`
`US 6,088,802
`
`PATENT:
`
`6,088,802
`
`INVENTORS: Bialick. William P.
`
`Sutherland, Mark J.
`
`Dolphin Peterson, Janet L.
`
`Rowland, Thomas K.
`
`Skeba, Kirk W.
`
`Housley, Russell D.
`
`TITLE:
`
`Peripheral device with integrated
`security functionality
`
`APPLICATION
`NO:
`FILED:
`
`US1997869305A
`04 JUN 1997
`
`ISSUED:
`
`11 JUL 2000
`
`COMPILED:
`
`03 OCT 2016
`
`Toshiba_Apricorn 1003-0001
`Toshiba_Apricorn 1003-0001
`|PR2018-01067
`IPR2018-01067
`
`
`
`
`
`ISSUECMSSIFICATION
`
`S E HIAL
`'INUM BER
`
`FATE NT
`N U MB EH
`
`_
`
`
`-'-'-.':,"_._'_..1_.
`
`Z'A-_,._..
`..fII-INGDAIE GM 7‘3
`
`“"i‘l'JI'JNTi[i'.||..r1|\n’,i fumvr
`\IEHII—‘ugr;
`
`.
`
`'
`
`:
`
`""’-=l-'CI.'""TEfii'J
`UE-IFTlF'lE'IF
`
`I'~'I':'|'-'|_I[I'_'Zri".'l ?I'.II\!FII=3
`
`_ mg;ilk/”JO
`
`PURE Iliil‘! FII. If‘iiii
`
`3..
`
`I {IE-NW -'-:B-I’-‘|.‘|
`
`|
`
`'
`
`.'I':-
`
`|
`
`'L
`
`'
`
`’- ""' ‘
`
`Fallon prlnnlydllnad
`aauso “Ewan-urns
`
`.
`
`if
`
`'
`
`-"I'|.‘I.'i
`
`“\"l'i...
`
`-
`
`‘le:I:-I.|J:"l
`
`l".
`
`I-"JHI'I'I'J't'l!'-JI-‘II_J.'!"':'
`
`PARTS OF APPLICATION
`FILED SEPARATELY
`NOTICE OF ALLOWANCE mILan
`
`I
`
`__
`
`.
`
`.
`
`Asslstanl Examiner
`
`U.B.DEPT. 090mm! mum—ML -
`
`g. g 59
`..-,_.
`M 1
`“mine,
`cLAIMs ALLowEn
`
`Tatar Claims
`
`.
`
`Print Clglyn
`
`DRAWING
`
`LYVJ'IUA
`#FHMAFIY EXAMINER
`
`Sheets Drwg. Flgs.Drwg_.
`7
`
`PflntFig
`
`#39188“: FEE [N m.
`(Rev. WI
`w 52%
`-
`.
`-
`-
`
`FormalDrawingsthnlfbfitmfla
`
`Toshiba_Apricorn 1003-0002
`Toshiba_Apricorn 1003-0002
`|PR2018-01067
`IPR2018-01067
`
`
`
`6,088,802
`
`. PERIPHERAL DEVICE WITH INTEGRATED SECURITY
`FUNCTIONALITY
`
`Transaction History
`
`
`
`
`03—12-1998
`
`
`tion
`'
`
`
`
`
`06 04-199?
`
`
`Workflow - Drawings Finished
`
`
`
`06 04-1997
`Workflow - Drawin ; Matched with File at Contractor
`
`
`
`06—04» 1 997
`
`
`Workflow - Drawings Received at Contractor
`
`
`Initial Exam Team nn
`0?- 1 4- l 997
`
`
`08-07- 1991l
`
`
`IFW Scan & PACR Auto Security Review
`
`11-04-1997 Notice Mailed--Agplication Incomplete-Filing Date Assigned
`03—05-1998 Anglication Is Now CornElete
`A . ulication Dis natched from OIPE
`03-12-1998
`
`
`
`
`
`
`. lication Dispatched from OIPE
`
`
`
`Case Docketed to Examiner in GAU
`04-07-1998
`
`Information Disclosure Statement IDS Filed
`08-15-1998
`
`
`
`
`Information Disclosure Statement IDS Filed
`
`
`
`10-03.1993
`Information Disclosure Statement (IDS) Filed
`
`Information Disclosure Statement (IDS! Filed
`Non-F inal Rejection
`Mail Non-Final Re'ection
`2-11-1993
`03-15—1999
`Res onse after Non—Fina] Action
`
`03-18-1999
`Su
`lemental Response
`
`
`03-25-1999 Date Forwarded to Examiner
`
`IDS Filed
`0380—1999
`Information Disclosure Statement
`
`03-30-1999
`Information Disclosure Statement (IDS) Filed
`
`
`Date Forwarded to Examiner
`04-01-1999
`
`Mai] Notice of Allowance
`06-0?~l999
`
`
`06-07-1999 Notice of Allowance Data Verification Completed
`06—23-1999
`Workflow - Drandn 5 Received at Contractor
`
`Workflow - Drawin 3 Sent to Contractor
`06-24- I999
`
`09- l 3- I 999
`Workflow - Incoming Corresgondence - Finish
