System, device, and method for providing secure electronic commerce transactions
First Claim
1. A system to uniquely identify a security computing device coupled to a computer, the computer coupled to a server over a computer network, the system comprising:
- the security computing device being separate from the computer and adapted for connection by a user to the computer with an input/output (I/O) connector, the security computing device including a processor and a secure memory, the security computing device storing a serial number associated with the security computing device and a user key associated with the serial number that is unique to the security computing device in the secure memory;
a server coupled to a user information database, the user information database storing a plurality of registered serial numbers and a plurality of user keys, each user key being associated with one of the plurality of registered serial numbers;
wherein, when the computer attempts to log onto the server over the computer network, the server;
requests a serial number from the security computing device, the security computing device under the control of the processor to transmit the serial number from the secure memory;
verifies whether the serial number received from the security computing device is stored as one of the plurality of registered serial numbers in the user information database;
if the serial number is stored within the user information database, the server obtains the associated user key and computes a challenge and computes an expected response based on the associated user key, the server sends the challenge to the security computing device over the computer network, wherein the security computing device under the control of the processor computes a response based upon a user key stored in the secure memory of the security computing device; and
if the server receives the response back from the security computing device in response to the challenge that matches the expected response, the server allows the computer to log onto the server and bused upon a request from the computer for an asset, the server to encrypt the asset with an asset key and to encrypt the asset key with the user key of the security computing device and to send the encrypted asset and asset key to the computer.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a security device coupled to a computing device, which is, in turn, coupled to a server through a computer network. The security device stores a serial number associated with the security device and a user key associated with the serial number. When the computing device attempts to log onto the server over the computer network, the server requests a serial number from the security device. If the serial number is stored within a user information database, the server obtains an associated user key and computes a challenge. Further, the server computes an expected response for the security device based on the associated user key. The server then sends the challenge to the security device over the computer network. If the server receives a response back from the security device that matches the expected response, the server will allow the computing device to log onto the server.
82 Citations
14 Claims
-
1. A system to uniquely identify a security computing device coupled to a computer, the computer coupled to a server over a computer network, the system comprising:
-
the security computing device being separate from the computer and adapted for connection by a user to the computer with an input/output (I/O) connector, the security computing device including a processor and a secure memory, the security computing device storing a serial number associated with the security computing device and a user key associated with the serial number that is unique to the security computing device in the secure memory; a server coupled to a user information database, the user information database storing a plurality of registered serial numbers and a plurality of user keys, each user key being associated with one of the plurality of registered serial numbers; wherein, when the computer attempts to log onto the server over the computer network, the server; requests a serial number from the security computing device, the security computing device under the control of the processor to transmit the serial number from the secure memory; verifies whether the serial number received from the security computing device is stored as one of the plurality of registered serial numbers in the user information database; if the serial number is stored within the user information database, the server obtains the associated user key and computes a challenge and computes an expected response based on the associated user key, the server sends the challenge to the security computing device over the computer network, wherein the security computing device under the control of the processor computes a response based upon a user key stored in the secure memory of the security computing device; and if the server receives the response back from the security computing device in response to the challenge that matches the expected response, the server allows the computer to log onto the server and bused upon a request from the computer for an asset, the server to encrypt the asset with an asset key and to encrypt the asset key with the user key of the security computing device and to send the encrypted asset and asset key to the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method to uniquely identify a security computing device, the security computing device coupled to a computer, the computer coupled to a server over a computer network, the method comprising:
-
storing a serial number associated with the security computing device and a user key associated with the serial number that is unique to the security computing device in a secure memory of the security computing device; storing a plurality of registered serial numbers and a plurality of user keys at the server, each user key being associated with one of the plurality of registered serial numbers; requesting a serial number from the security computing device when the computer attempts to log onto the server over the computer network, the security computing device being separate from the computer and being adapted for connection by a user to the computer with an input/output (I/O) connector, the security computing device operating under the control of a processor to transmit the serial number from the secure memory; verifying whether the serial number received from the security computing device is stored as one of the plurality of registered serial numbers at the server; if the serial number is stored at the server, obtaining the associated user key from the server; computing a challenge; computing an expected response based on the associated user key; sending the challenge to the security computing device over the computer network, wherein the security computing device under the control of the processor computes a response based upon a user key stored in the secure memory of the security computing device; and if the server receives a response back from the security computing device in response to the challenge that matches the expected response, allowing the computer to log onto the server and based upon a request from the computer for an asset, the server to encrypt the asset with an asset key and to encrypt the asset key with the user key of the security computing device and to send the encrypted asset and asset key to the computer. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification