Method and apparatus for prevention of tampering and unauthorized use, and unauthorized extraction of information from secured devices
First Claim
1. An apparatus for prevention of tampering, unauthorized use, and unauthorized extraction of information from at least one secure system, comprising:
- at least one information device arranged to communicate, assemble, control, process, or store information;
at least one integrated encryption segment associated with at least one encryption device and arranged to encrypt the information using at least one encryption process enabled by at least one predetermined set of encryption key information incorporated in at least one information containing region of at least one secure information storage of the at least one information device; and
at least one destruction driver arranged to deliver energy through at least one destruction conduit to at least one destruction device sufficient to initiate and support at least one controllable energy release in the at least one destruction device, the at least one destruction device positioned in a proximity of the at least one information containing region of the at least one secure information storage of the at least one information device and arranged to localize the at least one controllable energy release in a proximity of the at least one predetermined set of encryption key information, such that at least a fraction of the at least one predetermined set of encryption key information and at least a fraction of the at least one information containing region have been unrecoverably obliterated during the controllable energy release;
wherein the obliterated fraction of the at least one predetermined set of encryption key information has been preselected to include a functional segment of encrypting key information necessary for decoding of the at least one information device communicated, assembled, controlled, processed, or stored information.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention considers an apparatus for prevention of tampering, unauthorized use, and unauthorized extraction of information from at least one secure system including at least one information device arranged to process information, at least one integrated encryption segment arranged to encrypt the information using at least one encryption process enabled by a set of encryption key information incorporated in at least one secure information storage of the at least one information device, at least one destruction driver arranged to initiate and support at least one controllable energy release in a proximity of the at least one secure information storage of the at least one information device incorporating the set of encryption key information, such that at least fraction of the set of encryption key information has been obliterated during the controllable energy discharge.
26 Citations
26 Claims
-
1. An apparatus for prevention of tampering, unauthorized use, and unauthorized extraction of information from at least one secure system, comprising:
-
at least one information device arranged to communicate, assemble, control, process, or store information; at least one integrated encryption segment associated with at least one encryption device and arranged to encrypt the information using at least one encryption process enabled by at least one predetermined set of encryption key information incorporated in at least one information containing region of at least one secure information storage of the at least one information device; and at least one destruction driver arranged to deliver energy through at least one destruction conduit to at least one destruction device sufficient to initiate and support at least one controllable energy release in the at least one destruction device, the at least one destruction device positioned in a proximity of the at least one information containing region of the at least one secure information storage of the at least one information device and arranged to localize the at least one controllable energy release in a proximity of the at least one predetermined set of encryption key information, such that at least a fraction of the at least one predetermined set of encryption key information and at least a fraction of the at least one information containing region have been unrecoverably obliterated during the controllable energy release; wherein the obliterated fraction of the at least one predetermined set of encryption key information has been preselected to include a functional segment of encrypting key information necessary for decoding of the at least one information device communicated, assembled, controlled, processed, or stored information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. An apparatus for prevention of tampering, unauthorized use, and unauthorized extraction of information from at least one distributed secure system, comprising:
-
at least one processing subsystem, wherein the at least one processing subsystem includes; at least one information device arranged to communicate, assemble, control, process, or store information; and at least one destruction driver arranged to deliver energy through at least one destruction conduit sufficient to initiate and support at least one controllable energy release; and at least one security module, wherein the at least one security module includes; at least another information device arranged to encrypt the information using at least one encryption process enabled by a set of encryption key information stored in at least one information containing region; and at least one destruction device associated with the at least one destruction driver incorporated in the at least one processing subsystem via the at least one destruction conduit, the at least one destruction device positioned in a proximity of the at least one information containing region of the at least another information device and arranged to localize the at least one controllable energy release in a proximity of the set of encryption key information, such that at least a fraction of the set of encryption key information and at least a fraction of the at least one information containing region have been unrecoverably obliterated during the at least one controllable energy release; wherein the obliterated fraction of the set of encryption key information has been preselected to include a functional segment of encrypting key information necessary for decoding of the at least one information device communicated, assembled, controlled, processed, or stored information. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
-
23. A subsystem for prevention of tampering, unauthorized use, and unauthorized extraction of information from at least one secure system, comprising:
-
at least one information device arranged to communicate, assemble, control, process, or store information; at least one integrated encryption segment associated with the at least one information device and arranged to encrypt the information using at least one encryption process enabled by a set of encryption key information incorporated in at least one secure information storage of the at least one information device having at least one information containing region; and at least one mechanical destruction driver attached to at least one mechanical destruction conduit arranged to substantially utilize direct work of at least one mechanical force applicable to initiate and support at least one controllable energy release in a proximity of the at least one secure information storage of the at least one information device incorporating the set of encryption key information, such that at least a fraction of the set of encryption key information and at least a fraction of the at least one information containing region have been unrecoverably obliterated during the at least one controllable energy release; wherein the at least one mechanical destruction driver initiating and supporting the at least one controllable energy release has been actuated by actions of the at least one mechanical force as initiated, controlled, and driven by actions of at least one external participant. - View Dependent Claims (24, 25, 26)
-
Specification