ENCRYPTION BRIDGE SYSTEM AND METHOD OF OPERATION THEREOF
First Claim
Patent Images
1. A method of operation of a self-authenticating encryption bridge comprising:
- locking a user input module until a user has been authenticated;
encrypting or decrypting data in an encryption/decryption control module when the user has been authenticated in the user input module;
transferring encrypted data from a mass storage device to the encryption/decryption control module in a first communication channel; and
transferring clear data to a computer from the encryption/decryption control module in a second communication channel.
1 Assignment
0 Petitions
Accused Products
Abstract
A self-authenticating encryption bridge, and method of operation thereof, including: a user input module for remaining locked until a user has been authenticated; an encryption/decryption control module responsive to the user input module for encrypting or decrypting data when the user has been authenticated; a first communication channel for transferring encrypted data from a mass storage device to the encryption/decryption control module; and a second communication channel for transferring clear data to a computer from the encryption/decryption control module.
-
Citations
20 Claims
-
1. A method of operation of a self-authenticating encryption bridge comprising:
-
locking a user input module until a user has been authenticated; encrypting or decrypting data in an encryption/decryption control module when the user has been authenticated in the user input module; transferring encrypted data from a mass storage device to the encryption/decryption control module in a first communication channel; and transferring clear data to a computer from the encryption/decryption control module in a second communication channel. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
locking a user input module until a user has been authenticated; unlocking the user input module when the user has been authenticated; allowing a mass storage device to become accessible to a computer when the user has been authenticated in the user input module and the user input module has been unlocked; transferring encrypted data wirelessly or by wire to and from a mass storage device to and from the encryption/decryption control module in a first communication channel; encrypting or decrypting data in the encryption/decryption control module when the user has been authenticated in the user input module and the user input module has been unlocked; decrypting encrypted data to the computer from the mass storage device in the encryption/decryption control module when and the user input module has been unlocked and the mass storage device is accessible to the computer; transferring clear data wirelessly or by wire to and from a computer to and from the encryption/decryption control module in a second communication channel; and encrypting clear data from the computer to the mass storage device in the encryption/decryption control module when and the user input module has been unlocked and the mass storage device is accessible to the computer. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A self-authenticating encryption bridge comprising:
-
a user input module for remaining locked until a user has been authenticated; an encryption/decryption control module responsive to the user input module for encrypting or decrypting data when the user has been authenticated; a first communication channel for transferring encrypted data from a mass storage device to the encryption/decryption control module; and a second communication channel for transferring clear data to a computer from the encryption/decryption control module. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification