Electrical computers and digital processing systems: support – Data processing protection using cryptography – Tamper resistant
Reexamination Certificate
2011-03-15
2011-03-15
Jung, David Y (Department: 2431)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
Tamper resistant
C713S189000, C713S150000
Reexamination Certificate
active
07908492
ABSTRACT:
A data processing method accepts a removable storage media, which becomes electrically engaged with a system unit within the data processing system, after which the removable storage media and the hardware security unit mutually authenticate themselves. The removable storage media stores a private key of a first asymmetric cryptographic key pair and a public key of a second asymmetric cryptographic key pair that is associated with the hardware security unit, and the hardware security unit stores a private key of the second asymmetric cryptographic key pair and a public key of the first asymmetric cryptographic key pair that is associated with the removable storage media. In response to successfully performing the mutual authentication operation between the removable storage media and the hardware security unit, the system unit is enabled to invoke cryptographic functions on the hardware security unit while the removable storage media remains engaged with the system unit.
REFERENCES:
patent: 4218582 (1980-08-01), Hellman et al.
patent: 4817140 (1989-03-01), Chandra et al.
patent: 5502765 (1996-03-01), Ishiguro et al.
patent: 5568552 (1996-10-01), Davis
patent: 5604801 (1997-02-01), Dolan et al.
patent: 5787172 (1998-07-01), Arnold
patent: 5905799 (1999-05-01), Ganesan
patent: 6607136 (2003-08-01), Atsmon et al.
patent: 6607707 (2003-08-01), Reichman et al.
patent: 6615350 (2003-09-01), Schell et al.
patent: 2003/0024995 (2003-02-01), Conner et al.
patent: 2003/0108205 (2003-06-01), Joyner et al.
patent: 2003/0161473 (2003-08-01), Fransdonk
patent: WO 00/54126 (2000-09-01), None
patent: WO 03/736888 (2003-09-01), None
Simple Certificateless Signature with Smart Cards; Omote, K.; Miyaji, A.; Kato, K.; Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on vol. 2; Publication Year: 2008 , pp. 431-436.
Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients; Starnberger, G.; Froihofer, L.; Goeschka, K.M.; Availability, Reliability, and Security, 2010. ARES '10 International Conference on; Publication Year: 2010 , pp. 96-103.
An improved authentication and key agreement protocol preserving user's privacy using smart cards; Zhongtian Jia; Yuan Zhang; Service Operations and Logistics, and Informatics, 2008. IEEE/SOLI 2008. IEEE International Conference on vol. 1; Publication Year: 2008 , pp. 577-582.
Srisuchinwong et al.; “A Symmetric Cipher Using Autonomous and Non-Autonomous Cellular Automata”; Global Telecommunications Conference, 1995; GLobcom '95; IEEE; V. 2, Nov. 1995; pp. 1172-1177.
Hoover et al.; “Software Smart Cards via Cryptographic Camouflage”; Security and Privacy, 1999; Proceedings of the 1999 IEEE Symposium on May 9-12, 1999; pp. 208-215.
Kotzanikolauo et al.; “Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks”; World of Wireless Mobile and Multimedia Networks, 2005; WoWMoM 2005; Sixth IEEE International Symposium; Jun. 13-16, 2005; pp. 581-587.
Bade Steven A.
Chao Ching-Yun
Baca Matthew W.
Goshorn Gregory K
Greg Goshorn, P.C.
International Business Machines - Corporation
Jung David Y
LandOfFree
Method for using a compact disk as a smart key device does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for using a compact disk as a smart key device, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for using a compact disk as a smart key device will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2766343