×

Method and system for using a portable computing device as a smart key device

  • US 20060133615A1
  • Filed: 12/16/2004
  • Published: 06/22/2006
  • Est. Priority Date: 12/16/2004
  • Status: Active Grant
First Claim
Patent Images

1. A data processing system, comprising:

  • a first system unit, the first system unit comprising;

    a first hardware security unit coupled to the first system unit, the first hardware security unit comprising;

    a first private key corresponding to a first asymmetric cryptographic key pair;

    a first public key corresponding to a second asymmetric cryptographic key pair;

    a second private key corresponding to a third asymmetric cryptographic key pair; and

    a second public key corresponding to a fourth asymmetric cryptographic key pair;

    a first removable hardware device, comprising;

    a third public key corresponding to the first asymmetric cryptographic key pair; and

    a third private key corresponding to the second asymmetric cryptographic key pair;

    wherein the first hardware security unit includes logic for authenticating the first hardware security unit with respect to the first removable hardware device based upon the first and second cryptographic key pairs while the first removable hardware device is engaged with the first system unit;

    a second system unit, the second system unit comprising;

    a second hardware security unit coupled to the second system unit, the second hardware security unit comprising;

    a fourth private key corresponding to a fifth asymmetric cryptographic key pair;

    a fourth public key corresponding to a sixth asymmetric cryptographic key pair;

    a fifth public key corresponding to the third asymmetric cryptographic key pair; and

    a fifth private key corresponding to the fourth asymmetric cryptographic key pair;

    a second removable hardware device, comprising;

    a sixth public key corresponding to the fifth asymmetric cryptographic key pair; and

    a sixth private key corresponding to the sixth asymmetric cryptographic key pair;

    wherein the second hardware security unit includes logic for authenticating the second hardware security unit with respect to the second removable hardware device based upon the fifth and sixth cryptographic key pairs while the second removable hardware device is engaged with the second system unit; and

    logic for authenticating the first hardware security unit with respect to the second hardware security unit based upon the third and fourth cryptographic key pairs while the first and second system units are communicatively coupled and after the first hardware security unit has been authenticated with respect to the first removable hardware device and the second hardware security unit has been authenticated with respect to the second removable hardware device.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×