`
`09—13-1999
`Workflow- Incomin Cortes ondence- Be ‘11
`I
`09-13-1999
`Information Disclosure Statement tIDS} Filed
`
`
`Informatiori Disclosure Statement (IDS) Filed
`| 09-13-1999
`UnMatched Pa ets in Pubs
`09-13—1999
`
`
`09-13-1999
`UnMatched Papers in Pubs
`M Issue Fee Pa
`
`12-16—1999
`Mail Miscellaneous Communication to A
`
`12-16-1999
`Miscellaneous Communication to A licant « No Action Coant
`
`
`
`0 1 -04-2 000
`
`
`
`05-26-2000
`Workflow - Com lete WF Records for Drawi
`
`0548-2000
`
`
`
`
`
`lication Is Considered Ready for Issue
`
`
`
`Issue Notification Mailed
`06-23-2000
`
`
`07L
`
`1 1-2000 | Recordation of Patent Grant Mailed
`
`___L_——_._—
`1 06252003 | Correspondence Address Chan e
`ENTITY STATUS SET TO UNDISCOUNTED (INITIAL DEFAULT SEI IING
`‘ 0112-2012
`OR STATUS CHANGE}
`03-02-2015 Chan e in Power of Attorne Ma Include Associate POA}
`
`L 09-29-20}6
`03-02~2015 Correspondence Address Chan e
`
`Workflow - File Sent to Contractor
`ent Verified
`
`
`
`
`
`
`_ loos-1998
`
`w1
`
`File Marked Found
`
`|
`
`Toshiba_Apricorn 1003-0003
`Toshiba_Apricorn 1003-0003
`|PR2018-01067
`IPR2018-01067
`
`
`
`I
`
`PATENT APPLICATION
`IWIIIIIIWIIIWIIIIWIIIII
`[13869305
`—
`
`CONTENTS
`
`APPROVED FEL'IEEng [:1 _
`INITIALS
`
`._
`
`.
`
`I .— 1. Agrpficatfon _.L ‘
`
`
`
`Scum. huh-«IMF- |-
`
`
`
`Toshiba_Apricorn 1003-0004
`Toshiba_Apricorn 1003-0004
`|PR2018-01067
`IPR2018-01067
`
`
`
`
`CROSS REFERENCES] SUBCLASS
`
`I“ W“ PER ILDCKJ
`
`IIT NF:
`l)
`'
`
`4
`
`
`
`
`
`I
`“Ell-“-
`
`(II
`
`4'.nu
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`flflflflIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
`
`353%IIIIIIIflflfl
`
`
`
`EEEEEEBEE
`EEEEQB
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Toshiba_Apricorn 1003-0005
`Toshiba_Apricorn 1003-0005
`|PR2018-01067
`IPR2018-01067
`
`
`
`
`
`
`cmssmen -- ~
`m—m
`
`———I_
`m-_-
`_-_—
`
`—--zuma
`_-—m
`E %I
`———
`
` ID NO.
`
`INDEX OF CLAIMS
`
`
`
` I
`
`
`
`E
`E
`
`
`
`II
`II
`I-
`I :
`I
`. --
`E I —
`mmmaII II
`#1“... II
`~-.
`II I.
`I
`.—
`II I- ,.
`II I- -
`II I. ;
`II I. 5:.
`II I- .z
`II I- u-
`II
`IIII-
`= IIII-
`II II
`I
`I III
`IE II I:
`Ila L
`IE
`Ila
`IE
`II
`II
`II
`II
`II
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`III...
`I III--
`I-II-
`III-
`III=III
`"Eu-=3:
`IIII—III
`IEEIIIIIIIII
`IIIII-III
`IIIIIIIII-
`“II—III
`IIIIIIIII-
`IIIIIIIIII
`IIIIIIIII-
`ImIIIIIII-
`--IIIII--
`III-III.-
`mIII—II-
`ImIII—II-
`“III—II-
`laIIIIIIII
`as III III-
`54 III II-
`asIIIIIII-
`IIIIIIIII
`a? IIIIIIII
`mIIIIIII-
`IIIIIIIII
`90 III-III
`
`
`91 III-II-
`ImIII—II-
`IEEI-II—II-
`IEIIIIIIII-
`IEIIIIIII -
`Ital-Ill..-
`IIIIIIIIII
`IEEIIIIIIIII
`IEIIIIIIII
`ImaIIIIIIII
`
`
`
`
`
`Toshiba_Apricorn 1003-0006
`Toshiba_Apricorn 1003-0006
`|PR2018-01067
`IPR2018-01067
`
`—-.
`IPPLIC
`mare;
`ALLEN
`
`T5:3
`
`
`
`
`
`Toshiba_Apricorn 1003-0007
`Toshiba_Apricorn 1003-0007
`|PR2018-01067
`IPR2018-01067
`
`
`
`|||||ll||||||ll|||
`1|||l||||l|||||||Illllllllllllllllllllllllll
`USlIlfi(|888l)2A
`
`||||||||
`
`United States Patent
`Bialick cl al.
`
`[19|
`
`[11] Patent Number:
`[451
`[late of Patent:
`
`6,088,802
`Jul. 11, 2000
`
`[54]
`
`[HI
`
`PERIPHERAL DEVICE WITH INTEGRATED
`SECURI'I‘Y FUNC'I'IONALI'I’T
`
`lnwnlors: William P. Blulick. (‘lnrkwlllc. MIL;
`Mark J. Sulllerlnnd. Milpilas. Calif;
`Janet L. llulphln-Petursun. Bclvcdcm.
`filliE; Thomas K. Rowland. L05
`
`(i
`11%. (infill; Kirk W. Skebn, Frutnoul.
`(”alils. Russell D. Housley. llcrndou.
`Va.
`
`I73|
`
`Assiyicu: Spyrus, Inca. Selma ('laru. {‘allil'
`
`[3|]
`[31]
`1511
`1521
`1591
`
`1561
`
`Amal. No.1 081869.305
`l-‘ilullr
`Jun. 4. 1997
`Im. CI.’
`GIMK 147'67
`US. Cl.
`”3300. 7l392l1l; 713/203
`
`Field of Search
`395.1881“.
`|87.(Jl.
`
`. 49; 713.200. 201. 202
`395486; 350:4
`
`Rafi-mucus Ciled
`U.S. FA'l'LN‘l' DOCUMENTS
`
`“11087 Walmlllbc .
`4.700.136:
`31'1”“ Dykc
`LLUIlL'TT'r’)
`31003 lung
`5,l‘)].h|l
`
`Irl‘l‘H Mclxrm GI
`:11
`5.132.247
`
`3.0994 Orton
`5.297.206:
`
`3.1905 llullc)’
`5.441.104
`”1.4005 Harlutlclnl.
`360/133
`5.4
`.590
`
`
`lluwj
`IJnv
`380-25
`:1 Mi:
`
`21min ”all
`3051800
`5,401,827
`(‘ruslulsnn et al.
`370/58
`BIN-“NI
`5.514.134
`
`711‘101- Mousnwu 1-1 «I.
`irlHSIll
`37,544
`1S!) 15
`('nptlm cl al.
`311-191.
`$3.403
`.
`
`
`11 7.0 1
`BI] ”‘30 Durmluw .....
`5.. 48.731
`38!1/25
`311997 MOIlllk'y l'l .’Il
`SfillJHs]
`305$333
`
`5!]‘1‘17 Stone. lll cl ul.
`51110174
`3r- 1 mm
`imam: MW? Kikinb
`. JMJF I 4
`
`5.1194535
`l2.'l'J‘?7
`llullcnhcrg
`38073
`5.702.083 MEWS [.cc cl Ell.
`.
`33514312
`5.770.849
`hr'lllI’H Nuvir- cl a]
`300.223
`
`811095 lluuvcner cl :1].
`5.790.674
`
`
`3051181111
`IWIWS llnldcn el al.
`5.828.332
`
`.. £111,135
`1099‘) Farm“ er al.
`5,S7&l42
`FOREIGN I’MLN‘I‘ [)(X‘UMEN‘I‘S
`W0 82,1328“
`11111132 Wll’i).
`WO‘IWZ'i-lll-
`KIIWT Wll’fi.
`(I'J'llL-Lll PUHIJL‘A'I‘IHNS
`
`LLS. appliculiml Nu, 081309.120. Bizrlick cl :Il.. lilccl Jun. 4.
`I997. pending.
`Primary I:.'.rrum'.rlrr—Ly V. Ilu.‘
`
`.Mlurnqu 439m, ur Finn—David R. lirulmm
`ISTj
`ABSTRACT
`'I'hu ilwunlion unulalcs 1| periphrrul dcvicr to mnunlmiculu
`will] u husl mmPuIing device 10 2113th nne or mun: sucurily
`operations In hr: pcrl'mmcd by [he pcriphural device on (lnln
`slnrcd willu'n lhc lmsl computing dcvicc. dala pmvidcd l'rrJrrI
`Ihu hosl compuling device In ll'rc pcriphcral duvicc (which
`can then lac. fur cxnmplc. 510m! in the peripheral dcvicc nr
`Iransmillml In yr] anolhur LIL-vim), or dam relriuvurl by Ihc
`husl cumpuling dcviuc [rum ll’u: peripheral dcviu; (cg. dala
`Ilul has Iwun stored in Ihc puriplrural device. Iransmillurl In
`lhc peripheral device from another (lcvicc or inpul
`to 01¢
`pariphcra] dcviu: by a person]. In particular. 1111: peripheral
`device can be adapted to cnalvlc. in a single integral periph-
`eral device, pcrformanw [if one or more Securily opuralionfi
`un dala. and a (lEl'llIl—‘ll inlcracliun will] a husl crumpuling
`Llwicc Ihal has not prcviuusly been iuaegrulcd will: sucun'ly
`l'lpbrllllflfl‘i in x singl: inlcgral dcvim:
`'l'hu (Infincrl
`inlcrrrc-
`lions. can pmvidu :1 variety 0|]pr ol' l‘unclinnnlity (mg.
`dala sloragc. dalu cummuniculmn. dalu input and vulpul.
`user irlcnlifiurlliuu). Thu.- pcnphural dcvicc can 11150111: imple-
`mumcd so Ihal Ilic suturily upcralions arc pcrfnrmcd in-linc.
`i.r..
`lhc weurily armrarions an: purl'ormud l‘lclwucn 1111.-
`unmmunicaliun ul'dala [u or from [he hoezl compuling device
`and lhc performance (If the dclincrl imuraclinn. Momover.
`lhc peripheral duvicc can he ilnplcmcnwd 51: that Ihc secu‘
`riry funclicmalily nl‘ 1hr.- pun'phcral dwicu is Iransparcm lu
`Iln: husl rumpuling device.
`
`39 Claims, 9 llmwing Slit-em
`
`
`
`5031:
`
`507
`
`509
`
`608
`
`501
`
`613
`
`Toshiba_Apricorn 1003-0008
`Toshiba_Apricorn 1003-0008
`|PR2018-01067
`IPR2018-01067
`
`
`
`US. Patent
`
`Jul. 11. 2000
`
`Sheet 1 ul' 9
`
`6,088,802
`
`Host
`Computing
`
`Device 101a
`
`Portable
`
`FIG. 1
`(PRIOR ART)
`
`100
`
`/
`
`200
`
`/
`
`Host
`Computing
`Device
`
`Security
`Device
`
`Portable
`
`Device
`
`FIG. 2
`(PRIOR ART)
`
`Toshiba_Apricorn 1003-0009
`Toshiba_Apricorn 1003-0009
`|PR2018—01067
`IPR2018-01067
`
`
`
`US. Patent
`
`Jul. 11. 2000
`
`Sheet 2 ul'9
`
`6,088,802
`
`300
`
`Peripheral
`
`Host
`Computing
`
`Device
`
`Toshiba_Apricorn 1003-0010
`Toshiba_Apricorn 1003-0010
`|PR2018—01067
`IPR2018-01067
`
`
`
`US. Patent
`
`.lul.11.20|lll
`
`Sheet 3 ul'9
`
`6,088,802
`
`400
`
`Functionality
`
`Target
`Functionality
`
`/ Security
`
`i 404
`
`501
`
`502
`
`503
`
`504
`
`505
`
`Userconnects peripheral device
`
`to host computing device.
`
`500
`
`I
`
`Host computing device detects presence
`of peripheral device.
`
`Peripheral device establishes its identity.
`
`
`
`Host computing device identifies peripheral device.
`
`User interacts with host computing device
`to begin using peripheral device.
`
`FIG. 5
`
`Toshiba_Apricorn 1003-0011
`Toshiba_Apricorn 1003-0011
`|PR2018—01067
`IPR2018-01067
`
`
`
`US. Patent
`
`Jul. 11. 2000
`
`Sheet 4 ul' 9
`
`6,088,802
`
`now
`
`somgas
`
`w.OE
`
`Toshiba_Apricorn 1003-0012
`Toshiba_Apricorn 1003-0012
`|PR2018-01067
`IPR2018-01067
`
`
`
`US. Patent
`
`Jul. 11. 2000
`
`Sheet 5 ul' 9
`
`6,088,802
`
`(N.9“.
`
`8w\
`
`
`
`
`
`$82...3:mamauoom
`
`$8
`
`83mm@93289:
`
`2:835859:$535
`
`3:20:22
`
`
`
`3:58:82€33.o
`
`“52333E8.59:
`
`we.
`
`cmmm:
`
`«on
`
`
`
`
`
`$2.585%2:89..9:852mo...333m5.”
`
`5..0Eh.OE
`
`
`
`E..9“—
`
`2.8cozmusEmEBEE
`
`039cm53
`
`.cozmaaoEmuoE62%
`
`5.3Fnew3233
`
`3:33
`
`ED
`
`Toshiba_Apricorn 1003-0013
`Toshiba_Apricorn 1003-0013
`|PR2018-01067
`IPR2018-01067
`
`
`
`
`
`
`
`
`
`
`
`
`
`US. Patent
`
`Jul. 11. 2000
`
`Sheet 6 of 9
`
`6,088,802
`
`
`
`22523;__m59:
`
`2.385%.59.2Eam:
`
`96602
`
`5:32325a“.
`
`320ng__m59:
`
`.cozommcm:9...:EQaceficzzmgs
`
`B3:@5289
`
`EL.SN
`
`
`
`.cozommcm:28me.cofimmcm:Ezuoxm
`
`
`
`
`
`mm>
`
`22.32%5:85.
`
`
`
`.cozummcm:Ezomxm
`
`mo»
`
`mon
`
`30:8sz__m:55
`826255__m:52
`
`.5533:aE292552:83
`.cofimmcm:m§3:95:822:88
`
`
`
`.6mm:9553..
`
`
`
`.6mm:9.65%.
`
`225355=m:55
`
`.cozommce.25E$2283.5923mm:
`9.65%..
`
`Non
`
`0K
`
`22.83%
`
`550%at
`
`oz
`
`Q?»02
`
`92m:
`
`m;
`
`mN.O_n_
`
`92mmt.
