IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0510970
(2009-07-28)
|
등록번호 |
US-8429416
(2013-04-23)
|
우선권정보 |
WO-PCTSG0200227 (2002-07-31); WO-PCTSG0200171 (2002-10-04) |
발명자
/ 주소 |
- Ooi, Chin Shyan Raymond
- Lim, Lay Chuan
- Poo, Teng Pin
- Tan, Henry
|
출원인 / 주소 |
- Trek 2000 International Ltd.
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
4 인용 특허 :
119 |
초록
▼
A method comprises performing an authentication of a user of a portable device, performing an authentication handshake between the portable device and a content server, wherein the portable device includes a USB plug that plugs directly into a USB port of a host computer and the host computer is com
A method comprises performing an authentication of a user of a portable device, performing an authentication handshake between the portable device and a content server, wherein the portable device includes a USB plug that plugs directly into a USB port of a host computer and the host computer is communicatively coupled to the content server, and sending a first key sent from the portable device to the content server, wherein access to restricted content on the content server by the user is enabled if the user authentication, the authentication handshake, and an authentication using the first key are all successful. The process may also include encrypting restricted content received from the content server using a private key before storing the restricted content in a non-volatile memory of the portable device.
대표청구항
▼
1. A method comprising: establishing communication via a Universal Serial Bus (USB) plug of a portable device with a host computer when the USB plug is directly connected to a USB port of the host computer;performing a user authentication of a user of the portable device, the user authentication bei
1. A method comprising: establishing communication via a Universal Serial Bus (USB) plug of a portable device with a host computer when the USB plug is directly connected to a USB port of the host computer;performing a user authentication of a user of the portable device, the user authentication being performed by the portable device;if the user authentication is successful, sending information from the portable device to a content server via the host computer for performance of an authentication handshake between the portable device and the content server;if the authentication handshake is successful, sending an encrypted first key from the portable device to the content server via the host computer for performance of a second user authentication by the content server; andif the second user authentication is successful, the portable device receiving restricted content from the content server via the host computer. 2. The method of claim 1, wherein the user authentication is a biometrics-based user authentication. 3. The method of claim 2, wherein the biometrics-based user authentication compares a user's detected fingerprint to a fingerprint template stored in the portable device. 4. The method of claim 2, wherein the biometrics-based user authentication compares a user's detected iris pattern to an iris pattern stored in the portable device. 5. The method of claim 1, wherein the encrypted first key is an encrypted public key. 6. The method of claim 1, further comprising encrypting a first key. 7. The method of claim 1, further comprising storing the restricted content in a non-volatile memory of the portable device. 8. The method of claim 1, further comprising encrypting the restricted content using a second key and storing the encrypted restricted content in a non-volatile memory of the portable device. 9. A method comprising: establishing communication via a Universal Serial Bus (USB) plug of a portable device with a host computer when the USB plug is directly connected to a USB port of the host computer;performing a user authentication of a user of a portable device, the user authentication being performed by the portable device;if the user authentication is successful, sending information from the portable device to a content server via a host computer for performance of an authentication handshake between the portable device and the content server;if the authentication handshake is successful, sending a hashed first key from the portable device to the content server for performance of a second user authentication by the content server; andif the second user authentication is successful, the portable device receiving restricted content from the content server via the host computer. 10. The method of claim 9, wherein the user authentication is a biometrics-based user authentication. 11. The method of claim 10, wherein the biometrics-based user authentication compares a user's detected fingerprint to a fingerprint template stored in the portable device. 12. The method of claim 10, wherein the biometrics-based user authentication compares a user's detected iris pattern to an iris pattern stored in the portable device. 13. The method of claim 9, wherein the hashed first key is a hashed public key. 14. The method of claim 9, further comprising hashing a first key. 15. The method of claim 9, further comprising storing the restricted content in a non-volatile memory of the portable device. 16. The method of claim 9, further comprising encrypting the restricted content using a second key and storing the encrypted restricted content in a non-volatile memory of the portable device. 17. A method comprising: establishing communication via a Universal Serial Bus (USB) plug of a portable device with a host computer when the USB plug is directly connected to a USB port of the host computer;executing a user authentication process of a user of the portable device;sending a security code from the portable device to a content server via a host computer in response to a request from the content server;sending a hashed first key from the portable device to the content server via the host computer for performance of a user authentication by the content server; andthe portable device receiving restricted content from the content server via the host computer if the user authentication by the content server is successful. 18. The method of claim 17, wherein the user authentication process is a biometrics-based user authentication process. 19. The method of claim 18, wherein the biometrics-based user authentication process compares a user's detected fingerprint to a fingerprint template stored in the portable device. 20. The method of claim 18, wherein the biometrics-based user authentication process compares a user's detected iris pattern to an iris pattern stored in the portable device. 21. The method of claim 17, wherein the hashed first key is a hashed public key. 22. The method of claim 17, further comprising hashing a first key. 23. The method of claim 17, further comprising storing the restricted content in a non-volatile memory of the portable device. 24. The method of claim 17, further comprising encrypting the restricted content using a second key and storing the encrypted restricted content in a non-volatile memory of the portable device. 25. A portable device comprising: a processor;a non-volatile memory coupled to the processor;a Universal Serial Bus (USB) plug coupled to a USB controller that is coupled to the processor, the USB plug configured to directly connect the portable device to a USB port of a host computer;a user authentication algorithm configured to authenticate a user of the portable device;the processor configured to perform an authentication handshake with a content server via the host computer if the user authentication algorithm indicates a successful user authentication; anda hashing algorithm configured to hash a public key before the processor sends the public key to the content server via the host computer for performance of a user authentication by the content server;the processor further configured to store in the non-volatile memory content received from the content server via the host computer if the user authentication by the content server is successful. 26. The portable device of claim 25, further comprising an encryption unit configured to encrypt content received from the content server via the host computer, and wherein the processor is further configured to store the encrypted content in the non-volatile memory. 27. The portable device of claim 26, wherein the encryption unit is configured to encrypt the content using a private key. 28. The portable device of claim 25, further comprising a tamper-proof unit configured to erase at least a portion of data stored in the non-volatile memory upon detecting at least one operation parameter falling beyond a predetermined normal operating range. 29. The portable device of claim 25, wherein the public key is stored in the non-volatile memory. 30. A portable device comprising: a processor;a non-volatile memory coupled to the processor;a Universal Serial Bus (USB) plug coupled to a USB controller that is coupled to the processor, the USB plug configured to directly connect the portable device to a USB port of a host computer;a user authentication algorithm configured to authenticate a user of the portable device;the processor configured to send a security code to a content server via the host computer if the user authentication algorithm indicates a successful user authentication; anda hashing algorithm configured to hash a public key before the processor sends the public key to the content server via the host computer for performance of a user authentication by the content server,the processor further configured to store in the non-volatile memory content received from the content server via the host computer if the user authentication by the content server is successful. 31. The portable device of claim 30, further comprising an encryption unit configured to encrypt content received from the content server via the host computer, and wherein the processor is further configured to store the encrypted content in the non-volatile memory. 32. The portable device of claim 31, wherein the encryption unit is configured to encrypt the content using a private key. 33. The portable device of claim 30, further comprising a tamper-proof unit configured to erase at least a portion of data stored in the non-volatile memory upon detecting at least one operation parameter falling beyond a predetermined normal operating range. 34. The portable device of claim 30, wherein the public key is stored in the non-volatile memory.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.