Removable cryptographic ignition key system and method
First Claim
1. A system for conducting secure operations utilizing a removable cryptographic ignition key (CIK), said system comprising:
- said removable CIK;
a processor configured to receive said removable CIK;
a proximity detector configured to determine if a distance between said removable CIK and said processor is within a predetermined distance, wherein said system is configured to;
enable secure operations subsequent to said processor receiving said removable CIK;
conduct secure operations while said removable CIK is within said predetermined distance of said processor; and
disable secure operations when a distance between said removable CIK and said processor is greater than said predetermined distance.
9 Assignments
0 Petitions
Accused Products
Abstract
A removable, wireless, cryptographic ignition key (CIK) provides a user the capability to conduct secure operations utilizing a processor as long as the CIK is within the vicinity of the processor. This removable CIK may be utilized in applications related to conducting secure operations on desktop computers, laptop computers, wireless telephones, handheld radios (e.g., military radios requiring secure communications), and personal digital assistants (PDAs). Secure operations are enabled upon insertion and removal of the CIK into/from the processor. If a predetermined proximity between the removable CIK and the processor is exceeded (e.g., the user leaves the room, the user puts the processor on a moving belt on an X-ray machine at the airport, the processor is stolen), secure operations are disabled. Secure operations may be resumed, upon the CIK being inserted and removed into/from the processor again.
-
Citations
27 Claims
-
1. A system for conducting secure operations utilizing a removable cryptographic ignition key (CIK), said system comprising:
-
said removable CIK;
a processor configured to receive said removable CIK;
a proximity detector configured to determine if a distance between said removable CIK and said processor is within a predetermined distance, wherein said system is configured to;
enable secure operations subsequent to said processor receiving said removable CIK;
conduct secure operations while said removable CIK is within said predetermined distance of said processor; and
disable secure operations when a distance between said removable CIK and said processor is greater than said predetermined distance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method for conducting secure operations utilizing a removable cryptographic ignition key (CIK), a processor, and a proximity detector, said method comprising:
-
receiving said removable CIK by said processor, wherein;
secure operations are enabled subsequent to receipt of said removable CIK by said processor;
determining if a distance between said removable CIK and said processor is within a predetermined distance;
enabling secure operations while said removable CIK is within said predetermined distance of said processor; and
disabling secure operations when a distance between said removable CIK and said processor is greater than said predetermined distance. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer readable medium encoded with a computer program code for directing a computer processor to conduct secure operations utilizing a removable cryptographic ignition key (CIK), a secure operations processor, and a proximity detector, said program code comprising:
-
a first code segment for causing said computer processor to receive said removable CIK by said secure operations processor, wherein;
secure operations are enabled subsequent to receipt of said removable CIK by said secure operations processor;
a second code segment for causing said computer processor to determine if a distance between said removable CIK and said secure operations processor is within a predetermined distance;
a third code segment for causing said computer processor to enable secure operations while said removable CIK is within said predetermined distance of said secure operations processor; and
a fourth code segment for causing said computer processor to disable secure operations when a distance between said removable CIK and said secure operations processor is greater than said predetermined distance. - View Dependent Claims (26, 27)
-
Specification