Self-encrypting module with embedded wireless user authentication

作者: Alex Lemelev , Lev M. Bolotin , Marc Singer

DOI:

关键词:

摘要: Methods, systems, and computer programs are presented for a self-encrypting device (SED) incorporated into host system. In one example, the system includes memory, processor, data channel in communication with memory SED. The SED comprises an authentication subsystem, storage subsystem that stores encrypted is encryption key provided by radio frequency (RF) transceiver, interface electrical contact channel. locked from sending receiving until unlocked user-authentication information received via RF transceiver.

参考文章(237)
Jeffrey Kenneth Emery, Melanie Barker, Sriram Darbha, Method and system for managing delayed user authentication ,(2005)
Brady Lee Rackley, Gregory Michael Rickman, Kyle Leighton Cochran, Warren Derek Porter, Methods and systems for providing a payment in a mobile environment ,(2006)
Mingchen Lo, Tien Nguyen, Duc Pham, Pu Zhang, Secure file system server architecture and methods ,(2003)
Yoshiro Seki, Kouichi Takene, Akira Sawada, Fuminori Kishino, Kimito Idemori, Koichi Ikeda, Keiji Yamamoto, Entry control system and entry control method ,(2007)
Yannis Labrou, Jonathan Russell Agre, Authentication services using mobile device ,(2006)
Brady Lee Rackley, Gregory Michael Rickman, Kyle Leighton Cochran, Warren Derek Porter, Methods and Systems For Real Time Account Balances in a Mobile Environment ,(2006)