Apparatus and Method for Securing Digital Data with a Security Token
First Claim
Patent Images
1. A security token, comprising:
- a wireless interface to communicate with a secured device and an additional security token; and
a cryptographic module to;
generate cryptographic information,encrypt messages to the secured device,decrypt messages from the secured device,coordinate the encryption and decryption of data on the secured device, wherein movement of the security token beyond a range of the wireless interface to communicate with the secured device ceases coordination of decryption of data on the secured device such that the data on the secured device remains encrypted, wherein the wireless interface communication range with the secured device is limited by personal proximity; and
exchange encryption parameters with the secured device and the additional security token, wherein the secured device operates as a communication channel between the security token and the additional security token.
1 Assignment
0 Petitions
Accused Products
Abstract
A security token includes a wireless interface to communicate with a secured device. A cryptographic module generates cryptographic information, encrypts messages to the secured device, decrypts messages from the secured device and coordinates the encryption and decryption of data on the secured device.
-
Citations
20 Claims
-
1. A security token, comprising:
-
a wireless interface to communicate with a secured device and an additional security token; and a cryptographic module to; generate cryptographic information, encrypt messages to the secured device, decrypt messages from the secured device, coordinate the encryption and decryption of data on the secured device, wherein movement of the security token beyond a range of the wireless interface to communicate with the secured device ceases coordination of decryption of data on the secured device such that the data on the secured device remains encrypted, wherein the wireless interface communication range with the secured device is limited by personal proximity; and exchange encryption parameters with the secured device and the additional security token, wherein the secured device operates as a communication channel between the security token and the additional security token. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of operating a wireless security token to secure data on a secured device, comprising:
-
generating encryption information; encrypting messages to the secured device; decrypting messages from the secured device; coordinating encryption and decryption of data on the secured device when the wireless security token is within a wireless interface communication range with the secured device, wherein the wireless interface communication range with the secured device is limited by personal proximity; ceasing coordination of decryption of data on the secured device when the wireless security token is outside the wireless interface communication range with the secured device such that the data on the secured device remains encrypted; and exchanging encryption parameters with the secured device and an additional security token, wherein the secured device operates as a communication channel between the security token and the additional security token. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification