Peripheral device with integrated security functionality
DC CAFCFirst Claim
1. A peripheral device, comprising:
- security means for enabling one or more security operations to be performed on data;
target means for enabling a defined interaction with a host computing device;
means for enabling communication between the security means and the target means;
means for enabling communication with a host computing device;
means for operably connecting the security means and/or the target means to the host computing device in response to an instruction from the host computing device; and
means for mediating communication of data between the host computing device and the target means so that the communicated data must first pass through the security means.
2 Assignments
Litigations
5 Petitions
Reexamination
Accused Products
Abstract
The invention enables a peripheral device to communicate with a host computing device to enable one or more security operations to be performed by the peripheral device on data stored within the host computing device, data provided from the host computing device to the peripheral device (which can then be, for example, stored in the peripheral device or transmitted to yet another device), or data retrieved by the host computing device from the peripheral device (e.g., data that has been stored in the peripheral device, transmitted to the peripheral device from another device or input to the peripheral device by a person). In particular, the peripheral device can be adapted to enable, in a single integral peripheral device, performance of one or more security operations on data, and a defined interaction with a host computing device that has not previously been integrated with security operations in a single integral device. The defined interactions can provide a variety of types of functionality (e.g., data storage, data communication, data input and output, user identification). The peripheral device can also be implemented so that the security operations are performed in-line, i.e., the security operations are performed between the communication of data to or from the host computing device and the performance of the defined interaction. Moreover, the peripheral device can be implemented so that the security functionality of the peripheral device is transparent to the host computing device.
-
Citations
39 Claims
-
1. A peripheral device, comprising:
-
security means for enabling one or more security operations to be performed on data; target means for enabling a defined interaction with a host computing device; means for enabling communication between the security means and the target means; means for enabling communication with a host computing device; means for operably connecting the security means and/or the target means to the host computing device in response to an instruction from the host computing device; and means for mediating communication of data between the host computing device and the target means so that the communicated data must first pass through the security means. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A peripheral device, comprising:
-
security means for enabling one or more security operations to be performed on data; target means for enabling a defined interaction with a host computing device; means for enabling communication between the security means and the target means, means for enabling communication with a host computing device; means for operably connecting the security means and/or the target means to the host computing device in response to an instruction from the host computing device; and means for providing to a host computing device, in response to a request from the host computing device for information regarding the type of the peripheral device, information regarding the function of the target means. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A peripheral device, comprising:
-
security means for enabling one or more security operations to be performed on data; target means for enabling a defined interaction with a host computing device; means for enabling communication between the security means and the target means; means for enabling communication with a host computing device; and means for mediating communication of data between the host computing device and the target means so that the communicated data must first pass through the security means. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A peripheral device, comprising:
-
security means for enabling one or more security operations to be performed on data; target means for enabling a defined interaction with a host computing device; means for enabling communication between the security means and the target means; means for enabling communication with a host computing device; means for mediating communication of data between the host computing device and the target means so that the communicated data must first pass through the security means; and means for providing to a host computing device, in response to a request from the host computing device for information regarding the type of the peripheral device, information regarding the function of the target means.
-
-
24. A peripheral device, comprising:
-
security means for enabling one or more security operations to be performed on data; target means for enabling a defined interaction with a host computing device; means for enabling communication between the security means and the target means; means for enabling communication with a host computing device; and means for providing to a host computing device, in response to a request from the host computing device for information regarding the type of the peripheral device, information regarding the function of the target. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A data security system, comprising:
-
a host computing device including one or more device interfaces adapted to enable communication with another device; a peripheral device, comprising; security means for enabling one or more security operations to be performed on data; target means for enabling a defined interaction with a host computing device; and means for enabling communication between the security means and the target means; means for enabling communication with a host computing device; and means for mediating communication of data between the host computing device and the target means so that the communicated data must first pass through the security means.
-
-
37. A data security system, comprising:
-
a host computing device including one or more device interfaces adapted to enable communication with another device; a peripheral device, comprising; security means for enabling one or more security operations to be performed on data; target means for enabling a defined interaction with a host computing device; and means for enabling communication between the security means and the target means; means for enabling communication with a host computing device; and means for providing to a host computing device, in response to a request from the host computing device for information regarding the type of the peripheral device, information regarding the function of the target means.
-
-
38. For use in a peripheral device adapted for communication with a host computing device, performance of one or more security operations on data, and interaction with a host computing device in a defined way, a method comprising the steps of:
-
receiving a request from a host computing device for information regarding the type of the peripheral device; and providing to the host computing device, in response to the request, information regarding the type of the defined interaction.
-
-
39. For use in a peripheral device adapted for communication with a host computing device, performance of one or more security operations on data, and interaction with a host computing device in a defined way, a method comprising the steps of:
-
communicating with the host computing device to exchange data between the host computing device and the peripheral device; performing one or more security operations and the defined interaction on the exchanged data; and mediating communication of the exchanged data between the host computing device and the peripheral device so that the exchanged data must first sass through means for performing the one or more security operations.
-
Specification