products
Abstract
This invention relates to methods and apparatus for securely accessing and providing information including the use of a personal security device on a client where the client is subject to compromise.
-
Citations
47 Claims
-
1. A method for securely providing information comprising the steps of:
-
(a) at a storage server, receiving from a client information identifying a personal security device; (b) in response to receiving said information identifying said personal security device, sending from the storage server to the client said personal security device; (c) at an authentication server, receiving authentication information from the client; and (d) responsive to said authentication information, sending from a key server to the client decryption information for decrypting said personal security device. - View Dependent Claims (2, 3)
-
-
4. A method for enabling a client to access secure information contained in a personal security device, said method comprising:
-
at a storage server, receiving from the client a request identifying the personal security device containing secure information; in response to receiving said request, sending the personal security device from the storage server to the client; at an authentication server, receiving from the client a key query that includes authentication information; at the authentication server, authenticating the client based on the received authentication information; and as a consequence of authenticating the client, sending a key from a key server to the client, said key for decrypting the personal security device to access the secure information. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method implemented by a client for accessing secure information, said method comprising:
-
receiving a personal security device from a third party, said personal security device containing the secure information; sending a key request including authentication information to an authentication server; in response to sending the authentication information to the authentication server, receiving from a key server a key for decrypting the personal security device; and with the received key, decrypting the personal security device to access the secure information. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification