Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks
First Claim
1. A method comprising:
- establishing communication via a Universal Serial Bus (USB) plug of a portable device with a host computer when the USB plug is directly connected to a USB port of the host computer;
performing a user authentication of a user of the portable device, the user authentication being performed by the portable device;
if the user authentication is successful, sending information from the portable device to a content server via the host computer for performance of an authentication handshake between the portable device and the content server;
if the authentication handshake is successful, sending an encrypted first key from the portable device to the content server via the host computer for performance of a second user authentication by the content server; and
if the second user authentication is successful, the portable device receiving restricted content from the content server via the host computer.
0 Assignments
0 Petitions
Accused Products
Abstract
A method comprises performing an authentication of a user of a portable device, performing an authentication handshake between the portable device and a content server, wherein the portable device includes a USB plug that plugs directly into a USB port of a host computer and the host computer is communicatively coupled to the content server, and sending a first key sent from the portable device to the content server, wherein access to restricted content on the content server by the user is enabled if the user authentication, the authentication handshake, and an authentication using the first key are all successful. The process may also include encrypting restricted content received from the content server using a private key before storing the restricted content in a non-volatile memory of the portable device.
-
Citations
34 Claims
-
1. A method comprising:
-
establishing communication via a Universal Serial Bus (USB) plug of a portable device with a host computer when the USB plug is directly connected to a USB port of the host computer; performing a user authentication of a user of the portable device, the user authentication being performed by the portable device; if the user authentication is successful, sending information from the portable device to a content server via the host computer for performance of an authentication handshake between the portable device and the content server; if the authentication handshake is successful, sending an encrypted first key from the portable device to the content server via the host computer for performance of a second user authentication by the content server; and if the second user authentication is successful, the portable device receiving restricted content from the content server via the host computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
establishing communication via a Universal Serial Bus (USB) plug of a portable device with a host computer when the USB plug is directly connected to a USB port of the host computer; performing a user authentication of a user of a portable device, the user authentication being performed by the portable device; if the user authentication is successful, sending information from the portable device to a content server via a host computer for performance of an authentication handshake between the portable device and the content server; if the authentication handshake is successful, sending a hashed first key from the portable device to the content server for performance of a second user authentication by the content server; and if the second user authentication is successful, the portable device receiving restricted content from the content server via the host computer. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method comprising:
-
establishing communication via a Universal Serial Bus (USB) plug of a portable device with a host computer when the USB plug is directly connected to a USB port of the host computer; executing a user authentication process of a user of the portable device; sending a security code from the portable device to a content server via a host computer in response to a request from the content server; sending a hashed first key from the portable device to the content server via the host computer for performance of a user authentication by the content server; and the portable device receiving restricted content from the content server via the host computer if the user authentication by the content server is successful. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A portable device comprising:
-
a processor; a non-volatile memory coupled to the processor; a Universal Serial Bus (USB) plug coupled to a USB controller that is coupled to the processor, the USB plug configured to directly connect the portable device to a USB port of a host computer; a user authentication algorithm configured to authenticate a user of the portable device; the processor configured to perform an authentication handshake with a content server via the host computer if the user authentication algorithm indicates a successful user authentication; and a hashing algorithm configured to hash a public key before the processor sends the public key to the content server via the host computer for performance of a user authentication by the content server; the processor further configured to store in the non-volatile memory content received from the content server via the host computer if the user authentication by the content server is successful. - View Dependent Claims (26, 27, 28, 29)
-
-
30. A portable device comprising:
-
a processor; a non-volatile memory coupled to the processor; a Universal Serial Bus (USB) plug coupled to a USB controller that is coupled to the processor, the USB plug configured to directly connect the portable device to a USB port of a host computer; a user authentication algorithm configured to authenticate a user of the portable device; the processor configured to send a security code to a content server via the host computer if the user authentication algorithm indicates a successful user authentication; and a hashing algorithm configured to hash a public key before the processor sends the public key to the content server via the host computer for performance of a user authentication by the content server, the processor further configured to store in the non-volatile memory content received from the content server via the host computer if the user authentication by the content server is successful. - View Dependent Claims (31, 32, 33, 34)
-
Specification