Movatterモバイル変換


[0]ホーム

URL:


US20150350172A1 - Encryption on computing device - Google Patents

Encryption on computing device
Download PDF

Info

Publication number
US20150350172A1
US20150350172A1US14/822,269US201514822269AUS2015350172A1US 20150350172 A1US20150350172 A1US 20150350172A1US 201514822269 AUS201514822269 AUS 201514822269AUS 2015350172 A1US2015350172 A1US 2015350172A1
Authority
US
United States
Prior art keywords
user
component
cryptographic key
computing device
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/822,269
Inventor
Rafiq Kiswani
Sufyan Almajali
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DATA GUARD SOLUTIONS Inc
Original Assignee
DATA GUARD SOLUTIONS Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DATA GUARD SOLUTIONS IncfiledCriticalDATA GUARD SOLUTIONS Inc
Priority to US14/822,269priorityCriticalpatent/US20150350172A1/en
Publication of US20150350172A1publicationCriticalpatent/US20150350172A1/en
Priority to US15/710,186prioritypatent/US20180026953A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A first component of a cryptographic key is received from a user via a user interface of a user computing device. A second component of the cryptographic key is received via a short-range communication interface that communicatively couples the user computing device to a physically separate storage device. The cryptographic key is generated based at least on the first component and the second component. The cryptographic key is then used to encrypt and/or decrypt data.

Description

Claims (20)

What is claimed is:
1. A method for generating cryptographic keys for encrypting and decrypting data, the method comprising:
receiving, by one or more processors, a first component of a cryptographic key from a user via a user interface of a user computing device;
receiving, by the one or more processors, a second component of the cryptographic key via a short-range communication interface that communicatively couples the user computing device to a physically separate storage device;
generating, by the one or more processors, the cryptographic key based at least on the first component and the second component; and
using the cryptographic key to encrypt and/or decrypt data, by the one or more processors.
2. The method ofclaim 1, wherein using the cryptographic key to encrypt and/or decrypt the data includes:
storing the generated cryptographic key in a volatile memory of the user computing device during an active session,
automatically encrypting and/or decrypting data accessed by the user during the active session, by the one or more processors, and
deleting the cryptographic key from the volatile memory when the active session completes.
3. The method ofclaim 2, further comprising:
verifying the cryptographic key using control data stored on the storage device, wherein the generated cryptographic key is stored in the volatile memory only in response to the cryptographic key having been successfully verified.
4. The method ofclaim 3, wherein the control data includes first control data and second control data, and wherein verifying the cryptographic key includes:
retrieving the first control data from the storage device,
applying the cryptographic key to the first control data to generate an encryption/decryption result, and
comparing the encryption/decryption result to the second control data, wherein the cryptographic key is successfully verified when the encryption/decryption result matches the second control data.
5. The method ofclaim 2, further comprising completing the active session in response to detecting that the storage device has been removed.
6. The method ofclaim 2, further comprising completing the active session in response to detecting that the user logged off.
7. The method ofclaim 1, wherein using the cryptographic key to encrypt and/or decrypt the data includes automatically applying, by the one or more processors, the cryptographic key to files stored in a persistent memory of the user computing device, which the user accesses during an active session, without prompting the user.
8. The method ofclaim 7, wherein applying the cryptographic key to the files stored in a persistent memory of the user computing device including executing a task in a kernel mode on the user computing device.
9. The method ofclaim 1, further comprising, prior to receiving the second component via the short-range communication interface:
receiving, by the one or more processors, the second component of the cryptographic key via a long-range communication interface from a network server;
causing, by the one or more processors, the second component of the cryptographic key to be stored in the storage device.
10. The method ofclaim 8, further comprising:
providing, by the one or more processors, an interactive menu for receiving registration data from a user; and
sending the registration data to the network server via the long-range communication interface, wherein the second component of the cryptographic key is received from the network server in response to the registration data.
11. The method ofclaim 1, wherein the user computing device has a port to removeably couple the user computing device to a peripheral storage device, wherein the second component of the cryptographic key is received via the port from the peripheral storage device.
12. The method ofclaim 1, wherein generating the cryptographic key includes appending, by the one or more processors, one of the first and the second component of the cryptographic key to the other one of the first and the second component of the cryptographic key.
13. A network server comprising:
a communication interface to communicatively couple the network server to a user computing device via a communication network; and
processing hardware configured to:
receive a request for a cryptographic key from the user computing device, wherein the request includes a first component of the cryptographic key, the first component having been specified by a user of the user computing device,
in response to the request, automatically generate a second component of the cryptographic key, and
provide the second component of the cryptographic key to the user device for storage on a storage device physically separate from the user computing device,
wherein the user computing device is configured to (i) generate the cryptographic key based at least on the first component and the second component of the cryptographic key and (ii) encrypt and/or decrypt user-selected data using the cryptographic key.
14. The network server ofclaim 13, further comprising:
a computer-readable storage in which a database is implemented;
wherein the processing hardware is further configured to:
receive registration data for the user from the user computing device, and
store the registration data, the first component of the cryptographic key, and the second component of the cryptographic key in the database.
15. The network server ofclaim 14, wherein the processing hardware is further configured to reset the cryptographic key in response to a user request, including generate a new second component of the cryptographic key.
16. The network server ofclaim 13, wherein the processing hardware is further configured to:
generate the cryptographic key based on the first component and the second component,
generate first control data,
apply the cryptographic key to the first control data to generate second control data, and
provide the first control data and the second control data to the user device for storage on the storage device,
wherein the user computing device is configured to verify user input of the first component of the cryptographic key using the first control data, the second control data, and the second component of the cryptographic key.
17. The network server ofclaim 16, wherein the processing hardware is configured to generate the first control data randomly.
18. A method in a user computing device for efficiently encrypting and/or decrypting data, the method comprising:
receiving, by one or more processors, an indication that a storage device physically separate from the user computing device is now communicatively coupled to the user computing device via a short-range communication interface;
receiving, by the one or more processors, a first component of a cryptographic key from a user via a user interface;
retrieving, from the storage device, (i) a second component of the cryptographic key, (ii) first control data, and (iii) second control data corresponding to the first control data encrypted using a correct version of the cryptographic key;
generating the cryptographic key based at least on the first component and the second component; and
determining whether the generated cryptographic key is correct using the first control data and the second control data.
19. The method ofclaim 18, further comprising:
receiving, by the one or more processors, the second component of the cryptographic key, the first control data, and second control data from a network server via a communication network; and
storing the second component of the cryptographic key, the first control data, and second control data in the storage device.
20. The method ofclaim 19, wherein receiving the second component of the cryptographic key, the first control data, and second control data from the network server includes is in response to a user requesting that a new cryptographic key be generated.
US14/822,2692014-05-072015-08-10Encryption on computing deviceAbandonedUS20150350172A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US14/822,269US20150350172A1 (en)2014-05-072015-08-10Encryption on computing device
US15/710,186US20180026953A1 (en)2014-05-072017-09-20Encryption on computing device

