RADIO TRANSCEIVER OR OTHER ENCRYPTION DEVICE HAVING SECURE TAMPER-DETECTION MODULE
First Claim
1. An encryption device, comprising:
- a system processor that includes a first key for encrypting information and for periodically generating random data strings that are also encrypted using the first key;
a first output for communicating the encrypted information to an external location;
a tamper detection module for receiving on a periodic basis the random data strings generated by the system processor, wherein the tamper detection module includes;
a second key that is the same as the first key;
an encryption engine for encrypting the random data strings using the second key;
a second output for communicating the encrypted data strings to the system processor; and
wherein the tamper detection module is configured to alter the second key upon detection of a tampering event so that the second key is different from the first key.
4 Assignments
0 Petitions
Accused Products
Abstract
An encryption device includes a system processor having a first key for encrypting information. The system processor periodically generates random data strings that are also encrypted using the first key. The encryption device also includes a first output for communicating the encrypted information to an external location and a tamper detection module for receiving on a periodic basis the random data strings generated by the system processor. The tamper detection module includes a second key that is the same as the first key, an encryption engine for encrypting the random data strings using the second key, and a second output for communicating the encrypted data strings to the system processor. The tamper detection module is configured to alter the second key upon detection of a tampering event so that the second key is different from the first key.
28 Citations
19 Claims
-
1. An encryption device, comprising:
-
a system processor that includes a first key for encrypting information and for periodically generating random data strings that are also encrypted using the first key; a first output for communicating the encrypted information to an external location; a tamper detection module for receiving on a periodic basis the random data strings generated by the system processor, wherein the tamper detection module includes; a second key that is the same as the first key; an encryption engine for encrypting the random data strings using the second key; a second output for communicating the encrypted data strings to the system processor; and wherein the tamper detection module is configured to alter the second key upon detection of a tampering event so that the second key is different from the first key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. At least one computer-readable medium encoded with instructions which, when executed by a processor, performs a method including:
-
periodically generating a random data string; encrypting each of the data strings using a first encryption key that is user-rekeyable; encrypting each of the data strings using a second encryption key that is not user-rekeyable and which is initially the same as the first key; altering the second key if a tamper event is detected; comparing each of the data strings encrypted by the first key with the same data string encrypted by the second key; and responding by performing a predetermined action if one of the data strings encrypted by the first key is different from the same data string encrypted by the second key. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification