US 6,088,802 A
Peripheral device with integrated security functionality
Log In
Please sign up or log in to access the advanced features of
Ex Parte Enterprise.

General

US 6,088,802 A
Peripheral device with integrated security functionality
Tech Center:
2100 Computer Architecture and Software
Examiner:
Ly V. Hua
Art Unit:
2187 Computer Architecture and I/O
Agent:
Law Office of Robert Rose
Inventors:
WILLIAM P. BIALICK; MARK J. SUTHERLAND; JANET L. DOLPHIN-PETERSON; THOMAS K. ROWLAND; KIRK W. SKEBA; RUSSELL D. HOUSLEY
Priority:
06/04/97
Filed:
06/04/97
Granted:
07/11/00
Expiration:
06/04/17
Abstract
The invention enables a peripheral device to communicate with a host computing device to enable one or more security operations to be performed by the peripheral device on data stored within the host computing device, data provided from the host computing device to the peripheral device (which can then be, for example, stored in the peripheral device or transmitted to yet another device), or data retrieved by the host computing device from the peripheral device (e.g., data that has been stored in the peripheral device, transmitted to the peripheral device from another device or input to the peripheral device by a person). In particular, the peripheral device can be adapted to enable, in a single integral peripheral device, performance of one or more security operations on data, and a defined interaction with a host computing device that has not previously been integrated with security operations in a single integral device. The defined interactions can provide a variety of types of functionality (e.g., data storage, data communication, data input and output, user identification). The peripheral device can also be implemented so that the security operations are performed in-line, i.e., the security operations are performed between the communication of data to or from the host computing device and the performance of the defined interaction. Moreover, the peripheral device can be implemented so that the security functionality of the peripheral device is transparent to the host computing device.

Analytics

Cases

Patent Assignments

Citations