Token for securing communication
First Claim
Patent Images
1. A method for performing a command on a token, comprising:
- receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender;
making a first determination that the sender is allowed to send commands to the token;
based on the first determination;
generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), wherein the ACAS is obtained from a portion of a message digest, wherein the message digest is generated using a challenge, and an administrator secret, and an n-bit generator, and wherein the administrator secret is distinct from the ACAS;
making a second determination that the first CAMD and the second CAMD match; and
based on the second determination, performing the command by the token, wherein performing the command by the token comprises;
obtaining an input for the command from the scrambled data using the ACAS.
2 Assignments
0 Petitions
Accused Products
Abstract
In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender, and making a first determination that the sender is allowed to send commands to the token. The method further includes, based on the first determination, generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), making a second determination that the first CAMD and the second CAMD match, and based on the second determination, performing the command by the token.
58 Citations
35 Claims
-
1. A method for performing a command on a token, comprising:
-
receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender; making a first determination that the sender is allowed to send commands to the token; based on the first determination; generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), wherein the ACAS is obtained from a portion of a message digest, wherein the message digest is generated using a challenge, and an administrator secret, and an n-bit generator, and wherein the administrator secret is distinct from the ACAS; making a second determination that the first CAMD and the second CAMD match; and based on the second determination, performing the command by the token, wherein performing the command by the token comprises;
obtaining an input for the command from the scrambled data using the ACAS. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A token, comprising:
-
a processor; and a non-transitory computer readable medium comprising computer readable program code embodied therein which, when executed by the processor, performs a method, the method comprising; receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender; making a first determination that the sender is allowed to send commands to the token; based on the first determination; generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), wherein the ACAS is obtained from a portion of a message digest, wherein the message digest is generated using a challenge, and an administrator secret, and an n-bit generator, and wherein the administrator secret is distinct from the ACAS; making a second determination that the first CAMD and the second CAMD match; and based on the second determination, performing the command by the token, wherein performing the command by the token comprises;
obtaining an input for the command from the scrambled data using the ACAS. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A token, comprising:
-
integrated circuits configured to perform a method, the method comprising; receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender; making a first determination that the sender is allowed to send commands to the token; based on the first determination; generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), wherein the ACAS is obtained from a portion of a message digest, wherein the message digest is generated using a challenge, and an administrator secret, and an n-bit generator, and wherein the administrator secret is distinct from the ACAS; making a second determination that the first CAMD and the second CAMD match; and based on the second determination, performing the command by the token, wherein performing the command by the token comprises;
obtaining an input for the command from the scrambled data using the ACAS. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. A non-transitory computer readable medium comprising computer readable program code embodied therein for causing a token to perform a method, the method comprising:
-
receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender; making a first determination that the sender is allowed to send commands to the token; based on the first determination; generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), wherein the ACAS is obtained from a portion of a message digest, wherein the message digest is generated using a challenge, and an administrator secret, and an n-bit generator, and wherein the administrator secret is distinct from the ACAS; making a second determination that the first CAMD and the second CAMD match; and based on the second determination, performing the command by the token, wherein performing the command by the token comprises;
obtaining an input for the command from the scrambled data using the ACAS. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
Specification