TOKEN FOR SECURING COMMUNICATION
First Claim
1. A method for performing a command on a token, comprising:
- receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender;
making a first determination that the sender is allowed to send commands to the token;
based on the first determination;
generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS);
making a second determination that the first CAMD and the second CAMD match; and
based on the second determination, performing the command by the token.
2 Assignments
0 Petitions
Accused Products
Abstract
In general, the invention relates to a method for performing a command on a token. The method includes receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender, and making a first determination that the sender is allowed to send commands to the token. The method further includes, based on the first determination, generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS), making a second determination that the first CAMD and the second CAMD match, and based on the second determination, performing the command by the token.
44 Citations
42 Claims
-
1. A method for performing a command on a token, comprising:
-
receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender; making a first determination that the sender is allowed to send commands to the token; based on the first determination; generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS); making a second determination that the first CAMD and the second CAMD match; and based on the second determination, performing the command by the token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A token, comprising:
-
a processor; and a computer readable medium comprising computer readable program code embodied therein, which when executed by the processor, perform a method, the method comprising; receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender; making a first determination that the sender is allowed to send commands to the token; based on the first determination; generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS); making a second determination that the first CAMD and the second CAMD match; and based on the second determination, performing the command by the token. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A token, comprising:
-
integrated circuits configured to perform a method, the method comprising; receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender; making a first determination that the sender is allowed to send commands to the token; based on the first determination; generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS); making a second determination that the first CAMD and the second CAMD match; and based on the second determination, performing the command by the token. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A computer readable medium comprising computer readable program code embodied therein for causing a token to perform a method, the method comprising:
-
receiving a first command authentication message digest (CAMD), a command, and scrambled data from a sender; making a first determination that the sender is allowed to send commands to the token; based on the first determination; generating a second CAMD on the token using the command, the scrambled data, and an Administrative Command Authentication Secret (ACAS); making a second determination that the first CAMD and the second CAMD match; and based on the second determination, performing the command by the token. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification