Electrical computers and digital processing systems: support – System access control based on user identification by...
Reexamination Certificate
2006-04-11
2006-04-11
Peeso, Thomas R. (Department: 2132)
Electrical computers and digital processing systems: support
System access control based on user identification by...
C713S168000, C713S152000, C713S152000
Reexamination Certificate
active
07028191
ABSTRACT:
A trusted display (18) of a trusted authorization device (TAD) (10) displays on a trusted display (18) first information about a transaction to be authorized by a user (14) using a trusted keypad (20). The TAD (10) generates (208) a random number (R); generates (1210) second information from the first information, the random number (R) and a first identification code (TADID-A) of the TAD (10); generates (212) a signature of the second information using a first encryption process; egnerates (216) a set of session keys (Ks1, Ks2, Ks3) by a second encryption process responsive to the random number (R) and a set of stored working keys (Kw1, Kw2, Kw3); and generates (218) third information by encrypting the second information and the signature using a third encryption process responsive to the set of session keys (Ks1, Ks2, Ks3). A dat structure (42) is formed comprising the random numer (R), the first identification code (TADID-A), and the third information; and communicated (220) from the TAD (10) to the client (12) to a host server (28) for verification by a verification decryption server (32).
REFERENCES:
patent: 4802217 (1989-01-01), Michener
patent: 5048085 (1991-09-01), Abraham et al.
patent: 5351293 (1994-09-01), Michener et al.
patent: 5590199 (1996-12-01), Krajewski, Jr. et al.
patent: 5615264 (1997-03-01), Kazmierczak et al.
patent: 5671283 (1997-09-01), Michener et al.
patent: 5703949 (1997-12-01), Rosen
patent: 5748740 (1998-05-01), Curry et al.
patent: 5764762 (1998-06-01), Kazmierczak et al.
patent: 5838812 (1998-11-01), Pare, Jr. et al.
patent: 5850443 (1998-12-01), Van Oorschot et al.
patent: 5870723 (1999-02-01), Pare, Jr. et al.
patent: 5901284 (1999-05-01), Hamdy-Swink
patent: 5917168 (1999-06-01), Nakamura et al.
patent: 5938768 (1999-08-01), Brennan
patent: 5940510 (1999-08-01), Curry et al.
patent: 6064988 (2000-05-01), Thomas
patent: 6065679 (2000-05-01), Levie et al.
patent: 6088797 (2000-07-01), Rosen
patent: 6105013 (2000-08-01), Curry et al.
patent: 6125446 (2000-09-01), Olarig et al.
patent: 6154879 (2000-11-01), Pare, Jr. et al.
patent: 6163771 (2000-12-01), Walker et al.
patent: 6175921 (2001-01-01), Rosen
patent: 6193153 (2001-02-01), Lambert
patent: 6236981 (2001-05-01), Hill
patent: 6237095 (2001-05-01), Curry et al.
patent: 6307936 (2001-10-01), Ober et al.
patent: 6311272 (2001-10-01), Gressel
patent: 6314520 (2001-11-01), Schell et al.
patent: 6317500 (2001-11-01), Murphy
patent: 6331817 (2001-12-01), Goldberg
patent: 6704871 (2004-03-01), Kaplan
patent: 2001/0011352 (2001-08-01), O'Mahony
patent: 2001/0018349 (2001-08-01), Kinnunen et al.
patent: 2001/0050990 (2001-12-01), Sudia
patent: 2002/0002076 (2002-01-01), Schneier et al.
patent: 2002/0023010 (2002-02-01), Rittmaster et al.
patent: 2002/0023215 (2002-02-01), Wang et al.
patent: 2002/0025045 (2002-02-01), Raike
patent: 2002/0029342 (2002-03-01), Keech
patent: 2002/0031225 (2002-03-01), Hines
patent: 2002/0035687 (2002-03-01), Skantze
H. Abelson; R. Anderson; S.M. Bellovin; J. Benaloh; M. Blaze; W. Diffie; J. Gilmore; P.G. Neumann; R.L. Rivest; J.I. Schiller; B. Schneier, “The Risks of Key Recovery, Key Escrow, & Trusted Third Party Encryption”, 1998, 21 pages, Internet publication downloaded from http://www.cdt.org/crypto/risks98/ on Mar. 28, 2002.
J.R Michener, “System Insecurity in the Internet Age”, IEEE Software, Jul./Aug. 1999, pp. 2-10.
J.R Michener; T. Acar, “Security Domains: Key Management in Large-Scale Systems”, IEEE Software, Sep./Oct. 2000, pp. 52-58.
Aberdeen Group, Inc., “Preparing for the Rush to Privacy: An Executive White Paper”, Jan. 2001, 13 pages, Internet publication from www.aberdeen.com.
J.R Michener; S.D. Mohan, “Clothing the E-Emperor”, Computer, Sep./ 2001, pp. 94-96.
K.L. Lefebvre; W. Chang; G. Strongin, “The Trusted Client: AMD and Wave Mother Board Reference Design”, Aug. 16, 2000, pp. 1-6, Internet publication downloaded from http://www.wave.com on Mar. 28, 2002.
“User Managed Privacy: A New Approach for Addresing Digital Privacy and Personal Information on the Internet”, Nov. 13, 2000, Internet publication downloaded from http://www.wave.com on Mar. 28, 2002.
Wave Systems Corporation, “The Wave Embassy Architecture: Redefining Trust at the Network Edge”, Jun. 2001, 17 pages, Internet publication downloaded from http://www.wave.com on Mar. 28, 2002.
Wave Systems and OneName Corporation, “New Solutions for Secure E-Commerce with Privacy Protection”, 3 pages, Internet publication downloaded from http://www.wave.com on Mar. 28, 2002.
K.R. Lefebvre, “The Added Value of EMBASSY in the Digital World”, pp. 1-12, Internet publication downloaded from http://www.wave.com on Mar. 28, 2002.
M. Ippolito, “Developing Applications for the EMASSY System, an ADK overview”, 10 pages, Internet publication downloaded from http://www.wave.com on Mar. 28, 2002.
Hewlett-Packard Company and Wave Systems Corporation, “EMBASSY: A Trusted-client System: The EMBASSY E-Commerce System”, 10 pages, Internet publication downloaded from http://www.wave.com on Mar. 28, 2002.
Various Internet Web pages downloaded from http://www.wave.com on Mar. 28, 2002, 37 pages.
“Enterprise Solutions . . . for the Digital Economy”, 3 pages, Internet web pages downloaded from http://www.sspsolutions.com on Mar. 28, 2002.
“SSP Xboard-440TM”, 2001-2002, 7 pages, Internet web pages downloaded from http://www.sspsolutions.com on Mar. 28, 2002.
Vasco, “Corporate Overview”, 2002, 2 pages, Internet publication downloaded from http://www.vasco.com on Jun. 24, 2002.
Vasco, “DIGIPASS® Family of Authentication Devices: White Paper”, 2001, 13 pages, Internet publication downloaded from http://www.vasco.com on Jun. 24, 2002.
Vasco, “Strong Authentication With DIGIPASS® Software: White Paper”, 2001, 11 pages, Internet publication downloaded from http://www.vasco.com on Jun. 24, 2002.
Vasco, “Deploying Strong Authentication With DIGIPASS®; White Paper”, 2001, 14 pages, Internet publication downloaded from http://www.vasco.com on Jun. 24, 2002.
Vasco, “VACAMAN® Controller Integration: White Paper”, 2001, 22 pages, Internet publication downloaded from http://www.vasco.com on Jun. 24, 2002.
Vasco, “Securing the Web with VACMAN® Enterprise: White Paper”, 2001, 28 pages, Internet publication downloaded from http://www.vasco.com on Jun. 24, 2002.
Vasco, “DIGIPASS® DESK 300”, 2002, 2 pages, Internet publication downloaded from http://www.vasco.com on Jun. 24, 2002.
Vasco, “DIGIPASS® PRO 300”, 2002, 2 pages, Internet publication downoladed from http://www.vasco.com on Jun. 24, 2002.
Vasco, “DIGIPASS® PRO 700”, 2002, 2 pages, Internet publication downloaded from http://www.vasco.com on Jun. 24, 2002.
Vasco, “VACMAN® Server: White Paper”, 2002, 24 pages, Internet publication downloaded from http://www.vasco.com on Jun. 24, 2002.
Vasco, “PKA—Private Key Access: Technical White Paper”, 5 pages, Internet publcation downloaded from http://www.vasco.com on Jun. 24, 2002.
Michener John R.
Ryan Paul F.
Peeso Thomas R.
Raggio & Dinnin, P.C.
LandOfFree
Trusted authorization device does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Trusted authorization device, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Trusted authorization device will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3589041