Method and system for effecting secure communication over a network
First Claim
1. A method of effecting secure communication over a network, comprising:
- interfacing a hardware token with a computer host, the hardware token comprising security software and communication software stored thereon, the security software configured to determine an authenticity of the communication software stored on the hardware token, wherein the security software comprises computer-executable instructions pre-stored in a memory of the hardware token, the computer host comprising a memory distinct from the hardware token memory;
on the hardware token, determining an authenticity of the security software that is pre-stored in the memory of the hardware token wherein the hardware token comprises a hash code stored in the hardware token memory, the hash code comprising a one-way hash of the security software, and the security software authenticity determining comprises at the hardware token computing a one-way hash of the security software and comparing the computed one-way hash against the stored hash code;
upon successful validation of the authenticity of the security software on the hardware token, loading the security software from the hardware token memory into the computer host memory;
the computer host executing the loaded security software from the computer host memory to determine authenticity of the communication software stored on the hardware token wherein the hardware token comprises a second hash code stored in the hardware token memory, the second hash code comprising a one-way hash of the communication software, and the communication software authenticity determining comprises at the computer host computing a one-way hash of the communication software and comparing the computed communication software hash against the second hash code; and
after successful validation of the authenticity of the communication software using the security software, facilitating communication, via the computer host, between the hardware token and a remote computer remote from the computer host, by executing the communication software from the computer host memory.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of effecting secure communication over a network begins by interfacing a hardware token with a computer host. The hardware token includes security software and communication software stored thereon. The security software is stored in a memory of the hardware token. The computer host has a memory distinct from the hardware token memory. The authenticity of the security software is determined on the hardware token. Upon successful validation of the authenticity of the security software on the hardware token, the authenticity of the communication software is determined by loading the security software from the hardware token memory into the computer host memory and executing the loaded security software from the computer host memory. After successful validation of the authenticity of the communication software, the computer host facilitates communication between the hardware token and a remote computer by executing the communication software from the computer host memory.
-
Citations
18 Claims
-
1. A method of effecting secure communication over a network, comprising:
-
interfacing a hardware token with a computer host, the hardware token comprising security software and communication software stored thereon, the security software configured to determine an authenticity of the communication software stored on the hardware token, wherein the security software comprises computer-executable instructions pre-stored in a memory of the hardware token, the computer host comprising a memory distinct from the hardware token memory; on the hardware token, determining an authenticity of the security software that is pre-stored in the memory of the hardware token wherein the hardware token comprises a hash code stored in the hardware token memory, the hash code comprising a one-way hash of the security software, and the security software authenticity determining comprises at the hardware token computing a one-way hash of the security software and comparing the computed one-way hash against the stored hash code; upon successful validation of the authenticity of the security software on the hardware token, loading the security software from the hardware token memory into the computer host memory; the computer host executing the loaded security software from the computer host memory to determine authenticity of the communication software stored on the hardware token wherein the hardware token comprises a second hash code stored in the hardware token memory, the second hash code comprising a one-way hash of the communication software, and the communication software authenticity determining comprises at the computer host computing a one-way hash of the communication software and comparing the computed communication software hash against the second hash code; and after successful validation of the authenticity of the communication software using the security software, facilitating communication, via the computer host, between the hardware token and a remote computer remote from the computer host, by executing the communication software from the computer host memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A hardware token comprising:
-
an interface configured for interfacing the hardware token with a computer host; and a memory coupled to the interface and pre-storing communication software and security software, the security software configured to determine an authenticity of the communication software stored in the memory, wherein the security software comprises computer-executable instructions pre-stored in the memory, the hardware token configured to;
determine an authenticity of the security software that is pre-stored in the memory wherein the memory stores a hash code comprising a one-way hash of the security software, and the security software is configured to determine an authenticity thereof by causing the hardware token to compute a one-way hash of the security software and compare the computed one-way hash against the stored hash code;upon successful validation of the authenticity of the security software on the hardware token, load the security software from the hardware token memory into the computer host memory; cause the computer host to execute the loaded security software from the computer host memory to determine authenticity of the communication software stored on the hardware token wherein the memory stores a second hash code comprising a one-way hash of the communication software, and the security software is configured to determine the authenticity of the communication software by causing the computer host to compute a one-way hash of the communication software and compare the computed communication software hash against the second hash code; and after successful validation of the authenticity of the communication software using the security software, communicate, via the computer host executing the communication software, with a remote computer remote from the computer host. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
Specification