Tamper detection and secure power failure recovery circuit
First Claim
Patent Images
1. A security system comprising:
- a token comprising;
non-volatile random access memory (NVRAM) for storing security data for use during a step of secure authentication;
an interface for providing communication between the token and a host system when coupled thereto; and
a processor for performing the steps of;
receiving authentication data via the interface;
authenticating the token for performing security functions in response to correct authentication data;
providing secure information via the interface in response to the correct authentication data;
storing security data relating to the secure information within the NVRAM of the token in response to correct authentication data; and
re-authenticating the token for performing security functions using the security data stored in the NVRAM of the token in response to receipt of the secure information after a reset of the token has occurred.
13 Assignments
0 Petitions
Accused Products
Abstract
A security system including a token and a host system. The token includes volatile random access memory for storing security data for use during a step of secure authentication, an interface for providing communication with a host system when coupled thereto, and a processor. The processor performs the steps of authenticating a host system and the token, providing secure information to the host system upon authentication therewith, and re-authenticating the host system and the token in response to receipt of the secure information after a reset of the token has occurred.
-
Citations
18 Claims
-
1. A security system comprising:
a token comprising; non-volatile random access memory (NVRAM) for storing security data for use during a step of secure authentication; an interface for providing communication between the token and a host system when coupled thereto; and a processor for performing the steps of; receiving authentication data via the interface; authenticating the token for performing security functions in response to correct authentication data; providing secure information via the interface in response to the correct authentication data; storing security data relating to the secure information within the NVRAM of the token in response to correct authentication data; and re-authenticating the token for performing security functions using the security data stored in the NVRAM of the token in response to receipt of the secure information after a reset of the token has occurred. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A method for secure re-authentication of a secure server comprising the steps of:
-
transmitting authentication data from a host system to a token for authentication by the token; receiving key data provided by the token at the host system in response to the transmitted authentication data; storing the key data on the host system in non-volatile memory thereof; storing re-authentication data within the token based on the key data provided to the host system; providing the key data from the host system to the token for secure re-authentication by the token upon a resumption of power following a power failure resulting in a power outage to the token; retrieving the stored re-authentication data within the token; comparing the authentication data received from the host to the retrieved re-authentication data within the token; and re-authenticating the host system to the token when the key data is correct key data associated with the stored re-authentication data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
Specification