Providing data security with a token device
First Claim
1. A computer-implemented method for providing security to access and store data, the method comprising:
- transferring first information for display from a token device to a first computing device at a first time, the token device connected to the first computing device and the first information describing public data stored on the token device;
concealing second information stored to the token device, the second information describes a plurality of directories of private data, wherein the second information is not displayed by the first computing device at the first time;
verifying that a user has generated one or more passwords to obtain one or more of the plurality of directories;
receiving a request to retrieve a directory of the one or more directories, the request specifying a directory name that is used as a password to retrieve the directory from the token device; and
transferring the directory of private data stored on the token device to a display screen of the first computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method for providing security to access and store data may include transferring first information for display from a token device having a memory to a first computing device at a first time, the token device connected to the first computing device and the first information describing public data stored on the token device. A request to retrieve a root directory of private data may be received, the request specifying a root directory name. In response to receiving the request to retrieve a root directory of private data, the root directory may be requested by establishing a wireless connection between the token device and a server computing device, transferring the root directory name to the server computing device, wherein the root directory name is used as a password to retrieve the root directory, and receiving the root directory from the server computing device by the token device.
-
Citations
17 Claims
-
1. A computer-implemented method for providing security to access and store data, the method comprising:
-
transferring first information for display from a token device to a first computing device at a first time, the token device connected to the first computing device and the first information describing public data stored on the token device; concealing second information stored to the token device, the second information describes a plurality of directories of private data, wherein the second information is not displayed by the first computing device at the first time; verifying that a user has generated one or more passwords to obtain one or more of the plurality of directories; receiving a request to retrieve a directory of the one or more directories, the request specifying a directory name that is used as a password to retrieve the directory from the token device; and transferring the directory of private data stored on the token device to a display screen of the first computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A token device for providing security to access and store data, comprising:
-
a private data conceal engine configured to transfer first information for display from the token device to a first computing device at a first time, the token device connected to the first computing device and the first information describing public data stored on the token device; wherein the private data conceal engine is further configured to conceal second information stored to the token device, the second information describes a plurality of directories of private data, wherein the second information is not displayed by the first computing device at the first time; an authentication engine configured to verify that a user has generated one or more passwords to obtain one or more of the plurality of directories; and a cryptosystem configured to transfer the directory name to a server computing device, wherein the directory name is used as a first password to retrieve the directory from the server computing device. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system comprising:
-
a first computing device having a processor; a token device connected to the first computing device and a computer readable storage medium having program instructions embodied therewith, the program instructions readable/executable by the processor to cause the system to perform a method, the method comprising; transferring first information for display at the first computing device at a first time, the first information describing public data stored on the token device; concealing second information that describes a plurality of directories of private data, wherein the second information is not displayed by the first computing device at the first time; and verifying that a user has generated one or more passwords to obtain one or more of the plurality of directories of private data; establishing a wireless connection between the token device and a server computing device, wherein the token device receives a request to retrieve a directory of private data, the request specifying a directory name and in response to the receiving of the request, the token device requests the directory from the server computing device and receives the directory from the server computing device; and transferring the directory name to the server computing device, wherein the directory name is used as a first password to retrieve the directory from the server computing device. - View Dependent Claims (14, 15, 16, 17)
-
Specification