`
`Toshiba_Apricorn 1003-0014
`Toshiba_Apricorn 1003-0014
`|PR2018-01067
`IPR2018-01067
`
`
`
`
`
`
`
`
`
`
`
`US. Patent
`
`.lul.11.20¢lll
`
`Sheet 7 0|")
`
`6,088,802
`
`g5
`42%9.:
`$8
`
`807
`
`802
`
`localbus
`
`0-2
`
`HostComputingH
`
`PCMCIABus
`
`FIG.8
`
`806
`
`Device
`
`Toshiba_Apricorn 1003-0015
`Toshiba_Apricorn 1003-0015
`|PR2018—01067
`IPR2018-01067
`
`
`
`US. Patent
`
`.lul.11.20|ltl
`
`Sheet 3 ul'9
`
`6,088,802
`
`806
`
`Cryptographic
`Processing
`Device
`Interface
`
`Interface
`
`Target
`Functionality
`
`803
`
`FIG. 9A
`
`Toshiba_Apricorn 1003-0016
`Toshiba_Apricorn 1003-0016
`|PR2018—01067
`IPR2018-01067
`
`
`
`US. Patent
`
`Jul. 11. 2000
`
`Sheet 9 ul' 9
`
`6,088,802
`
`UUC>-ELI—O QEOQUJMWOCE -Z|—-LLI(IL|.-€EOIJ.I
`
`-!fi-l
`
`IlllmmeEII-Ezo
`
`4052002
`
`mohomm
`
`
`
`#052000252500
`
`
`
`IwfiumOFomhmo
`
`5min:
`
`
`
`405200.309
`
`
`
`«.20.299
`
`or
`
`5on
`
`whim-h—
`
`
`
`I93“..543200
`
` moimm._.z_
`
`wmmkmamm
`
`OEZOQ
`
`
`
`Imuqu(.23405200O:
`
`
`
`1.013»._.o<n=2001min.FUEEOO
`
`
`
`
`
`mOEO—d: —2|—Lul:|:u.<l:0Lu
`
`Toshiba_Apricorn 1003-0017
`Toshiba_Apricorn 1003-0017
`|PR2018-01067
`IPR2018-01067
`
`
`
`
`
`
`
`
`
`
`
`l
`PERIPHERAL DEVICE WITH lN’l‘I'XiRATIil)
`SECURITY FUNCTIONALITY
`CROSS-REFERENCE TO REL-NIH)
`AFI’LICAHDN
`This application is related to the commonly owned.
`cit-pending United States patent Application entitled
`"Modular Security Device." by William P. Biatick. Mark J.
`Sutherland. Janet
`l.. Dolphin-Peterson. Thomas K.
`Rowland. Kirk W. Sheba and Russell D. ltuusley. tiled on
`the same date as the present application and havingAttorncy
`Docket No. SPY-003. the disclosure of which is incorpo—
`rated by reference herein.
`BACKGROUND OF THE INVENI'ION
`t. Field of the invention
`This invention relates to a peripheral. ut'ten portable.
`device (as wet] as the methods employed by such a periph-
`eral device. and systems including such a peripheral device
`and a host computing device with which tltc peripheral
`device communicates) that can communicate with a host
`computing device to enable one or more security operations
`to be performed by the peripheral device on data stored
`within the host computing device. data provided from the
`host computing device to the peripheral device. or data '
`retrieved by the host computing device from the peripheral
`device,
`1 Retated An
`Computing. capability is becoming increasingly portable.
`to particular, there are more and more portable peripheral
`devices that an: adapted for communication with a host
`computing device (Lag, desktop computer, notebook corri—
`pttter or personal digital assistant) to enable particular fune-
`tionalily to be achieved. These portable peripheral devious
`can take a variety of physical forms (c.g.. PCMCIA cards.
`smart cards. CD-ROMs) and can perform an monument of
`functions (e ,g,. storage. communications and cryptography).
`However. while portable computing attracts a number of
`advantages.
`it has a significant disadvantage in that
`the
`computational environment (including the pnnablc periph-
`eral devices. the host computing devices in which they are
`used. and any other computational devices that communi-
`cate with these devices) is more susceptible to security
`breaches.
`i.c.. unauthorized access to. or modification of.
`programs audior data resident Within the environment.
`Consequently. cryptographic devices and methods have
`heen developed for use with such wmputatiunal environ-
`ments (as well as other computational environments) to
`enable increased levels of environment security to he
`obtained
`is a block diagram of a prior art system iinr
`FIG.
`I
`cnablinga host computing device to provide secured data to.
`and retrieve secured data from. a portable device. In FIG. I.
`a system 100 includes a host computing device 101 and a
`portable device 102. The Imst computing device It“ and
`portable device 102 are adapted to enable communication
`between the devices lttl and I02. The host computing
`device 10] includes asccurity mechanism 10hr (which can
`be embodied by appropriately configured hardware. soft-
`ware and/or
`firmware. such as. for example. a general
`purpose mieroprncesmr operating in accordance with
`instructions alone or more computer programs stored in a
`data storage device such as a hard disk) which can be
`directed to perform one or more cryptographic operations.
`In the system 1%, if it is desired to provide secured data
`from the host computing device wt to the portable device
`
`3o
`
`35
`
`all]
`
`45
`
`50
`
`.
`
`a5
`
`6.088.802
`
`[it
`
`2
`102, the host computing device 101 causes the security
`mechanism 10111 to perform appropriate cryptographic
`operations on data before the data is transferred to the
`portable device 102. Similarly. the host computing device
`101 can receive secured data from the portable device 102
`and perform appropriate cryptographic operations on the
`data to convert the data into a form that enables the data to
`be accessed and/or modified by a person who is authorized
`to do so.
`A significant deficiency of the system 100 is that the
`security medianisnt 101:: is itself typically not adequately
`secure.
`It
`Ls commonly accepted that
`the components
`(including hardware. software andxor firmware) of most host
`computing devices are inherently insecure. ~l'his is because
`the system design of host computing devices is. typically.
`intentionally made open so that components made by dif-
`ferent manufacturers can work togethcrseamlcssly. Thus. an
`unauthorized person may obtain knowledge of the operation
`of the security mechanism Ulla (tug. identify a crypto-
`gmpllit: key). there'hy enabling that person to gain access to.
`andfor modify, the (thought in be secured) data.
`[‘16. 2 is a block diagram of another prior art system for
`enabling a host computing device to provide secured data to.
`and retrieve secured data from. a portable device. In FIG. 2.
`a system 200 includes a host computing device 20L a
`ponable device 202 and a security device 203. The host
`computing device 201. the portable device 202 and security
`device 2a: are adapted to enable utmrnunication between
`the devices 201. and 202, and between the devices 201 and
`203. The security device 203 includes appropriately config-
`ured hardware. software umlmr firmware which can be
`directed to perform one or more cryptographic operations.
`in the system 200. it it is desired to provide secured data
`from the host computing device 201 to the ponable device
`202, the host computing device 201 first causes data to he
`transferred to the security device 203. where appropriate
`cryptographic operations are performed on the data. The
`secured data is then transferred hack to the host computing
`device 20!. which. In turn. transfers the secured data to the
`portable device 202. Similarly. the host computing device
`201 can receive secured data from the portable device 202
`by. upon receipt ot‘securcd data. transferring the secured
`data to the security device 203. which performs appropriate
`cryptographic operations on the: data to convert the data into
`a form that enables the data to be accessed anrlr‘or moditied
`by a person who is authorized to do so, then transfers the
`unsecured data back to thI: bust computing device 201,
`The system 200 can overcome the problem with the
`system 100 identified above-.111: security device 203 can be
`constructed so that the cryptographic functionality of the
`device 203 can itselfbe made secure. (Such a security device
`is often referred to as a security “token.") Ari unauthorized
`person can therefore be prevented (or. at least. significantly
`deterred) from obtaining knowledge of the opcmtioo of the
`srantrily device 2015. thereby preventing (or significantly
`deterring) that person from gaining access to, anchor
`modifying. the secured data.
`tinwuver, the system 200 may still not always ensure
`adequately secured data. In particular. unsecured data may
`he provided by the host computing device 20f
`to the
`portable device 202 if the host computing device 2.01—
`whether through inadvertent error or deliberate attack by a
`user of the host computing device 201. or through malfunc-
`tion ofllu: host computing device fill—fails to first transfer
`data to the security device 203 for appropriate cryptographic
`treatment before providing the data to the portable device
`202,
`
`Toshiba_Apricorn 1003-0018
`Toshiba_Apricorn 1003-0018
`|PR2018-01067
`IPR2018-01067
`
`
`
`3
`Additionally. the system 200 requires the use of two
`scparalc pcripbcral dcviccs [portable device 202 and secu-
`rity device 203) to unable the host computing device 20: to
`exchange scoured data with lhc portable device 102, For
`scvern] reasons,
`this may bi:
`inconvenient. First. both
`dwiccs 202 and 103 may not be available at the time that it
`is desired to perform a mun: data exchange (cg. one may
`have bccn forgotten or misplaced). Second. even if both
`dcvicus 202 and 203 an: available, it may not I): possible to
`connect hotlt devices 202 anrl 203 at the some time to the
`host computing device 201. nothing ust: of thc dcviccs 202
`and 203 cumbersome and increasing thc likelihood that
`unsecured data is provided by the host computing device
`201 to the punable device 202.
`SUMMARY OF THE INVEN'I'IUN
`A pflt’iphfitfll dcvict: according to the invention can hr:
`used to communicate with a host computing device to enable
`one or more security operations to In: pcrlbrmcd hy the
`peripheral dcvicc on data stored within the host computing
`device. data provided from the host computing duviec to the
`pcriphurul duvicc (which can then be. for example, stored in
`the peripheral etc-vice or transmitted to yet another device) or
`data retrieved by the host computing dcvicc from the periph-
`crul dcvicc (cg... data that hits been stored in the peripheral _
`device, transmittud to the peripheral device from another
`device or input to the poriphcrai device by a person). In
`particular. the peripheral devicc can be adapted lo enable, in
`a Kinglc integral peripheral device. performance ofnne or
`more security operations on dulu. and u defined interaction
`with a host computing device that has not previously been
`integratud with security opcralions in a single integral
`device, The defined interactions can provide a variety of
`types of functionality (6.3...
`(Iala sloragc. data
`Communication. data input and output. uwr identification).
`as describnd further below. The peripheral device can be
`implemented so that thc pcriphcral device can be operated in
`any one of mull iplc user-selectable modes: 3 security func-
`tionality only mode.
