Removable cryptographic ignition key system and method
First Claim
1. A system for conducting secure operations utilizing a removable cryptographic ignition key (CIK), said system comprising:
- said removable CIK containing an embedded password;
a processor configured to insertably receive said removable CIK;
a proximity detector configured to determine if a distance between said removable CIK and said processor is within a predetermined distance through wireless communication between said processor and said removable CIK, said wireless communication not indicative of the password, wherein said system is configured to;
enable continuing secure operations subsequent to said processor receiving said removable CIK;
conduct continuous secure operations while said removable CIK is within said predetermined distance of said processor; and
disable continuing secure operations when a distance between said removable CIK and said processor is greater than said predetermined distance; and
said system is configured to enable continuing secure operations upon said removable CIK being inserted into and subsequently removed from said processor;
a manual disable portion configured to disable continuing secure operations regardless if a distance between said removable CIK and said processor is within said predetermined distance;
wherein said manual disable portion disables continuing secure operations by at least one of interrupting and disrupting a signal conveyed by the wireless communication between said removable CIK and said processor for determining if a distance between said CIK and said processor has exceeded said predetermined distance.
9 Assignments
0 Petitions
Accused Products
Abstract
A removable, wireless, cryptographic ignition key (CIK) provides a user the capability to conduct secure operations utilizing a processor as long as the CIK is within the vicinity of the processor. This removable CIK may be utilized in applications related to conducting secure operations on desktop computers, laptop computers, wireless telephones, handheld radios (e.g., military radios requiring secure communications), and personal digital assistants (PDAs). Secure operations are enabled upon insertion and removal of the CIK into/from the processor. If a predetermined proximity between the removable CIK and the processor is exceeded (e.g., the user leaves the room, the user puts the processor on a moving belt on an X-ray machine at the airport, the processor is stolen), secure operations are disabled. Secure operations may be resumed, upon the CIK being inserted and removed into/from the processor again.
22 Citations
3 Claims
-
1. A system for conducting secure operations utilizing a removable cryptographic ignition key (CIK), said system comprising:
-
said removable CIK containing an embedded password; a processor configured to insertably receive said removable CIK; a proximity detector configured to determine if a distance between said removable CIK and said processor is within a predetermined distance through wireless communication between said processor and said removable CIK, said wireless communication not indicative of the password, wherein said system is configured to; enable continuing secure operations subsequent to said processor receiving said removable CIK; conduct continuous secure operations while said removable CIK is within said predetermined distance of said processor; and disable continuing secure operations when a distance between said removable CIK and said processor is greater than said predetermined distance; and said system is configured to enable continuing secure operations upon said removable CIK being inserted into and subsequently removed from said processor; a manual disable portion configured to disable continuing secure operations regardless if a distance between said removable CIK and said processor is within said predetermined distance; wherein said manual disable portion disables continuing secure operations by at least one of interrupting and disrupting a signal conveyed by the wireless communication between said removable CIK and said processor for determining if a distance between said CIK and said processor has exceeded said predetermined distance. - View Dependent Claims (2)
-
-
3. A method for conducting secure operations utilizing a removable cryptographic ignition key (CIK) with an embedded password, a processor, and a proximity detector, said method comprising:
-
insertably receiving said removable CIK by said processor, wherein; continuing secure operations are enabled subsequent to receipt of said removable CIK by said processor; receiving a wireless communication from said removable CIK by said processor, wherein the wireless communication is not indicative of the password;
determining if a distance between said removable CIK and said processor is within a predetermined distance based on the wireless communication;enabling continuing secure operations while said removable CIK is within said predetermined distance of said processor; and disabling continuing secure operations when a distance between said removable CIK and said processor is greater than said predetermined distance; wherein continuing secure operations are enabled upon inserting said removable CIK into said processor and subsequently removing said CIK from said processor; wherein upon receipt of a manual disable signal, disabling continuing secure operations regardless if a distance between said removable CIK and said processor is within a predetermined distance; wherein disabling continuing secure operations upon receipt of a manual disable signal comprises at least one of interrupting and disrupting a signal conveyed by the wireless communication between said removable CIK and said processor for determining if a distance between said CIK and said processor has exceeded said predetermined distance.
-
Specification