×

Method and system for effecting secure communication over a network

  • US 9,094,213 B2
  • Filed: 10/24/2008
  • Issued: 07/28/2015
  • Est. Priority Date: 10/24/2007
  • Status: Active Grant
First Claim
Patent Images

1. A method of effecting secure communication over a network, comprising:

  • interfacing a hardware token with a computer host, the hardware token comprising security software and communication software stored thereon, the security software configured to determine an authenticity of the communication software stored on the hardware token, wherein the security software comprises computer-executable instructions pre-stored in a memory of the hardware token, the computer host comprising a memory distinct from the hardware token memory;

    on the hardware token, determining an authenticity of the security software that is pre-stored in the memory of the hardware token wherein the hardware token comprises a hash code stored in the hardware token memory, the hash code comprising a one-way hash of the security software, and the security software authenticity determining comprises at the hardware token computing a one-way hash of the security software and comparing the computed one-way hash against the stored hash code;

    upon successful validation of the authenticity of the security software on the hardware token, loading the security software from the hardware token memory into the computer host memory;

    the computer host executing the loaded security software from the computer host memory to determine authenticity of the communication software stored on the hardware token wherein the hardware token comprises a second hash code stored in the hardware token memory, the second hash code comprising a one-way hash of the communication software, and the communication software authenticity determining comprises at the computer host computing a one-way hash of the communication software and comparing the computed communication software hash against the second hash code; and

    after successful validation of the authenticity of the communication software using the security software, facilitating communication, via the computer host, between the hardware token and a remote computer remote from the computer host, by executing the communication software from the computer host memory.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×