`at
`target functionality mode. and a
`combined security and target
`functionality mode. The
`peripheral
`rluvioc can also hr:
`implementcd so that
`the
`security opurations are pc-rl'ormnd invlinc. i.c.. the security
`operations an: pcrforrnod bctwccn thc mmmunt‘catiun of
`data to or from tho host computing dcviot: and the perfor-
`mance of thc dutincd interaction. Moreover. the peripheral
`device can be implcmcntcd so that thc woun‘ly functionality
`of the peripheral devict: is transparcttt to lhc host computing
`device.
`Aperipheral device acutrdingtn the invention can advan-
`tageously enlblc application of security operations to a wide
`variety of interactions with :t host computing device, In
`particular. a peripheral device according to the invcntion can
`accomplish this without neccstily to use two peripheral
`devices: on: that performs 1hr: security upcralions and not:
`that performs the defined interaction, This can, for example.
`minimize the pissilaility that the device adapted to perform
`thr: defraud interaction will he tlfl-‘(I with the trust computing
`system Without proper n|1pli€atiun of security operations to
`that interaction. Moreover. the provision nl'in-Iinc security
`in a peripheral dcvicc according to lhu invcntion enables a
`more secure exchange of data between a host computing
`device and the peripheral device. overcoming the problems
`identified ahuvc in previous systems for pcrfurmingsecurily
`operations on data exchanged between such dcviccs.
`Additionally. implementing a modular device awarding to
`the invention so that the performance out security upcralions
`hy the: modular dcvicu is transparent can reduce or eliminate
`
`JS
`
`4!]
`
`45
`
`50
`
`55
`
`all
`
`as
`
`6,088,802
`
`[it
`
`4
`the need to modify aspects of the operation of the host
`computing dcvico (cg, dcviu: drivers oflhc host computing
`device). making implementation and use of a data security
`system including the modular device simpler and cusicr.
`Thus, the possibility that a usur will use thc system incor-
`rectly (cg. fail to apply security operations to an interaction
`with thc host computing devicu. or apply the security
`operations incorrectly or invomplctcly) is reduced. Making
`thc security opcrations transparent can also enhance the
`security of those ope-rations.
`BRIEF DESCRIPTION UP THE DRAWINGS
`
`is a block diagram of a prior art syslcm for
`1
`FIG.
`enabling a host computing device to provide secured data to.
`and retrieve secured data from. It portable device.
`FIG. 2 is a block diagram of auolhcr prior art syslcrn [or
`enabling a limit computing rlcvicu to provide secured data to.
`and retrieve secured data from. a portable device.
`FIG. 3A is a block diagram of a system according to the
`invention.
`FIG. .38 is a perspective vicw of a physical irrtplcmcnta-
`tion of the system of FIG. 3A according to one embodiment
`of the invention.
`FIG. It is a block diagram of a peripheral dcvicc according
`to an nmhndimcnt ofthc invention
`ttcmrding to an
`FIG. 5 is a flow chart of a method.
`embodiment of the invention, for initiating use of a system
`accord ing to the invention.
`FIG, 6 is it block diagram of ll system. according to an
`cmbortimunt of thc invuntiun. illustrating operation of the
`system during a method awarding to the invention as in
`FIG. 5.
`FIGSA 7A and TB is a llow chart of a method. according
`to an embodiment of the invention. for using it pcriphcrnl
`dcvicc according lu lltc invention.
`FIG. 8 is a block diagram nfa peripheral device according
`to another embodiment of the invention.
`FIG. 9A is a block diagram illustrating the [low of data
`through the interface control device of FIG. 8.
`FIG. SIB is a block diagram of it particuiar embodiment of
`an interface control device for use in a peripheral device
`according to the invention.
`DETAILED DESCRIPTION (IF THE
`INVENTION
`
`FIG. 3A is a block diagram ot‘a system 300 according to
`thc invention. The system 300 includes a host computing
`duvicc 3lll anti .1 peripheral device 392 that communicate
`via a communications.
`intert'aoc 363.
`llurcin, "peripheral
`device" can refer to any device that operates outside of a
`host computing dcvicc and that
`is connected to the host
`computing device. The peripheral device 3|l2 includes a
`security mechanism Stilt: that enalalcs security operations
`(examples of which are dcscrilrcd in more detail below) to
`he performed on data that is stored within [he hunt comput-
`ing device 30]. data that
`is transmitted from the host
`computing device 30! to the peripheral device 302. or data
`that is transmitted from the peripheral device to the host
`computing device Sill, As explained in more detail below.
`thc peripheral device 302 also provides additional function-
`ality (referred to hcrcin as "target functionality") In the
`system 300, such as. for example. IItt: capability to store data
`in u snIiddslate disk storage device. the capability to onatblc
`communications from the host computing device 30! to
`
`Toshiba_Apricorn 1003-0019
`Toshiba_Apricorn 1003-0019
`|PR2018-01067
`IPR2018-01067
`
`
`
`5
`another device. the capability to accept biometric input to
`enable user authentication to the host eornpulingdeviee 301.
`and the capability to receive and read a smart card inserted
`into the peripheral devirx 302.
`Generally. the communications interface 303 can be any
`embodied by any of a variety of communication interfaces.
`such as a wireless communications interface. a PCMCIA
`interface. a smarleard interface. amrial interface [such as an
`R3423? interface). a parallel intdface. a SCSI interface or an
`IDE interface.
`litreh embodiment of the communications
`interface 303 includes hardware present in ettch of the host
`computing device 301 and peripheral device 392 that oper-
`ates in accordance with a communications protocol (which
`can be embodied. for example. by software stored in a
`memory device artdr‘or firmware that is present in the host
`computing device 31" and/or peripheral device 302) appro-
`priate for that type of communications interface, as known
`to those skilled in the art. Each embodiment of the commu-
`nications interface 303 also includes mechanisms to enable
`physical engagement.
`it' any. between the host computing
`device 301 and. peripheral dcvirx 302.
`Generally. the security mechanism 302" can he mnllg—
`urcd to perform any electronic data security operation
`(herein.
`referred to simply Its "security operation")
`including, for example. operations that provide one or more '
`of the basic cryptographic functions. such as maintenance of
`data confidentiality, verification of data integrity. user
`authentication and user non-repudiation. Particular security
`operations that can be implemented in a peripheral device
`aceurding to the invention are described in more detail
`below.
`for example.
`The security mechanism 302a can be.
`embodied as a security token. Herein, “security token" refers
`to a device that performs security operations and that
`ineludes one or more meehrtniSrns (such as, I'urexatnple. use
`of a hardware random number generator anchor protected
`memory) lo provide security for the content of those open--
`lions.
`FIG. 33 is tr perspective view of a physical implementa-
`tion of the system 300 of l-‘lti. 3A. aemnding to one
`embodiment of the invention.
`In FIG. 3”. the peripheral
`device 392 is embodied as
`card 312 that can be inserted
`into a corresponding slot 313 formed in a pon able computer
`311 that.
`in FIG. SB, embodies the host computing device
`301. Often a peripheral device according to the invention is
`a portable device. sud) as the card .312 shown in FIG SB.
`Herein. “portable device" can refer generally to any device
`that
`is capable of being easily carried by hand
`HO. 4 is a block diagram of in peripheral device 400
`according to an embodiment at the invention. The peripheral
`device 400 includes security functionality 40L target func—
`tionality 402 aunt
`in host
`interface 403 that arc former]
`together as part of a single physical device. For example. the
`security functionality 4m and target functionality 402 can
`be enclosed in a single, cant-like housing (designated in
`FIG. 4 by the numeral 404) conforming to a l’C‘Mf‘tA card
`or smart card standard.
`111:: peripheral device 400 can have a number of advan-
`tageous characteristics. The peripheral device 400 can be
`implemented in a manner that enables [he security opera-
`tions of the security functionality 40] to he performed in a
`manner that is transparent to a host computing device (and.
`depending upon the particular implementation of the periph-
`eral device 400. to n user of a system including the periph—
`eral] device 400) of a system according to lllL' invention, so
`that the bust mmpnting device (and. perhaps. user) is aware
`
`III
`
`2r]
`
`3U
`
`35
`
`all]
`
`45
`
`50
`
`55
`
`at]
`
`as
`
`6.088.802
`
`6
`functionality 402.
`only of the presence of the target
`Additionally. the peripheral device 400 can be implemented
`so that security operations are pcri‘onncd "in-line." i.e.. the
`security operations are performed between the communica-
`tion of data to n: from the host computing device rind the
`perlbrmancc of the target functionality provided by the
`peripheral device. Furthet. the peripheral device 1le enables
`a wide variety of secure target functionality to be easily
`protrided lo a host computing (Jet/ice.
`FIG. 5 is a flow chart oi it method Hill. recording to an
`embodiment of the invention. for initiating use of a system
`according to the invention. The method 500 enables an
`aspect of the invention in which the presence of security
`functionality :L'i pan of a peripheral device is not detected by
`a host computing device. thus making the security function-
`ality transparent to the host computing device trod. depend-
`ing upon the particular manner in which the security fune-
`Lionulity is implemented, to a user of the system.
`[‘16. IS is a block diagram of a system 690. according to
`an embodiment ut‘the invention. illnstralirtguperutlon ofthc
`system 60“ during a method according to the invention such
`as the method Sill} of FIG. 5. The system 600 includes a host
`computing device 601 and a peripheral device 602. The host
`computing device mt includes a display device 603" (mg.
`a conventional computer display monitor) and user input
`device 693!) (mg. a keyboard, mouse, trackball. joystick or
`other appropriate device). referred to collectively hereinafter
`as user interface device- MIJ. The host computing device bill
`also includes. mounted within a housing (IN. a processing
`device 605. a memory device 606. an inputfoutput (1/0)
`device 607 for enabling communication with the user inter-
`face device m3, and an inpultnutput (”0) device 608 for
`enabling communication with peripheral device 602. The
`devices 605. 606, 607 and 608 can each be implemented by
`conventional such devices and can communicate with each
`other via a conventional computer has 6139.15 is Well known
`and understood, The peripheral device 602 include. security
`functionality 611, a memory device fill. an I'DPl-IUI'JIIIPII‘I
`(lift) device 613 for enabling communication with the host
`computing device 6m and target functionality 614. The
`security functionality 61]. memory device 612.. IN) device
`613 and target functionality 614 can each be implemented by
`conventional devices and can communicate with each other
`via a conventional. computer