Method of generating access keys
First Claim
1. A machine-implemented method comprising:
- after a registration session is complete, performing a process that includes at least storing an access key in long term memory in a secure area of a portable device;
at the portable device, receiving a passcode from a host system, the passcode generated by a method of generating passcodes;
at the portable device, verifying the passcode was generated by the method of generating passcodes;
the portable device supplying the access key to the host system to perform a task, the host being separate from the secure area; and
erasing the access key from the host system after the supplying;
wherein the process is repeated every session.
1 Assignment
0 Petitions
Accused Products
Abstract
In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured system. In an embodiment, the access keys are sent to the unsecured system after receiving the passcode from the unsecured system. In an embodiment, after authenticating the passcode, the secure module does not store the passcode in its memory. In an embodiment, the unsecured module requires the access key to execute a set of instructions or another entity. In an embodiment, the unsecured system does not store access keys. In an embodiment, the unsecured system erases the access key once the unsecured system no longer requires the access key. In an embodiment, the unsecured system receives a new passcode to replace the stored passcode after using the stored passcode. Each of these embodiments may be used separately.
-
Citations
26 Claims
-
1. A machine-implemented method comprising:
-
after a registration session is complete, performing a process that includes at least storing an access key in long term memory in a secure area of a portable device; at the portable device, receiving a passcode from a host system, the passcode generated by a method of generating passcodes; at the portable device, verifying the passcode was generated by the method of generating passcodes; the portable device supplying the access key to the host system to perform a task, the host being separate from the secure area; and erasing the access key from the host system after the supplying; wherein the process is repeated every session. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
2. A machine-implemented method comprising:
-
after a registration session is complete, performing a process that includes at least storing an access key in long term memory in a secure area of a portable device; at the portable device, receiving a passcode from a host system, the passcode generated by a method of generating passcodes; at the portable device, verifying the passcode was generated by the method of generating passcodes; the portable device supplying the access key to the host system to perform a task; and erasing the access key from the host after the supplying; wherein the portable device does not have an operating system; and wherein the process is repeated every session.
-
-
13. A machine-implemented method comprising:
after a registration session is complete, performing a process that includes at least at a portable module, receiving a passcode from a host system, the passcode generated by a method of generating passcodes; at the portable module, verifying the passcode was generated by the method of generating passcodes; and and if the passcode matches the method for generating passcodes, sending an access key from the portable module to the host system; wherein the process is repeated every session.
-
14. A machine-implemented method comprising:
-
after a registration session is complete, performing a process that includes at least at a module, receiving a passcode from a system, the passcode generated by a method of generating passcodes; at the module, verifying the passcode was generated by the method of generating passcodes; and and if the passcode matches the method for generating passcodes, sending an access key from the module to the system, further comprising; as part of each session, at the module, if a determination is made that the passcode matches the method for generating passcodes, in response to the determination that the passcode matches, automatically generating a new passcode; and wherein the process is repeated every session. - View Dependent Claims (15, 16)
-
-
17. A machine-implemented method comprising:
after a registration session is complete, performing a process that includes at least acquiring user data at a portable module; at the portable module, comparing the user data to user information stored at the portable module; if the user data and the user information do not match, terminating the method; if the user data and the user information do match, sending a request from the portable module to an unsecured system to perform encryption; at the portable module, in response to the sending of the request, receiving a passcode from the unsecured system, the passcode generated by a method of generating passcodes; at the portable module, verifying the passcode that was received was generated by the method of generating passcodes; and if the passcode matches the method for generating passcodes, sending an encryption key from the portable module to the unsecured system, at the portable module, generating a new passcode, sending the new passcode to the unsecured device, wherein the new passcode is not stored at a module that performed the sending; wherein the process is repeated every session.
-
18. A machine-implemented method comprising:
-
after a registration session is complete, performing a process that includes at least at a portable module, acquiring user data; at the portable module, comparing the user data to stored user information; if the user data and the user information do not match, at the portable module, terminating the method; and if the user data and the user information do match, the portable module requesting an unsecured system to perform encryption, generating a new passcode, receiving a passcode from the unsecured system, the passcode generated by a method of generating passcodes, verifying the passcode that was received was generated by the method of generating passcodes, encrypting the encryption key with the passcode received from the unsecure system, and sending the encrypted encryption key to the unsecured device; wherein the process is repeated every session.
-
Specification