Method of Operating Ephemeral Peripheral Device
First Claim
Patent Images
1. A method of implementing a secure communications device comprising:
- receiving data at a first communications device from a second communications device;
designating said received data as ephemeral data to be treated in accordance with a set of ephemeral parameters by said first communications device;
in response to said designating, storing said ephemeral data in an ephemeral memory device that is coupled to but separate from said first communications device;
wherein said ephemeral data from said second communications device is not stored in any non-ephemeral non-volatile memory circuit of the first communications device;
automatically erasing said ephemeral data from the second communications device based on said set of ephemeral parameters, including in response to one of;
a) a read access;
b) a time expiration;
c) a predetermined event relating to said ephemeral memory device;
wherein said automatically erasing effectuates an ephemeral treatment of said data by irreversibly destroying said data at a physical level such that it cannot be read again.
1 Assignment
0 Petitions
Accused Products
Abstract
An ephemeral system includes an ephemeral communications device and associated ephemeral memory system (onboard or peripheral) for securing user data. Different secure operating modes are provided for customizing user security requirements across end-to-end communications links, including in exchanges of electronic data between smartphone devices.
14 Citations
5 Claims
-
1. A method of implementing a secure communications device comprising:
-
receiving data at a first communications device from a second communications device; designating said received data as ephemeral data to be treated in accordance with a set of ephemeral parameters by said first communications device; in response to said designating, storing said ephemeral data in an ephemeral memory device that is coupled to but separate from said first communications device; wherein said ephemeral data from said second communications device is not stored in any non-ephemeral non-volatile memory circuit of the first communications device; automatically erasing said ephemeral data from the second communications device based on said set of ephemeral parameters, including in response to one of;
a) a read access;
b) a time expiration;
c) a predetermined event relating to said ephemeral memory device;wherein said automatically erasing effectuates an ephemeral treatment of said data by irreversibly destroying said data at a physical level such that it cannot be read again. - View Dependent Claims (2, 3, 4)
-
-
5. A method of implementing a secure communications channel comprising:
-
receiving a request at a first wireless communications device for a secure wireless data session with a second communications device; in response to said request, establishing a connection to said second communications device during which any wireless data received by said first device is treated by such device as ephemeral data in accordance with a set of ephemeral parameters specified for such data; processing said ephemeral data and storing it in an ephemeral memory device that is coupled to but separate from said first communications device; wherein said ephemeral data from said second communications device is not stored in any non-ephemeral non-volatile memory circuit of the first communications device; automatically erasing said ephemeral data from the second communications device based on said set of ephemeral parameters, including in response to one of;
a) a read access;
b) a time expiration;
c) a predetermined event relating to said ephemeral memory device;wherein said automatically erasing effectuates an ephemeral treatment of said data by irreversibly destroying said data at a physical level such that it cannot be read again; processing any transmitted data by said first communications device as ephemeral data such that it is also not stored in any non-volatile memory circuit of the first communications device; wherein said set of ephemeral parameters further operate to effectuate an end-to-end ephemeral channel, by specifying and controlling data treatment by any intermediary processing systems between the first wireless communications device and said second communications device such that none of such intermediary processing systems store such ephemeral data in a non-volatile memory or storage.
-
Specification