×

System, device, and method for providing secure electronic commerce transactions

  • US 7,404,202 B2
  • Filed: 01/16/2002
  • Issued: 07/22/2008
  • Est. Priority Date: 11/21/2001
  • Status: Expired due to Term
First Claim
Patent Images

1. A system to uniquely identify a security computing device coupled to a computer, the computer coupled to a server over a computer network, the system comprising:

  • the security computing device being separate from the computer and adapted for connection by a user to the computer with an input/output (I/O) connector, the security computing device including a processor and a secure memory, the security computing device storing a serial number associated with the security computing device and a user key associated with the serial number that is unique to the security computing device in the secure memory;

    a server coupled to a user information database, the user information database storing a plurality of registered serial numbers and a plurality of user keys, each user key being associated with one of the plurality of registered serial numbers;

    wherein, when the computer attempts to log onto the server over the computer network, the server;

    requests a serial number from the security computing device, the security computing device under the control of the processor to transmit the serial number from the secure memory;

    verifies whether the serial number received from the security computing device is stored as one of the plurality of registered serial numbers in the user information database;

    if the serial number is stored within the user information database, the server obtains the associated user key and computes a challenge and computes an expected response based on the associated user key, the server sends the challenge to the security computing device over the computer network, wherein the security computing device under the control of the processor computes a response based upon a user key stored in the secure memory of the security computing device; and

    if the server receives the response back from the security computing device in response to the challenge that matches the expected response, the server allows the computer to log onto the server and bused upon a request from the computer for an asset, the server to encrypt the asset with an asset key and to encrypt the asset key with the user key of the security computing device and to send the encrypted asset and asset key to the computer.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×