Data management method
First Claim
Patent Images
1. A data management method comprising:
- storing a second encryption key (KEK) into an information management device for encrypting a first encryption key and a third encryption key for data encryption;
decrypting the first encryption key by using the second encryption key (KEK), in response to receiving the first key encrypted by the second key;
decrypting data by using the first encryption key based on verifying input, in response to receiving the data encrypted with the first encryption key;
encrypting the decrypted data with the third encryption key; and
inputting the data encrypted with the third encryption key to an electronic device external to the information management device, wherein the first encryption key is different from the third encryption key.
2 Assignments
0 Petitions
Accused Products
Abstract
A data management method includes decrypting the first encryption key using the second encryption in response to receiving the first encryption key, decrypting the data by using the first encryption key in response to receiving the data encrypted with the first encryption key, and encrypting the data with the third encryption key and transmitting the data externally.
41 Citations
20 Claims
-
1. A data management method comprising:
-
storing a second encryption key (KEK) into an information management device for encrypting a first encryption key and a third encryption key for data encryption; decrypting the first encryption key by using the second encryption key (KEK), in response to receiving the first key encrypted by the second key; decrypting data by using the first encryption key based on verifying input, in response to receiving the data encrypted with the first encryption key; encrypting the decrypted data with the third encryption key; and inputting the data encrypted with the third encryption key to an electronic device external to the information management device, wherein the first encryption key is different from the third encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A data management method comprising:
-
receiving an encryption key and data at an information management device, the encryption key being encrypted with a first transmission key, the data being encrypted with the encryption key; decrypting the encryption key using the first transmission key which is input directly by a user into the information management device; in response to receiving the data at the information management device, decrypting the data with the encryption key based on verifying input and encrypting the decrypted data by using a second transmission key and the encryption key, the second transmission key being different from the first transmission key; and inputting the encrypted data with the second transmission key, to an electronic device external to the information management device after encoding the data encrypted with the second transmission key in a transmission format. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A data management method comprising:
-
receiving, from a user and via direct input of an information management device, a first key for key encryption and a second key; receiving a third key encrypted with the first key; decrypting at the information management device the third key using the first key; in response to receiving data encrypted with the third key, decrypting the data with the third key based on verifying input; and
encrypting the decrypted data with the second key; andinputting the data encrypted with the second key to an electronic device external to the information management device, wherein the second key is different from the first key. - View Dependent Claims (17, 18, 19, 20)
-
Specification