EHF secure communication device
First Claim
1. A method for regulating access to information located in a secure location, the method comprising:
- determining, by an interface controller included in a computing device, whether a distance between a communication device and the computing device satisfies a threshold distance, the computing device included in an access control reader located at the secure location;
responsive to the distance between the communication device and the computing device satisfying the specified threshold distance;
establishing a communication channel between the communication device and the computing device, the communication channel enabling information exchange between the communication device and the computing device using extremely high frequency (EHF) signals,identifying, by the computing device, content stored in the communication device having at least one specified file attribute,copying, by the computing device, the identified content to a memory location accessible by the computing device included in the access control reader,decoding the identified content by the computing device using encryption information that is generated based on a calculated measure of time of flight of an EHF transmission between the communication device and the computing device; and
removing, by the computing device, the identified content from the communication device.
4 Assignments
0 Petitions
Accused Products
Abstract
A communication device employs a contactless secure communication interface to transmit and receive data with a computing device using close proximity extremely high frequency (EHF) communication. The communication device and the computing device periodically initiate a discovery operation mode, whereby the devices periodically transmit identifying information about the respective devices and listen for identifying information from the other device. Upon completion of the discovery mode operation, the devices enter a link-training operation mode and exchange capability information about the respective devices. During transport mode operation the communication device employs methods to manage access to data stored on the communication device by encrypting the data using one or a combination of training information or capability information as a basis for generating an encryption key.
-
Citations
19 Claims
-
1. A method for regulating access to information located in a secure location, the method comprising:
-
determining, by an interface controller included in a computing device, whether a distance between a communication device and the computing device satisfies a threshold distance, the computing device included in an access control reader located at the secure location; responsive to the distance between the communication device and the computing device satisfying the specified threshold distance; establishing a communication channel between the communication device and the computing device, the communication channel enabling information exchange between the communication device and the computing device using extremely high frequency (EHF) signals, identifying, by the computing device, content stored in the communication device having at least one specified file attribute, copying, by the computing device, the identified content to a memory location accessible by the computing device included in the access control reader, decoding the identified content by the computing device using encryption information that is generated based on a calculated measure of time of flight of an EHF transmission between the communication device and the computing device; and removing, by the computing device, the identified content from the communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 19)
-
-
9. A method for regulating access by a user to a secure location, the method comprising:
-
determining, by an interface controller included in a communication device, whether a distance between the communication device, associated with the user, and an access control device located at the secure location satisfies a threshold distance; responsive to the distance between the communication device and the access control device satisfying the threshold distance, the communication device and the access control device exchanging capability information describing functionality of the respective devices; authenticating, by the access control device, the user based at least in part on the capability information; and encoding content sent by the interface controller using encryption information generated based on a calculated measure of time of flight of an EHF transmission between the communication device and the access control device. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. An access control system comprising:
-
a computing device comprising; at least one transmitter configured to transmit data using close proximity extremely high frequency (EHF) electromagnetic energy to a communication device over a first transmission path, the communication device associated with a user; at least one receiver configured to receive data from the communication device over a second transmission path; an interface control circuit coupled to the at least one transmitter unit and the at least one receiver and configured to; determine whether a distance between the communication device and the computing device satisfies a threshold distance, and responsive to the distance between the communication device and the computing device satisfying the threshold distance, establish a communication channel between the communication device and the computing device, the communication channel enabling information exchange between the communication device and the computer device using EHF signals; and a device controller coupled to the interface control circuit and configured to; identify content stored on the communication device having at least one specified file attribute responsive to the distance between the communication device and the computing device satisfying the threshold distance, copy the identified content to a memory location accessible by the computing device, decode the identified content using encryption information generated based on a calculated measure of the time of flight of an EHF transmission between the communication device and the computing device, and remove the identified content from the communication device. - View Dependent Claims (16, 17, 18)
-
Specification