×

Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks

  • US 7,353,399 B2
  • Filed: 01/08/2003
  • Issued: 04/01/2008
  • Est. Priority Date: 07/31/2002
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for accessing restricted information by a user, said method comprising the steps of:

  • coupling a portable storage device to a communication port of a client computer, wherein said communication port of said client computer is a USB port and said portable storage device comprises a USB plug, said client computer communicatively coupled to a content server over a network, said content server storing restricted information, said portable storage device having a biometric detector disposed thereon and being capable of verifying user identity against a stored biometric template of an authorized user;

    capturing biometric information of a requester using said biometric detector;

    provided said portable data storage device authenticates said requester'"'"'s identity, transmitting a first notification from said portable storage device to said content server over the network;

    receiving a device authentication request from said content server over the network and in response thereto transmitting a device authentication reply from said portable storage device to said content server over the network, said device authentication reply for completing an authentication handshake between said content server and said portable storage device;

    receiving a key request from said content server over the network and in response thereto transmitting a first key representative of said requester from said portable storage device to said content server over the network, said first key for allowing said content server to confirm said requester'"'"'s identity, wherein said first key is hashed before transmission to said content server over the network;

    receiving said restricted information from said content server over the network;

    encrypting said restricted information using a second key representative of said requester'"'"'s identity; and

    storing said restricted information into said portable storage device in encrypted form, wherein said stored encrypted information cannot be decrypted without using said second key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×