Method and apparatus for secure information distribution
First Claim
1. An apparatus comprising:
- a processor;
a memory coupled to the processor, wherein the memory is configured to store secure digital data;
an input interface coupled to the processor and configured to receive one or more commands, wherein to receive a command, the input interface is configured to detect one or more physical gestures applied to the apparatus; and
an output interface coupled to the processor;
wherein the input interface is configured to receive a command requesting access to the secure digital data;
wherein the processor is configured to validate the command requesting access to the secure digital data; and
wherein the output interface is configured to provide the secure digital data in response to the processor validating the command requesting access to the secure digital data.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for secure generation and distribution of digital encryption keys is disclosed. The system may also be used to protect and distribute other types of secure information, including digital, audio, video, or analog data, or physical objects. The system may include a tamper-respondent secure token device, which may be configured to destroy or disable access to the secure information contained therein in response to attempts to physically or electronically breach the device. Outputs may be provided in a secure manner through various interfaces without using electricity (wires) or electromagnetic radiation. Inputs may be provided in a secure manner, including through the use of a gesture-based input interface. Destruction or disablement of the device and/or its secure contents may be provided upon detection of tamper attempts or upon input of a self-destruct command. Proof of the destruction or disablement of the device or its contents may be provided.
85 Citations
20 Claims
-
1. An apparatus comprising:
-
a processor; a memory coupled to the processor, wherein the memory is configured to store secure digital data; an input interface coupled to the processor and configured to receive one or more commands, wherein to receive a command, the input interface is configured to detect one or more physical gestures applied to the apparatus; and an output interface coupled to the processor; wherein the input interface is configured to receive a command requesting access to the secure digital data; wherein the processor is configured to validate the command requesting access to the secure digital data; and wherein the output interface is configured to provide the secure digital data in response to the processor validating the command requesting access to the secure digital data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method, comprising:
-
a device comprising secure information detecting a sequence of physical gestures applied to the device; the device determining if the sequence of physical gestures comprises a valid command requesting access to the secure information; and the device providing the secure information if the device determines that the sequence of physical gestures comprises a valid command requesting access to the secure information. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A method of exchanging secure information among two or more users comprising:
-
a first user loading a device with secure information; the first user sending the device to a second one of the two or more users; the second user accessing the secure information, wherein accessing the secure information comprises; the second user receiving the device comprising the secure information; the second user entering a command requesting access to the secure information, wherein entering the command requesting access comprises applying a physical gesture to the device; the device determining if the command requesting access to the secure information is valid; and the second user receiving the secure information if the device determines that the command requesting access to the secure information is valid. - View Dependent Claims (19, 20)
-
Specification