Virtual self-destruction of stored information
First Claim
1. An apparatus comprising:
- a portable storage device capable of storing encrypted information;
a decryption apparatus coupled to said portable storage device;
a radio receiver responsive to a radio signal from a radio transmitter and configured to generate a key elimination signal based on a failure to receive said radio signal, wherein said failure to receive said radio signal is based on a proximity between said radio transmitter and said radio receiver, such that said radio transmitter must be continuously proximate to said radio receiver to prevent said key elimination signal from being generated and when said radio transmitter is greater than a predetermined distance from said radio receiver said key elimination signal is generated;
a storage circuit configured to store a plurality of decryption keys, wherein said plurality of decryption keys can be used to decrypt information stored on said portable storage device;
a key elimination circuit configured to trigger said storage circuit thereby causing the elimination of a first non-empty subset of said plurality of decryption keys, without eliminating a second non-empty subset of said plurality of decryption keys, wherein said key elimination circuit is responsive to said key elimination signal, such that the elimination of said a first non-empty subset of decryption keys is triggered by a physical movement between said radio transmitter and said radio receiver.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus are utilized to conveniently and swiftly render stored information inaccessible. Sensitive information is stored in an encrypted form and by eliminating the key or keys which are needed for decryption, the stored information becomes virtually destroyed. A variety of mechanisms and policies can be used to manage, set and eliminate decryption keys. In some cases decryption keys can be stored in volatile storage elements so that by merely interrupting power to the storage element, the decryption keys are eliminated. In this way, a manually controlled mechanism can be used to allow a user to accomplish a “self-destruct” of the stored information instantly without the need for the operation of any processor and without the need to change any stored information.
-
Citations
8 Claims
-
1. An apparatus comprising:
-
a portable storage device capable of storing encrypted information; a decryption apparatus coupled to said portable storage device; a radio receiver responsive to a radio signal from a radio transmitter and configured to generate a key elimination signal based on a failure to receive said radio signal, wherein said failure to receive said radio signal is based on a proximity between said radio transmitter and said radio receiver, such that said radio transmitter must be continuously proximate to said radio receiver to prevent said key elimination signal from being generated and when said radio transmitter is greater than a predetermined distance from said radio receiver said key elimination signal is generated; a storage circuit configured to store a plurality of decryption keys, wherein said plurality of decryption keys can be used to decrypt information stored on said portable storage device; a key elimination circuit configured to trigger said storage circuit thereby causing the elimination of a first non-empty subset of said plurality of decryption keys, without eliminating a second non-empty subset of said plurality of decryption keys, wherein said key elimination circuit is responsive to said key elimination signal, such that the elimination of said a first non-empty subset of decryption keys is triggered by a physical movement between said radio transmitter and said radio receiver. - View Dependent Claims (2, 3, 4)
-
-
5. A method of protecting stored information comprising the steps of:
-
storing a plurality of decryption keys in a storage circuit; receiving encrypted information from a portable storage device; decrypting said encrypted information to generate decrypted information using at least one of said plurality of decryption keys; delivering said decrypted information to a host device; operating a radio receiver configured to receive a radio signal from a radio transmitter and generating a key elimination signal if a signal is not received from said radio transmitter, wherein receipt of said radio signal is based on a proximity between said radio transmitter and said radio receiver, such that said radio transmitter must be continuously proximate to said radio receiver to prevent said key elimination signal from being generated and when said radio transmitter is greater than a predetermined distance from said radio receiver said key elimination signal is generated; eliminating a first non-empty subset of said plurality of decryption keys, without eliminating a second non-empty subset of said plurality of decryption keys if said key elimination signal is generated, such that the elimination of said a first non-empty subset of decryption keys is triggered by a physical movement between said radio transmitter and said radio receiver. - View Dependent Claims (6, 7, 8)
-
Specification