Methods and systems for supplying encryption keys
First Claim
Patent Images
1. A method of encrypting information, comprising:
- generating a first collection and a second collection of encryption bits in a key supply device;
supplying said first collection of encryption bits to a key storage module;
storing said first collection of encryption bits in a memory of said key storage module;
transporting said key storage module to a data production device;
connecting said key storage module to said data production device;
supplying said first collection of encryption bits from said module to said data production device;
deleting said first collection of encryption bits from said memory of said key storage module; and
encrypting data produced by said data production device using said first collection of encryption bits.
11 Assignments
0 Petitions
Accused Products
Abstract
A system encrypts information. The system includes a key storage module (135) configured to store encryption bits in a memory of the key storage module. The system further includes a communication device (105) configured to retrieve a quantity of encryption bits from the memory of the key storage module. The retrieval depletes a total amount of encryption bits stored in the key storage module. The communication device is further configured to encrypt data transmitted from the communication device using the quantity of retrieved encryption bits.
56 Citations
17 Claims
-
1. A method of encrypting information, comprising:
-
generating a first collection and a second collection of encryption bits in a key supply device; supplying said first collection of encryption bits to a key storage module; storing said first collection of encryption bits in a memory of said key storage module; transporting said key storage module to a data production device; connecting said key storage module to said data production device; supplying said first collection of encryption bits from said module to said data production device; deleting said first collection of encryption bits from said memory of said key storage module; and encrypting data produced by said data production device using said first collection of encryption bits. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of encrypting information, comprising:
-
receiving a fixed quantity of encryption bits within a key storage module; retrieving a quantity of encryption bits from a memory of the key storage module connected to a port of a communication device, wherein said retrieval depletes a total amount of encryption bits stored in the key storage module; determining whether said retrieval depletes said stored encryption bits below a predetermined amount; and encrypting data transmitted from said communication device using said quantity of encryption bits. - View Dependent Claims (9, 10)
-
-
11. A system for encrypting information, comprising:
-
a key storage module configured to; store a fixed quantity of encryption bits in a memory of said key storage module; and a communication device configured to; retrieve a quantity of encryption bits from said memory of said key storage module, wherein said retrieval depletes from the fixed quantity of encryption bits stored in the key storage module, and encrypt data transmitted from said communication device using said quantity of encryption bits; wherein said key storage module is further configured to;
determine whether said retrieval depletes said stored encryption bits below a specified amount. - View Dependent Claims (12, 13)
-
-
14. A computer-readable medium containing instructions for controlling at least one processor to perform a method of encrypting information at a communication device, the method comprising:
-
retrieving a quantity of encryption bits from a memory of a key storage module connected to a port of said communication device, wherein said retrieval depletes a total amount of encryption bits stored in the key storage module, determining whether said retrieval depletes said stored encryption bits below a predetermined amount, and encrypting data transmitted from said communication device using said quantity of encryption bits.
-
-
15. A method of encrypting information, comprising:
-
generating a first collection and a second collection of encryption bits in a key supply device; supplying said first collection of encryption bits to a key storage module; storing said first collection of encryption bits in a memory of said key storage module; transporting said key storage module to a data production device; connecting said key storage module to said data production device; supplying said first collection of encryption bits from said module to said data production device; deleting said first collection of encryption bits from said memory of said key storage module; encrypting data produced by said data production device using said first collection of encryption bits; transporting said key storage module to said key supply device; connecting said key storage module to said key supply device; supplying said second collection of encryption bits from said key supply device to said key storage module; storing said second collection of encryption bits in the memory of the key storage module; transporting said key storage module to the data production device; connecting said key storage module to the data production device; supplying the second collection of encryption bits from said module to said data production device; deleting said second collection of encryption bits from the memory of said key storage module; and encrypting data produced by said data production device using said second collection of encryption bits.
-
-
16. A method of encrypting information, comprising:
-
retrieving a quantity of encryption bits from a memory of a key storage module connected to a port of a communication device, wherein said retrieval depletes a total amount of encryption bits stored in the key storage module; encrypting data transmitted from said communication device using said quantity of encryption bits; determining whether said retrieval depletes said stored encryption bits below a predetermined amount; receiving a second quantity of encryption bits from a key supply device based on said determination; and storing said second quantity of encryption bits in said memory of said key storage module, wherein said second quantity of encryption bits replenishes a total amount of encryption bits stored in said key storage module.
-
-
17. A system for encrypting information, comprising:
-
a key storage module configured to; store encryption bits in a memory of said key storage module; and a communication device configured to; retrieve a quantity of encryption bits from said memory of said key storage module, wherein said retrieval depletes a total amount of encryption bits stored in the key storage module, and encrypt data transmitted from said communication device using said quantity of encryption bits; wherein said key storage module is further configured to; determine whether said retrieval depletes said stored encryption bits below a specified amount, receive a second quantity of encryption bits from a key supply device based on said determination, and store said second quantity of encryption bits in said memory, wherein said second quantity of encryption bits replenishes a total amount of encryption bits stored in said key storage module.
-
Specification