System and method for securing data from a remote input device
First Claim
Patent Images
1. A method for secure handling of input data comprising:
- receiving the input data at a first integrated security module in an input device;
storing the input data within a security boundary of the first integrated security module;
establishing a secure communications channel on a short range communications link between the first integrated security module in the input device and a second integrated security module in a processing component by exchanging a temporary cryptographic key;
encrypting the input data within the first integrated security module using the temporary cryptographic key; and
transmitting the encrypted input data to the second integrated security module in the processing component over the secure communications channel.
5 Assignments
0 Petitions
Accused Products
Abstract
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.
-
Citations
32 Claims
-
1. A method for secure handling of input data comprising:
-
receiving the input data at a first integrated security module in an input device; storing the input data within a security boundary of the first integrated security module; establishing a secure communications channel on a short range communications link between the first integrated security module in the input device and a second integrated security module in a processing component by exchanging a temporary cryptographic key; encrypting the input data within the first integrated security module using the temporary cryptographic key; and transmitting the encrypted input data to the second integrated security module in the processing component over the secure communications channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 31, 32)
-
-
11. A secure data processing system comprising:
-
an input device including a first integrated security module configured to store input data within a security boundary of the first integrated security module; and a processing component, including a second integrated security module, coupled to the input device via a secure short range communications link established by exchanging a temporary cryptographic key with the input device, wherein the first integrated security module is configured to; encrypt the input data within the first integrated security module using the temporary cryptographic key, and transmit the encrypted input data to the second integrated security module over the secure short range communications link. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A secure data processing system comprising:
-
an input device, including a first integrated security module, configured to; receive input data, and store the input data within a security boundary of the first integrated security module of the input device, wherein the first integrated security module is configured to encrypt the input data within the first integrated security module using a temporary cryptographic key; and a transmitter configured to; establish, by exchanging the temporary cryptographic key with a processing component, a short range communications link with the processing component, and transmit the encrypted input data to the processing component. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method for secure handling of input data comprising:
-
receiving the input data at a first integrated security module in an input device; storing the input data within a security boundary of a first integrated security module of the input device; establishing, by exchanging a temporary cryptographic key with a processing component, a secure communications channel on a short range communications link between the first integrated security module in the input device and a second integrated security module in the processing component; encrypting the input data within the first integrated security module using the temporary cryptographic key; and transmitting the encrypted input data to the second integrated security module in the processing component over the secure communications channel, wherein the input device is bound to the processing component using input device identification information stored at the processing component during manufacturing of the processing component. - View Dependent Claims (29, 30)
-
Specification