System and method for securing data from a remote input device
First Claim
1. A secure data processing method comprising:
- generating input data via an input device;
securing the input data at the input device via an integrated security module;
transmitting the secured input data over an insecure medium;
receiving the secured input data at a processing component; and
processing the secured input data within a security boundary of the processing component.
5 Assignments
0 Petitions
Accused Products
Abstract
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.
-
Citations
33 Claims
-
1. A secure data processing method comprising:
-
generating input data via an input device;
securing the input data at the input device via an integrated security module;
transmitting the secured input data over an insecure medium;
receiving the secured input data at a processing component; and
processing the secured input data within a security boundary of the processing component. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A secure data processing system comprising:
-
an input device generating input data, the input device including an integrated security module for securing the input data and transmitting the secured input data over an insecure medium; and
a processing component receiving the secured input data over the insecure medium and processing the input data within a security boundary of the processing component. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A data input device comprising:
-
an integrated security module for securing input data generated at the input device; and
means for transmitting the secured input data over an insecure medium, wherein a processing component receives the secured input data over the insecure medium and processes the input data within a security boundary of the processing component. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
31. A secure data processing method comprising:
-
providing to a processing component an identifier for an input device;
exporting a first cryptographic key to the processing component;
securely providing to the input device a second cryptographic key using the first cryptographic key;
generating input data via an input device;
securing the input data at the input device using the second cryptographic key; and
transmitting the secured input data over an insecure medium. - View Dependent Claims (32, 33)
-
Specification