Secure storage device for transfer of data
First Claim
Patent Images
1. A method of securing data comprising:
- receiving, by a secure storage device, unsecure data from a source, the secure storage device removably attached to the source; and
securing the unsecure data within the secure storage device by performing digital processing related to the unsecure data to create secure data, wherein the secure storage device is responsive to the same protocol as an unsecure storage device and as a result the secure storage device is transparent to the source, wherein the source responds to the secure storage device as if it were an unsecure storage device.
5 Assignments
0 Petitions
Accused Products
Abstract
Described herein are methods and devices of securing data. For example, a method of securing data comprises receiving, by a secure storage device, unsecure data from a source. The secure storage device is removably attached to the source. The method further comprises securing the unsecure data within the secure storage device by performing digital processing related to the unsecure data to create secure data. The secure storage device is responsive to the same protocol as an unsecure storage device and as a result the secure storage device is transparent to the source. The source responds to the secure storage device as if it were an unsecure storage device.
42 Citations
24 Claims
-
1. A method of securing data comprising:
-
receiving, by a secure storage device, unsecure data from a source, the secure storage device removably attached to the source; and securing the unsecure data within the secure storage device by performing digital processing related to the unsecure data to create secure data, wherein the secure storage device is responsive to the same protocol as an unsecure storage device and as a result the secure storage device is transparent to the source, wherein the source responds to the secure storage device as if it were an unsecure storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of securing data comprising:
-
receiving, on a security device, unsecure data from a source through an input means, the security device having an output means for connecting to a destination and being removably attached to the source; securing the unsecure data within the security device to create secure data; and transferring the secure data from the security device through the output means to the destination, wherein a transmission protocol for the downloading receiving is a same protocol as used in standard communication to and from the source and as a result the security device is transparent to the source and the computer, whereby the computer and the source respond to the security device as if it were an unsecure device. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A secure storage device comprising:
-
a transceiver for receiving, by a secure storage device, unsecure data from a source, the secure storage device removably attached to the source; and a security engine for securing the unsecure data within the secure storage device by performing digital processing related to the unsecure data to create secure data, wherein the secure storage device is responsive to the same protocol as an unsecure storage device and as a result the secure storage device is transparent to the source, wherein the source responds to the secure storage device as if it were an unsecure storage device.
-
Specification