×

Method for using a portable computing device as a smart key device

  • US 7,475,247 B2
  • Filed: 12/16/2004
  • Issued: 01/06/2009
  • Est. Priority Date: 12/16/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for performing cryptographic functions, the method comprising:

  • engaging a first removable hardware device with a first system unit;

    engaging a second removable hardware device with a second system unit;

    communicatively coupling the first system unit and the second system unit while the first removable hardware device is engaged with the first system unit and the second removable hardware device is engaged with the second system unit;

    wherein the first system unit includes a first hardware security unit and the second system unit includes a second hardware security unit,wherein the first hardware security unit includes a first private key corresponding to a first asymmetric cryptographic key pair, a first public key corresponding to a second asymmetric cryptographic key pair, a second private key corresponding to a third asymmetric cryptographic key pair; and

    a second public key corresponding to a fourth asymmetric cryptographic key pair; and

    wherein the second hardware security unit contains a third private key corresponding to the second asymmetric cryptographic key pair, a third public key corresponding to the first asymmetric cryptographic key pair, a fourth private key corresponding to the fourth asymmetric cryptographic key pair, and a fourth public key corresponding to the third asymmetric cryptographic key pair;

    executing a mutual authentication operation between the first hardware security unit and the first removable hardware device based upon the first and second asymmetric cryptographic key pairs, which the first system unit and the second system unit are communicatively coupled;

    executing a mutual authentication operation between the second hardware security unit and the second removable hardware device based upon a fifth and sixth asymmetric cryptographic key pairs while first system unit and the second system unit are communicatively coupled;

    executing a mutual authentication operation between the first hardware security unit and the second hardware security based upon the third and fourth asymmetric cryptographic key pairs while the first system unit and the second system unit are communicatively coupled; and

    in response to successfully performing the mutual authentication operation between the first and second hardware security units, enabling the first system unit to invoke cryptographic functions on the first hardware security unit while the first and second system units remain communicatively coupled.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×