A new Apple patent (number 20120023597) for magnetically implemented security devices has appeared at the U.S. Patent & Trademark Office. It relates generally to programmable magnetic devices, and more particularly to security for computing devices and peripherals that may be provided by programmable magnets.
Security devices and methods of securely coupling electronic devices and peripherals are provided. In one embodiment, a peripheral has a first coded magnet on a first surface of a first device. The first coded magnet has at least two different polarity regions on the first surface. A second coded magnet on a second surface of a second device is also provided.
The first coded magnet is configured to securely provide data to a device associated with the second coded magnet, if the first and second coded magnets’ patterns are keyed to one another. The inventors are Brett Bilbrey, Aleskandar Pance, Peter Arnold, David I. Simon, Jean Lee, Michael D. Hillman, Gregory L. Tice, Vijay Iyer and Bradley Spare.
Here’s Apple’s background and summary of the invention: “Electronic devices are common in both home and work environments. Such devices often transmit data back and forth in order to operate or share information. In many cases, data transmission is unsecured or conventionally secured by methods that are easy to defeat. Physical security of certain items, such as computing devices, also may be desirable.
“Magnetic structures may aid in securing physical access. For example, magnetic doors may prevent ingress by unauthorized persons. However, magnetic security is rarely applied to securing data or functionality of an electronic device. Likewise, magnetic security is rarely used to authenticate data transmissions. Further, most magnetically-implemented security is very basic. In the door example, above, a door may be magnetically sealed but access is rarely granted through the application of magnetic principles. Rather, magnetism is used to provide the actual physical security by keeping the door closed.
“What is described herein are apparatuses, methods and systems for implementing various types of security through the use of correlated magnetic structures. Embodiments disclosed herein generally take the form of various magnetically-implemented security devices.
“One embodiment may take the form of a magnetically-implemented security device, comprising: a first correlated magnet formed on a first structure, the first correlated magnet comprising at least two unique magnetic surfaces; and a second correlated magnet formed on a second structure; the second correlated magnet authenticating the second structure with the first structure.
“Another embodiment takes the form of a method for securely accessing functionality of an electronic device, comprising: magnetically coupling a key to a magnetic surface of an interior element of the electronic device, the magnetic surface comprising a plurality of sub-regions, each of the plurality of sub-regions having its own magnetic characteristics; moving the key; in response to moving the key, magnetically manipulating the interior element; and, in response to magnetically manipulating the interior element, accessing the functionality.
“Still another embodiment takes the form of an apparatus for securely transmitting data to a computing device, comprising: a data receiver operable to receive data from a peripheral; a data transmitter operably connected to the data receiver and operable to transmit the data to the computing device; a magnetic structure associated with the data receiver, the magnetic structure operable to prevent the data receiver from receiving data unless the peripheral has a complementary magnetic structure.”