Smartcard formation with authentication keys
First Claim
Patent Images
1. A method comprising:
- detecting a security token device that is un-formatted with respect to an enterprise, wherein the security token device comprises a first cryptographic authentication key and a first answer-to-reset (ATR) code; and
formatting, by a processor, the security token device by;
replacing the first ATR code of the security token device with a second ATR code that is allocated to the enterprise, andreplacing the first cryptographic authentication key of the security token device with a second cryptographic authentication key that is specific to a security requirement of the enterprise.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment generally relates to a method of managing tokens. The method includes detecting a presence of a token at a client and determining a status of the token. The method also includes formatting the token at the client in response to the status of the token being unformatted.
-
Citations
20 Claims
-
1. A method comprising:
-
detecting a security token device that is un-formatted with respect to an enterprise, wherein the security token device comprises a first cryptographic authentication key and a first answer-to-reset (ATR) code; and formatting, by a processor, the security token device by; replacing the first ATR code of the security token device with a second ATR code that is allocated to the enterprise, and replacing the first cryptographic authentication key of the security token device with a second cryptographic authentication key that is specific to a security requirement of the enterprise. - View Dependent Claims (2, 3, 12, 13, 14, 15, 16, 17)
-
-
4. An apparatus comprising:
-
a memory to contain instructions; and a processor, coupled to the memory, to execute the instructions to; detect a security token device that is un-formatted with respect to an enterprise, wherein the security token device comprises a first cryptographic authentication key and a first answer-to-reset (ATR) code; and format the security token device by; replacing the first ATR code of the security token device with a second ATR code that is allocated to the enterprise, and replacing the first cryptographic authentication key of the security token device with a cryptographic authentication key that is specific to a second security requirement of the enterprise. - View Dependent Claims (18)
-
-
5. A non-transitory computer-readable storage medium comprising computer-executable instructions encoded thereon which, when executed by a processor, perform operations comprising:
-
detecting a security token device that is un-formatted with respect to an enterprise, wherein the security token device comprises a first cryptographic authentication key and a first answer-to-reset (ATR) code; and formatting, by the processor, the security token device by; replacing the first ATR code of the security token device with a second ATR code that is allocated to the enterprise, and replacing the first cryptographic authentication key of the security token device with a cryptographic authentication key that is specific to a second security requirement of the enterprise. - View Dependent Claims (19)
-
-
6. A system comprising:
a server, associated with an enterprise, comprising a processor to; manage and maintain security token devices, wherein the server is communicatively coupled to a client; detect a security token device that is un-formatted with respect to the enterprise, wherein the security token device comprises a first cryptographic authentication key and a first answer-to-reset (ATR) code; receive, from the client, a request to format the security token device; and in response to receiving the request from the client, cause the client to; replace the first ATR code of the security token device with a second ATR code that is allocated to the enterprise, and replace the first cryptographic authentication key of the security token device with a cryptographic authentication key that is specific to a second security requirement of the enterprise. - View Dependent Claims (7, 8, 20)
-
9. An apparatus comprising:
-
a processor; an interface adapted to couple with a security token device; and a factory module executable by the processor to communicate with the security token device via the interface, wherein the factory module is to; determine whether the security token device is un-formatted with respect to an enterprise, wherein the security token device comprises a first cryptographic authentication key and a first answer-to-reset (ATR) code, and in response to a determination that the security token device is un-formatted with respect to the enterprise, format the security token device by; replacing the first ATR code of the security token device with a second ATR code that is allocated to the enterprise, and replacing the first cryptographic authentication key of the security token device with a cryptographic authentication key that is specific to a second security requirement of the enterprise. - View Dependent Claims (10, 11)
-
Specification