Smartcard formation with authentication
First Claim
Patent Images
1. A method comprising:
- detecting a security token device that is un-formatted with respect to a security requirement pertaining to accessing an enterprise system, wherein the security token device comprises a first cryptographic authentication key; and
formatting, by a processor, the security token device, wherein formatting the security token device comprises;
determining format information for the security token device, wherein the format information comprises an access list associated with the enterprise system;
replacing the first cryptographic authentication key of the security token device with a second cryptographic authentication key that is associated with the security requirement pertaining to accessing the enterprise system; and
storing, on the security token device, the format information for the security token device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes detecting a security token device that is un-formatted with respect to an enterprise, wherein the security token device comprises a first cryptographic authentication key, and formatting, by a processor, the security token device by replacing the first cryptographic authentication key of the security token device with a second cryptographic authentication key that is specific to a security requirement of the enterprise.
212 Citations
17 Claims
-
1. A method comprising:
-
detecting a security token device that is un-formatted with respect to a security requirement pertaining to accessing an enterprise system, wherein the security token device comprises a first cryptographic authentication key; and formatting, by a processor, the security token device, wherein formatting the security token device comprises; determining format information for the security token device, wherein the format information comprises an access list associated with the enterprise system; replacing the first cryptographic authentication key of the security token device with a second cryptographic authentication key that is associated with the security requirement pertaining to accessing the enterprise system; and storing, on the security token device, the format information for the security token device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus comprising:
-
a memory; and a processor, operatively coupled to the memory, to; detect a security token device that is un-formatted with respect to a security requirement pertaining to accessing an enterprise system, wherein the security token device comprises a first cryptographic authentication key; and format the security token device, wherein to format the security token device, the processor is further to; determine format information for the security token device, wherein the format information comprises an access list associated with the enterprise system; replace the first cryptographic authentication key of the security token device with a second cryptographic authentication key that is associated with the security requirement pertaining to accessing the enterprise system; and store, on the security token device, the format information for the security token device. - View Dependent Claims (10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium comprising computer-executable instructions that, when executed by a processor, cause the processor to:
-
detect a security token device that is un-formatted with respect to a security requirement pertaining to accessing an enterprise system, wherein the security token device comprises a first cryptographic authentication key; and format, by the processor, the security token device, wherein to format the security token device, the processor is further to; determine format information for the security token device, wherein the format information comprises an access list associated with the enterprise system; replace the first cryptographic authentication key of the security token device with a second cryptographic authentication key that is associated with the security requirement pertaining to accessing the enterprise system; and store, on the security token device, the format information for the security token device. - View Dependent Claims (14, 15, 16, 17)
-
Specification