×

Secure integrated device with secure, dynamically-selectable capabilities

  • US 6,968,453 B2
  • Filed: 01/17/2001
  • Issued: 11/22/2005
  • Est. Priority Date: 01/17/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer program product for providing a secure, integrated device with dynamically selectable capabilities, the computer program product embodied on one or more computer-usable media and comprising:

  • computer-readable program code that is configured to operate a security core which provides security functions;

    computer-readable program code that is configured to establish a secure, operable connection of one or more components to the security core, such that the security core can vouch for authenticity of each securely operably connected component, wherein the security core and the operably connected components thereby comprise the secure integrated device; and

    computer-readable program code that is configured to securely perform a transaction using the secure integrated device, wherein the computer-readable program code that is configured to securely perform a transaction further comprises computer-readable program code that is configured to digitally notarize, by the security core, an output data stream created by a selected one of the operably connected components of the secure integrated device, and wherein the computer-readable program code that is configured to digitally notarize further comprises;

    computer-readable program code that is configured to authenticate the selected operably connected component to the security core;

    computer-readable program code that is configured to compute, by the security core, a hash value over the output data stream;

    computer-readable program code that is configured to hash, by the security core, a combination of (1) the hash value and (2) the unique identifier of the selected operably connected component, thereby creating a hashed data block;

    computer-readable program code that is configured to digitally sign, by the security core, the hashed data block using a private key of the security core; and

    computer-readable program code that is configured to provide the digitally signed hashed data block along with the combination as the digital notarization of the output data stream.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×