×

Method and system for communication between a USB device and a USB host

  • US 8,560,852 B2
  • Filed: 02/01/2008
  • Issued: 10/15/2013
  • Est. Priority Date: 02/05/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method for providing efficient communication between a computer and a plug-and-play secure token connected to the computer, comprising:

  • upon establishing a physical connection between the computer and the plug-and-play secure token, enumerating the secure token as a device of a first type and as a device of a second type;

    launching on the computer a host agent stored on the secure token;

    operating the computer according to instructions of a driver for devices of the first type to receive messages communicated in a first protocol associated with devices of the first type from the secure token;

    operating the computer according to instructions of a driver of devices of the second type to receive messages communicated in a second protocol associated with devices of the second type from the secure token;

    operating the computer according to instructions stored in the host agent to;

    receive messages of a first type from the secure token communicated in the first protocol associated with messages of the first type via the driver for devices of the first type;

    receive messages of a second type from the secure token communicated in the second protocol associated with messages of the second type via the driver for devices of the second type; and

    in response to detecting a message of the first type indicative of an availability of a data in a data buffer, retrieving the available data from the data buffer by sending a message of the second type to the secure token;

    operating the secure token according to instructions of a card-agent program including instructions to;

    write data to a second data buffer of the secure token;

    upon having written data to the second data buffer, sending a message of the first type indicative of the availability of data in the second data buffer;

    upon receiving a message of the second type requesting access to the data buffer, transmitting the contents of the second data buffer using the protocol associated with messages of the second type; and

    operating the computer according to instructions stored in the host agent to;

    transmit messages from the computer to the secure token by writing data to a second data buffer of the secure token using the protocol associated with messages of the second type; and

    embed in the messages from the computer to the secure token messages of an application layer protocol having at least one security level wherein messages embed therein security credentials permitting the computer to perform restricted actions on the secure token.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×