Small form-factor cryptographic expansion device
First Claim
1. A label comprising:
- a top electrical contact plate on top of the label for interfacing to a communication device;
a bottom electrical contact plate on bottom of the label for interfacing to a communication component;
a substrate disposed between the top electrical contact plate and the bottom electrical contact plate; and
a hardware security module embedded within the substrate and disposed entirely between a top planar area spanned by the top electrical contact plate and a bottom planar area spanned by the bottom electrical contact plate, wherein the hardware security module is coupled to the top and bottom electrical contact plates, and includes a secure processing unit and a public processing unit,wherein the public processing unit includes a communication device interface coupled to the top electrical contact plate, and a communication component interface coupled to the bottom electrical contact plate, andwherein the public processing unit is configured to process messages received at the communication device interface and the communication component interface, and to send, to the secure processing unit, requests to perform cryptographic operations in response to receiving messages on the communication device interface that are associated with secure operations.
1 Assignment
0 Petitions
Accused Products
Abstract
A cryptographic expansion device that can be attached to a communication component of a communication device to enable the communication device to perform cryptographic operations on communications sent to and from the communication device is described. The cryptographic expansion device can be a small-form factor cryptographic expansion device that can be used with a small-form factor communication component such as a micro-SIM (subscriber identity module) card. When used with a communication device, the cryptographic expansion device enables the communication device to send and received end-to-end secure encrypted communications. The end-to-end secure communications enabled by the cryptographic expansion device can be utilized by a user of the communication device to perform financial and/or banking transactions.
-
Citations
20 Claims
-
1. A label comprising:
-
a top electrical contact plate on top of the label for interfacing to a communication device; a bottom electrical contact plate on bottom of the label for interfacing to a communication component; a substrate disposed between the top electrical contact plate and the bottom electrical contact plate; and a hardware security module embedded within the substrate and disposed entirely between a top planar area spanned by the top electrical contact plate and a bottom planar area spanned by the bottom electrical contact plate, wherein the hardware security module is coupled to the top and bottom electrical contact plates, and includes a secure processing unit and a public processing unit, wherein the public processing unit includes a communication device interface coupled to the top electrical contact plate, and a communication component interface coupled to the bottom electrical contact plate, and wherein the public processing unit is configured to process messages received at the communication device interface and the communication component interface, and to send, to the secure processing unit, requests to perform cryptographic operations in response to receiving messages on the communication device interface that are associated with secure operations. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
a communication component; and a label attached to the communication component, the label comprising; a top electrical contact plate on top of the label; a bottom electrical contact plate on bottom of the label and electrically coupled to the communication component; a cryptoprocessor embedded in the label between the top and bottom electrical contact plates; and a processor coupled to the cryptoprocessor and embedded in the label between the top and bottom electrical contact plates, wherein the processor includes a communication device interface coupled to the top electrical contact plate, and a communication component interface coupled to the bottom electrical contact plate, wherein the cryptoprocessor and the processor are disposed entirely between a top planar area spanned by the top electrical contact plate and a bottom planar area spanned by the bottom electrical contact plate, wherein the label enables a communication device using the communication component to send encrypted data using the cryptoprocessor in the label, and wherein the processor is configured to process messages received at the communication device interface and the communication component interface, and to send, to the cryptoprocessor, requests to perform cryptographic operations in response to receiving messages on the communication device interface that are associated with secure operations. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for enabling transmission of secure communications from a communication device using a label having a first and second electrical contact plates respectively on top and bottom of the label, wherein the label is attached to a communication component of the communication device via the second electrical contact plate, the method comprising:
-
receiving, at the label, a first message; determining that the first message is associated with a secure operation; performing, by a cryptographic processor embedded in the label between the first and second electrical contact plates, a cryptographic operation on data associated with the secure operation; and sending the data processed by the cryptographic processor from the label to the communication device via the first electrical contact plate for transmission in a secure communication, wherein the cryptographic processor is disposed entirely between a first planar area spanned by the first electrical contact plate and a second planar area spanned by the second electrical contact plate, and wherein the cryptographic operation is performed in response to an encryption or decryption request sent to the cryptographic processor from a public processor disposed in the label. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification