Verification of process integrity
First Claim
1. A system comprising a server and a remote device and in a system comprising a server, the remote device configured to implement a secure transaction of data between with the server and remote device, wherein the remote device comprises:
- a processing device configured to process input data according to a security process;
a data storage device configured to store verification information derived from the input data;
a communication device configured to communicate the processed input data which has been processed by the security process to the server, wherein the server is configured to transmit receive a verification request to from the remote device server, verify integrity of the security process based on and communicate the stored verification information received from the data storage device in response to the verification request for the server to verify integrity of the security process; and
a secure processor, wherein the verification information is derived from the input data according to an encryption algorithm implemented by the secure processor,wherein the remote device is configured to communicate verification information to the server only in response to receiving a verification request from the server.
6 Assignments
0 Petitions
Accused Products
Abstract
A system implements a secure transaction of data between a server and a remote device. The remote device comprises: processing means adapted to process input data according to a security process; data storage means adapted to store verification information derived from the input data according to an encryption algorithm; and communication means for communicating the input data which has been processed by the security process to the server. The server is adapted to transmit a verification request to the remote device, and to verify the integrity of the security process based on verification information received from the communication means of the remote device in response to the verification request.
-
Citations
18 Claims
-
1. A system comprising a server and a remote device and in a system comprising a server, the remote device configured to implement a secure transaction of data between with the server and remote device, wherein the remote device comprises:
-
a processing device configured to process input data according to a security process; a data storage device configured to store verification information derived from the input data; a communication device configured to communicate the processed input data which has been processed by the security process to the server, wherein the server is configured to transmit receive a verification request to from the remote device server, verify integrity of the security process based on and communicate the stored verification information received from the data storage device in response to the verification request for the server to verify integrity of the security process; and a secure processor, wherein the verification information is derived from the input data according to an encryption algorithm implemented by the secure processor, wherein the remote device is configured to communicate verification information to the server only in response to receiving a verification request from the server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of implementing at a remote device a secure transaction of data between with a server and a remote device, the method comprising:
-
processing input data, in the remote device, according to a security process; storing verification information derived from the input data; communicating the processed input data to the server; transmittingreceiving a verification request from the server to the remote device; communicating, from the remote device, the stored verification information to the server in response to the verification request;
verifying, at for the server, to verify integrity of the security process based on the verification information communicated to the server; andderiving the verification information from the input data according to an encryption algorithm implemented by a secure processor, wherein the remote device is configured to communicate verification information to the server only in response to receiving a verification request from the server. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A non-transitory medium readable by a machine, the non-transitory medium comprising:
-
instructions for processing input data, in a remote device, according to a security process; instructions for storing verification information derived from the input data; instructions for communicating the processed input data to the server; instructions for transmitting processing a verification request from the server to the remote device; instructions for communicating the stored verification information from the remote device to the server in response to the verification request; instructions for verifying, at the server, for the server to verify integrity of the security process based on the verification information communicated to the server; and instructions for deriving the verification information from the input data according to an encryption algorithm implemented by a secure processor, wherein the remote device is configured to communicate verification information to the server only in response to receiving a verification request from the server.
-
Specification