Modular security device
DC CAFCFirst Claim
1. A modular device, comprising:
- a security module, comprising;
means for enabling one or more security operations to be performed on data;
means for physically engaging with a target module; and
means for communicating with a target module;
a target module, comprising;
means for enabling a defined interaction with a host computing device;
means for physically engaging with a security module; and
means for communicating with a security module;
means for communicating with a host computing device; and
means for operably connecting the security module and/or the target module to the host computing device in response to an instruction from the host computing device.
2 Assignments
Litigations
5 Petitions
Accused Products
Abstract
The invention enables a modular, typically portable, device to communicate with a host computing device to enable one or more security operations to be performed by the modular device on data stored within the host computing device, data provided from the host computing device to the modular device (which can then be, for example, stored in the modular device or transmitted to yet another device), or data retrieved by the host computing device from the modular device (e.g., data that has been stored in the modular device, transmitted to the modular device from another device or input to the modular device by a person). In particular, the modular device can include a security module that is adapted to enable performance of one or more security operations on data, and a target module that is adapted to enable a defined interaction with a host computing device. The target module can be embodied by any of a variety of modules having different types of functionality (e.g., data storage, data communication, data input and output, user identification). The modular device can also be implemented so that the security operations are performed in-line, i.e., the security operations are performed between the interface of the host computing device to the modular device and the external communications interface of the target module. Moreover, the modular device can be implemented so that the security functionality of the modular device is transparent to the host computing device.
-
Citations
58 Claims
-
1. A modular device, comprising:
-
a security module, comprising; means for enabling one or more security operations to be performed on data; means for physically engaging with a target module; and means for communicating with a target module; a target module, comprising; means for enabling a defined interaction with a host computing device; means for physically engaging with a security module; and means for communicating with a security module; means for communicating with a host computing device; and means for operably connecting the security module and/or the target module to the host computing device in response to an instruction from the host computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A modular device, comprising:
-
a security module, comprising; means for enabling one or more security operations to be performed on data; means for communicating with a target module; and means for communicating with a host computing device; a target module, comprising; means for enabling a defined interaction with a host computing device; and means for communicating with a security module; and means for operably connecting the security module and/or the target module to the host computing device in response to an instruction from the host computing device; wherein communication between the target module and the host computing device must first pass through the security module. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A modular device, comprising:
-
a security module, comprising; means for enabling one or more security operations to be performed on data; and means for communicating with a target module; a target module, comprising; means for enabling a defined interaction with a host computing device; and means for communicating with a security module; means for communicating with a host computing device; means for operably connecting the security module and/or the target module to the host computing device in response to an instruction from the host computing device; and means for providing the type of a target module to a host computing device in response to a request from the host computing device for information regarding the type of the modular device. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A modular device, comprising:
-
a security module, comprising; means for enabling one or more security operations to be performed on data; and means for communicating with a target module; a target module, comprising; means for enabling a defined interaction with a host computing device; and means for communicating with a security module; means for communicating with a host computing device; and means for operably connecting the security module and/or the target module to the host computing device in response to an instruction from the host computing device. - View Dependent Claims (28, 29, 30, 31)
-
-
32. A security module, comprising:
-
means for communicating with a host computing device; means for performing one or more security operations on data; means for communicating with a target module that is adapted to enable a defined interaction with the host computing device; and means for operably connecting the security module and/or the target module to the host computing device in response to an instruction from the host computing device. - View Dependent Claims (33, 34, 35, 36, 37)
-
-
38. A data security system, comprising:
-
a host computing device including one or more device interfaces adapted to enable communication with another device; a modular device, comprising a security module, comprising; means for communicating with the host computing device; means for performing one or more security operations on data; and means for communicating with a target module that is adapted to enable a defined interaction with the host computing device; and means for operably connecting the security module and/or the target module to the host computing device in response to an instruction from the host computing device. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54)
-
-
55. For use in a modular device adapted for communication with a host computing device, the modular device comprising a security module that is adapted to enable one or more security operations to be performed on data and a target module that is adapted to enable a defined interaction with the host computing device, a method comprising the steps of:
-
receiving a request from the host computing device for information regarding the type of the modular device; providing the type of the target module to the host computing device in response to the request; and operably connecting the security module and/or the target module to the host computing device in response to an instruction from the host computing device. - View Dependent Claims (56)
-
-
57. For use in a modular device adapted for communication with a host computing device, the modular device comprising a security module that is adapted to enable one or more security operations to be performed on data and a target module that is adapted to enable a defined interaction with the host computing device, a method comprising the steps of:
-
communicating with the host computing device to exchange data between the host computing device and the modular device; performing one or more security operations and the defined interaction on the exchanged data; mediating communication of the exchanged data between the host computing device and the modular device so that the exchanged data must first pass through the security module; and operably connecting the security module and/or the target module to the host computing device in response to an instruction from the host computing device.
-
-
58. For use in a modular device adapted for communication with a host computing device, the modular device comprising a security module that is adapted to enable one or more security operations to be performed on data and a target module that is adapted to enable a defined interaction with the host computing device, a method comprising the steps of:
-
receiving an instruction from a host computing device regarding operation of the modular device; and operably connecting the security module and/or the target module to the host computing device in response to the instruction from the host computing device.
-
Specification