Computing apparatus and methods using secure authentication...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S159000, C713S185000, C726S020000, C726S026000, C380S251000, C380S255000

Reexamination Certificate

active

07069439

ABSTRACT:
Computing apparatus comprises a memory means storing the instructions of a secure process and an authentication process; a processing means arranged to control the operation of the computing apparatus including by executing the secure process and the authentication process; a user interface means arranged to receive user input and return to the user input; and an interface means for receiving a removable primary token and communication with the token. The token comprises a body supporting a token interface for communicating with the interface means, a token processor; and a token memory adapted to store token data including information for identifying the token and auxiliary token information identifying one or more authorized auxiliary tokens. The processing means is arranged to receive the identity information and the auxiliary token information from the primary token, to authenticate the toke using the authentication process and, if the token is successfully authenticated, permit a user to interact with the secure process via the user interface means. The processing means is arranged to repeatedly authenticate the primary toke and cause the computing platform to suspend interaction between the secure process and the user if authentication is not possible as a result of the removal of the primary token unless the primary token is replaced by an authorized auxiliary token.

REFERENCES:
patent: 4562306 (1985-12-01), Chou et al.
patent: 5327497 (1994-07-01), Mooney et al.
patent: 5361359 (1994-11-01), Tajalli et al.
patent: 5379344 (1995-01-01), Larsson et al.
patent: 5442704 (1995-08-01), Holtey
patent: 5544246 (1996-08-01), Mandelbaum et al.
patent: 5666412 (1997-09-01), Handelman et al.
patent: 5721781 (1998-02-01), Deo et al.
patent: 5761309 (1998-06-01), Ohashi et al.
patent: 5768382 (1998-06-01), Schneier et al.
patent: 5778072 (1998-07-01), Samar
patent: 5822431 (1998-10-01), Sprunk
patent: 5864624 (1999-01-01), Lukas et al.
patent: 5872849 (1999-02-01), Sudia
patent: 5917168 (1999-06-01), Nakamura et al.
patent: 5923759 (1999-07-01), Lee
patent: 6018717 (2000-01-01), Lee et al.
patent: 6173400 (2001-01-01), Perlman et al.
patent: 6189098 (2001-02-01), Kaliski, Jr.
patent: 6212635 (2001-04-01), Reardon
patent: 6230266 (2001-05-01), Perlman et al.
patent: 6233687 (2001-05-01), White
patent: 6246771 (2001-06-01), Stanton et al.
patent: 6298441 (2001-10-01), Handelman et al.
patent: 6311272 (2001-10-01), Gressel
patent: 6330670 (2001-12-01), England et al.
patent: 6381696 (2002-04-01), Doyle
patent: 6405369 (2002-06-01), Tsuria
patent: 6490680 (2002-12-01), Scheidt et al.
patent: 6738901 (2004-05-01), Boyles et al.
patent: 0 379 333 (1990-07-01), None
patent: 0 421 409 (1991-04-01), None
patent: 0 552 392 (1993-07-01), None
patent: 0 848 315 (1998-06-01), None
patent: 0 992 958 (2000-04-01), None
patent: 1 081 891 (2001-03-01), None
patent: 2 317 038 (1998-03-01), None
patent: 2 317 983 (1998-04-01), None
patent: 2 320 597 (1998-06-01), None
patent: 93/24906 (1993-12-01), None
patent: 95/24696 (1995-09-01), None
patent: 97/29416 (1997-08-01), None
patent: 98/55912 (1998-12-01), None
U.S. Appl. No. 09/936,131, filed Sep. 4, 2001, Balacheff et al.
U.S. Appl. No. 09/946,323, filed Sep. 4, 2001, Chen et al.
Yee, B., “Using Secure Coprocessors,” Doctoral thesis—Carnegie Mellon University, pp. 1-94 (May 1994).
Anderson, R. and Markus Kuhn, “Tamper Resistance—a Cautionary Note,” 16 pages, located at Internet address <www.c1.cam.ac.uk/-mgk25/tamper.html> (1996).
Anderson, R. and Markus Kuhn, “Tamper Resistance—a Cautionary Note,”Proceedings of the Second USENIX Workshop on Electronic Commerce, Oakland CA, pp. 1-11 (Nov. 1996).
Balacheff, B., et al., “Smartcards—From Security Tokens to Intelligent Adjuncts,”CARDIS 1998 Proceedings, pp. 71-84 (Sep. 1998).
Chaum, D., “Security Without Identification: Transaction Systems to Make Big Brother Obselete,”Communications of the ACM, vol. 28, No. 10, pp. 1030-1044 (Oct. 1985).
Intel, “Wired for Management Baseline specification v2.0,”Boot Integrity Services Application Programming Interface Version 1.0, 64 pages (Dec. 28, 1998).
“Information technology-Security techniques-Entity Authentication—Part 3: Mechanisms using digital signature techniques,”ISO/IEC 9798-3, 6 pages (1998).
“Information technology-Security techniques-Key management—Part 3: Mechanisms using asymmetric techniques,”ISO/IEC 11770-3, pp. 1-23 and Annexes A-D (1999).
Thomasson, J.-P. and L. Baldi, “Smartcards: Portable Security,”2nd Annual IEEE International Conference on Innovation Systems in Silicon, pp. 259-265 (Oct. 1997).
The Trusted Computing Platform Alliance, “Building a Foundation of Trust in the PC,”, 9 pages, located at Internet address <www.trustedpc.org/home/home.html> (Jan. 2000).
Trusted Computing Platform Alliance, Main Specification Version 1.0, 284 pages (Jan. 25, 2001).
Woo, T.Y.C. and S.S. Lam, “Authentication for Distributed Systems,” Computer, vol. 25, No. 1, pp. 39-52 (Jan. 1992).
Abstract of Netherlands Patent NL 9101506, published Apr. 1, 1993.
Ferreira, R., “The Practical Application of State of the Art Security in Real Environments,”Proceedings of the International Conference on Cryptology, Auscrypt, pp. 334-355 (Jan. 1990).
Verschuren, T., “Smart access: strong authentication on the Web,”Computer Networks and ISDN Systems, vol. 30, No. 16-18, pp. 1511-1519 (Sep. 30, 1998).
Rankl, W., et al.,Handbuch der Chipkarten, Carl Hanser Verlag Müchen Wien, pp. 346-349 (1996).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computing apparatus and methods using secure authentication... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computing apparatus and methods using secure authentication..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computing apparatus and methods using secure authentication... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3689182

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.