System and method for restricting access to a terminal
First Claim
Patent Images
1. A method for authenticating data comprising the steps of:
- providing data to a first device having at least two initial cryptographic keys;
generating authentication information required to authenticate the data utilizing the at least two initial cryptographic keys;
sending the data and authentication data to a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the at least two initial cryptographic keys; and
, authenticating the data in the second device utilizing the paired cryptographic keys.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for authenticating data comprising the steps of: providing data to a first device having at least two initial cryptographic keys; generating authentication information required to authenticate the data utilizing the at least two initial cryptographic keys; sending the data and authentication data to a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the at least two initial cryptographic keys; and authenticating the data in the second device utilizing the paired cryptographic keys.
87 Citations
48 Claims
-
1. A method for authenticating data comprising the steps of:
-
providing data to a first device having at least two initial cryptographic keys;
generating authentication information required to authenticate the data utilizing the at least two initial cryptographic keys;
sending the data and authentication data to a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the at least two initial cryptographic keys; and
,authenticating the data in the second device utilizing the paired cryptographic keys. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method for performing authenticated transactions comprising the steps of:
-
generating authentication data required for transaction authentication using at least two initial cryptographic keys;
transmitting the authentication data and transaction data to a second device; and
authenticating the transmitted transaction data file in the second device using the at least two transmitted cryptographic keys wherein each paired cryptographic key is associated with one of the at least two initial cryptographic keys.
-
-
31. A method for authenticating files and performing authorized transactions comprising the steps of:
-
providing a transaction to a first device having multiple initial cryptographic keys;
validating two or more of the multiple initial cryptographic keys;
generating authentication data required for transaction authentication utilizing two or more of the initial cryptographic keys that are validated;
sending the transaction and authentication data to a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the valid initial cryptographic keys; and
authenticating the transaction in the second device utilizing the paired cryptographic keys.
-
-
32. A method for authenticating files and performing authorized transactions comprising the steps of:
-
providing data to a first device having multiple initial cryptographic keys;
invalidating one or more of the multiple initial cryptographic keys;
generating authentication data required for file authentication utilizing two or more of the initial cryptographic keys that are validated;
sending the data file and authentication data to a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the valid initial cryptographic keys; and
authenticating the data file in the second device utilizing the paired cryptographic keys.
-
-
33. A method for authenticating data comprising the steps of:
-
providing data to a first device having multiple initial cryptographic keys;
generating authentication data required for data authentication utilizing predetermined initial cryptographic keys which number less than all of the multiple initial cryptographic keys;
sending the data and authentication data to a second device;
pairing cryptographic keys in the second device to determine a paired cryptographic key associated for each of the predetermined initial cryptographic keys; and
authenticating the digital data in the second device utilizing the paired cryptographic keys.
-
-
34. A system for authorizing digital data comprising:
-
a first device having at least two initial cryptographic keys, wherein the first device generates authentication data required for digital data authentication utilizing the at least two initial cryptographic keys and transmits the digital data and authentication data; and
a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the at least two initial cryptographic keys, wherein the second device authenticates the digital data in the second device utilizing the paired cryptographic keys.
-
-
35. A method for authenticating digital files and performing authorized transactions comprising the steps of:
-
providing data to a first device;
passing the data through a hash function to produce a hash value;
encrypting the hash value using at least two initial cryptographic keys;
sending data file and the encrypted hash value to a second device having paired cryptographic keys wherein each paired cryptographic key is associated to one of the at least two initial cryptographic keys;
decrypting the digital signature using the at least two paired cryptographic keys;
passing the data file thru the hash algorithm at the second device to generate a second device hash value;
comparing the first device hash value to the second device hash value; and
wherein the second device will not execute, interpret, process or allow transfer of data in the data file if the first device hash value differs from the second device hash value. - View Dependent Claims (36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
-
35-1. A method of key management of multiple cryptographic keys used in paired key authentication comprising the steps of:
-
establishing multiple keys in an initial device;
establishing multiple keys in a second device paired to the initial device keys;
enabling the validation of keys in the initial device;
enabling validation of keys in the second device;
enabling the invalidation of keys in the initial device;
enabling invalidation of keys in the second device;
enabling replacement of keys in the initial device; and
enabling replacement of keys in the second device.
-
Specification