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US14/271,883US9104889B1 (en)2014-05-072014-05-07Encryption on computing device
US14/822,269US20150350172A1 (en)2014-05-072015-08-10Encryption on computing device

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/271,883ContinuationUS9104889B1 (en)2014-05-072014-05-07Encryption on computing device

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/710,186ContinuationUS20180026953A1 (en)2014-05-072017-09-20Encryption on computing device

Publications (1)

Publication NumberPublication Date
US20150350172A1true US20150350172A1 (en)2015-12-03

Family

ID=53763288

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US14/271,883Expired - Fee RelatedUS9104889B1 (en)2014-05-072014-05-07Encryption on computing device
US14/822,269AbandonedUS20150350172A1 (en)2014-05-072015-08-10Encryption on computing device
US15/710,186AbandonedUS20180026953A1 (en)2014-05-072017-09-20Encryption on computing device

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US14/271,883Expired - Fee RelatedUS9104889B1 (en)2014-05-072014-05-07Encryption on computing device

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US15/710,186AbandonedUS20180026953A1 (en)2014-05-072017-09-20Encryption on computing device

Country Status (1)

CountryLink
US (3)US9104889B1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2018080677A1 (en)*2016-10-262018-05-03Intel CorporationProviding secure data transmission over a universal serial bus (usb) interface
US10325109B2 (en)*2017-09-142019-06-18International Business Machines CorporationAutomatic and dynamic selection of cryptographic modules for different security contexts within a computer network

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9705857B1 (en)*2014-10-102017-07-11Sprint Spectrum L.P.Securely outputting a security key stored in a UE
WO2016141400A1 (en)*2015-03-102016-09-15Sniip (Australia) Pty LtdMethod and system of conducting a transaction
US10198595B2 (en)*2015-12-222019-02-05Walmart Apollo, LlcData breach detection system
IL244557A0 (en)*2016-03-132016-07-31Cyber Sepio Systems LtdA system and method for protecting a computer system from usb related vulnerabilities e.g.cyber attacks
US10154037B2 (en)*2017-03-222018-12-11Oracle International CorporationTechniques for implementing a data storage device as a security device for managing access to resources
WO2019030748A1 (en)2017-08-032019-02-14Cyber Sepio Systems LtdSystem and method for securing a computer system from threats introduced by usb devices
IL254573A0 (en)2017-09-182017-11-30Cyber Sepio Systems LtdSystem method and computer program product for securing a local area network from threats introduced by rogue or malicious devices
EP3629204B1 (en)*2018-09-282021-02-24BlackBerry LimitedProcessing data on an electronic device
US10897351B1 (en)*2020-07-022021-01-19Slack Technologies, Inc.Encryption key management for an automated workflow
US20220122195A1 (en)*2020-10-162022-04-21PF IP Holdings Inc.Method, system, and medium for social media content monitoring
NL2027136B1 (en)*2020-12-172022-07-11Mindyourpass Holding B VPassword management system, device and method of the same

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050195975A1 (en)*2003-01-212005-09-08Kevin KawakitaDigital media distribution cryptography using media ticket smart cards
US20060177061A1 (en)*2004-10-252006-08-10Orsini Rick LSecure data parser method and system
US20060282681A1 (en)*2005-05-272006-12-14Scheidt Edward MCryptographic configuration control
US20070067828A1 (en)*2005-08-112007-03-22Msystems Ltd.Extended one-time password method and apparatus
US20110040971A1 (en)*2008-04-212011-02-17Anantharaman LakshminarayananPortable system and method for remotely accessing data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050195975A1 (en)*2003-01-212005-09-08Kevin KawakitaDigital media distribution cryptography using media ticket smart cards
US20060177061A1 (en)*2004-10-252006-08-10Orsini Rick LSecure data parser method and system
US20060282681A1 (en)*2005-05-272006-12-14Scheidt Edward MCryptographic configuration control
US20070067828A1 (en)*2005-08-112007-03-22Msystems Ltd.Extended one-time password method and apparatus
US20110040971A1 (en)*2008-04-212011-02-17Anantharaman LakshminarayananPortable system and method for remotely accessing data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2018080677A1 (en)*2016-10-262018-05-03Intel CorporationProviding secure data transmission over a universal serial bus (usb) interface
US10715501B2 (en)2016-10-262020-07-14Intel CorporationProviding secure data transmission over a universal serial bus (USB) interface
US10325109B2 (en)*2017-09-142019-06-18International Business Machines CorporationAutomatic and dynamic selection of cryptographic modules for different security contexts within a computer network

Also Published As

Publication numberPublication date
US20180026953A1 (en)2018-01-25
US9104889B1 (en)2015-08-11

Similar Documents

PublicationPublication DateTitle
US9104889B1 (en)Encryption on computing device
CN112771826B (en) Application program registration method, application program registration device and mobile terminal
US11381550B2 (en)Account management using a portable data store
US9177169B2 (en)Secure digital storage
US8555079B2 (en)Token management
US9660982B2 (en)Reset and recovery of managed security credentials
US8656180B2 (en)Token activation
US8972719B2 (en)Passcode restoration
CN104364792B (en) Account management system for multiple web sites
US10044695B1 (en)Application instances authenticated by secure measurements
US9104888B2 (en)Secure data storage
CN112912880A (en) Container builder for personalized web services
US20130208893A1 (en)Sharing secure data
US10484372B1 (en)Automatic replacement of passwords with secure claims
US20100313018A1 (en)Method and system for backup and restoration of computer and user information
CA2970338C (en)System and method for replacing common identifying data
JP2011507414A (en) System and method for protecting data safety
JP2021536166A (en) Verification of peer identification information
US20080172750A1 (en)Self validation of user authentication requests
JP7422241B2 (en) Password recovery methods, systems, cloud servers and electronic devices
CN109246062B (en)Authentication method and system based on browser plug-in
CN109960945B (en)Active safety protection method and system for browser
WO2017091133A1 (en)Method and system for secure storage of information
US20060075227A1 (en)Portable information management device
CN115794683A (en) Power-on write protection method, device, device, and storage medium

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp