Method and apparatus for secure information distribution
First Claim
1. An apparatus, comprising:
- a processor means;
a memory coupled to the processor, wherein the memory stores secure digital data;
a gesture-based input interface coupled to the processor means and configured to receive one or more commands, wherein to receive a command, the gesture-based input interface is configured to detect one or more physical gestures;
an output interface coupled to the processor means;
wherein the gesture-based input interface is configured to receive one or more commands, via one or more physical gestures, requesting access to the secure digital data stored in the memory;
wherein the processor means is configured to validate commands, received via the gesture-based input interface, requesting access to secure digital data stored in the memory; and
wherein the output interface is configured to provide secure digital data stored in the memory in response to a processor means validated command received via the gesture-based input interface requesting access to the secure digital data stored in the memory;
a mechanism configured to detect tampering with the apparatus or detect a self-destruct command, wherein the mechanism is further configured to permanently disable access to the secure digital data in the memory in response to the detection of tampering with the apparatus or in response to the detection of the self-destruct command; and
a proof-of-destruction component;
wherein the mechanism is further configured to prevent removal of the proof-of-destruction component until after access to the secure digital data in the memory has been permanently disabled.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for secure generation and distribution of digital encryption keys is disclosed. The system may also be used to protect and distribute other types of secure information, including digital, audio, video, or analog data, or physical objects. The system may include a tamper-respondent secure token device, which may be configured to destroy or disable access to the secure information contained therein in response to attempts to physically or electronically breach the device. Outputs may be provided in a secure manner through various interfaces without using electricity (wires) or electromagnetic radiation. Inputs may be provided in a secure manner, including through the use of a gesture-based input interface. Destruction or disablement of the device and/or its secure contents may be provided upon detection of tamper attempts or upon input of a self-destruct command. Proof of the destruction or disablement of the device or its contents may be provided.
-
Citations
12 Claims
-
1. An apparatus, comprising:
-
a processor means; a memory coupled to the processor, wherein the memory stores secure digital data; a gesture-based input interface coupled to the processor means and configured to receive one or more commands, wherein to receive a command, the gesture-based input interface is configured to detect one or more physical gestures; an output interface coupled to the processor means; wherein the gesture-based input interface is configured to receive one or more commands, via one or more physical gestures, requesting access to the secure digital data stored in the memory; wherein the processor means is configured to validate commands, received via the gesture-based input interface, requesting access to secure digital data stored in the memory; and wherein the output interface is configured to provide secure digital data stored in the memory in response to a processor means validated command received via the gesture-based input interface requesting access to the secure digital data stored in the memory; a mechanism configured to detect tampering with the apparatus or detect a self-destruct command, wherein the mechanism is further configured to permanently disable access to the secure digital data in the memory in response to the detection of tampering with the apparatus or in response to the detection of the self-destruct command; and a proof-of-destruction component; wherein the mechanism is further configured to prevent removal of the proof-of-destruction component until after access to the secure digital data in the memory has been permanently disabled. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification