Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks
First Claim
1. A method for accessing restricted information by a user, said method comprising the steps of:
- coupling a portable storage device to a communication port of a client computer, wherein said communication port of said client computer is a USB port and said portable storage device comprises a USB plug, said client computer communicatively coupled to a content server over a network, said content server storing restricted information, said portable storage device having a biometric detector disposed thereon and being capable of verifying user identity against a stored biometric template of an authorized user;
capturing biometric information of a requester using said biometric detector;
provided said portable data storage device authenticates said requester'"'"'s identity, transmitting a first notification from said portable storage device to said content server over the network;
receiving a device authentication request from said content server over the network and in response thereto transmitting a device authentication reply from said portable storage device to said content server over the network, said device authentication reply for completing an authentication handshake between said content server and said portable storage device;
receiving a key request from said content server over the network and in response thereto transmitting a first key representative of said requester from said portable storage device to said content server over the network, said first key for allowing said content server to confirm said requester'"'"'s identity, wherein said first key is hashed before transmission to said content server over the network;
receiving said restricted information from said content server over the network;
encrypting said restricted information using a second key representative of said requester'"'"'s identity; and
storing said restricted information into said portable storage device in encrypted form, wherein said stored encrypted information cannot be decrypted without using said second key.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and method of modular manufacturing process for a transmitter, receiver and/or transceiver is disclosed. The modular process assembles an array of optoelectronic devices to an array header to form an optoelectronic array package. Once the optoelectronic array package is assembled, it is tested and verified the functionality and alignment between the optoelectronic devices and optical fibers. The optoelectronic array package is subsequently coupled to an optical lens array to form an array optical subassembly. After the array optical subassembly is tested, it is coupled to an optical fiber connector to form an optical module. The optical module is then tested to verify its functionality and alignment.
228 Citations
13 Claims
-
1. A method for accessing restricted information by a user, said method comprising the steps of:
-
coupling a portable storage device to a communication port of a client computer, wherein said communication port of said client computer is a USB port and said portable storage device comprises a USB plug, said client computer communicatively coupled to a content server over a network, said content server storing restricted information, said portable storage device having a biometric detector disposed thereon and being capable of verifying user identity against a stored biometric template of an authorized user; capturing biometric information of a requester using said biometric detector; provided said portable data storage device authenticates said requester'"'"'s identity, transmitting a first notification from said portable storage device to said content server over the network; receiving a device authentication request from said content server over the network and in response thereto transmitting a device authentication reply from said portable storage device to said content server over the network, said device authentication reply for completing an authentication handshake between said content server and said portable storage device; receiving a key request from said content server over the network and in response thereto transmitting a first key representative of said requester from said portable storage device to said content server over the network, said first key for allowing said content server to confirm said requester'"'"'s identity, wherein said first key is hashed before transmission to said content server over the network; receiving said restricted information from said content server over the network; encrypting said restricted information using a second key representative of said requester'"'"'s identity; and storing said restricted information into said portable storage device in encrypted form, wherein said stored encrypted information cannot be decrypted without using said second key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification