Method and system for securing data utilizing redundant secure key storage
First Claim
1. A method of securing data in a data processing device having an encryption device for encrypting and decrypting data using an encryption key-password pair, comprising the steps of:
- a. generating a first encryption key, b. storing the first encryption key in a first location in a memory, c. generating at least one additional encryption key, d. storing each additional encryption key in a memory in a different location from the location of each other encryption key, and e. creating a register storing the location of each encryption key, wherein to encrypt or decrypt data the first encryption key is retrieved but upon the occurrence of a particular event one of the additional encryption keys is retrieved.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method which protects a data processing system against encryption key errors by providing redundant encryption keys stored in different locations, and providing the software with the ability to select an alternate redundant key if there is any possibility that the encryption key being used may be corrupted. In the preferred embodiment, a memory control module in the data processing device is configured to accommodate the storage of multiple (for example up to four or more) independent password/key pairs, and the control module duplicates a password key at the time of creation. The redundant passwords and encryption keys are forced into different memory slots for later retrieval if necessary. The probability of redundant keys being corrupted simultaneously is infinitesimal, so the system and method of the invention ensures that there is always an uncorrupted encryption key available.
-
Citations
20 Claims
-
1. A method of securing data in a data processing device having an encryption device for encrypting and decrypting data using an encryption key-password pair, comprising the steps of:
-
a. generating a first encryption key, b. storing the first encryption key in a first location in a memory, c. generating at least one additional encryption key, d. storing each additional encryption key in a memory in a different location from the location of each other encryption key, and e. creating a register storing the location of each encryption key, wherein to encrypt or decrypt data the first encryption key is retrieved but upon the occurrence of a particular event one of the additional encryption keys is retrieved. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A data processing device comprising a system for securing data, comprising
an encryption device for encrypting and decrypting data using an encryption key-password pair, at least one key generating device for generating a plurality of encryption keys, and at least one memory for storing the encryption keys in separate locations and for storing a register identifying the location of each encryption key, wherein to encrypt or decrypt data a first encryption key is retrieved but upon the occurrence of a particular event a different encryption key is retrieved.
-
17. A mobile communications system, comprising
a communications subsystem, for receiving and transmitting data, a processor for processing data, having a system for securing data communicated to and from the device comprising an encryption device for encrypting and decrypting data received and transmitted using an encryption key-password pair, comprising at least one key generating device for generating a plurality of encryption keys, and at least one memory for storing the encryption keys in separate locations and for storing a register identifying the location of each encryption key, wherein to encrypt or decrypt data a first encryption key is retrieved but upon the occurrence of a particular event a different encryption key is retrieved.
Specification