System and method of protecting data on a communication device
First Claim
Patent Images
1. A system of protecting data on a communication device having a first operational state and a second operational state, comprising:
- a key store configured to store a plurality of cryptographic keys;
a memory configured to store data; and
a data protection system configured to receive data, to determine whether the communication device is in the first operational state or the second operational state, to encrypt the received data using a first of the plurality of cryptographic keys where the communication device is in the first operational state or a second of the plurality of cryptographic keys where the communication device is in the second operational state, and to store the encrypted received data in the memory.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method of protecting data on a communication device are provided. Data received when the communication device is in a first operational state is encrypted using a first cryptographic key and algorithm. When the communication device is in a second operational state, received data is encrypted using a second cryptographic key and algorithm. Received data is stored on the communication device in encrypted form.
73 Citations
42 Claims
-
1. A system of protecting data on a communication device having a first operational state and a second operational state, comprising:
-
a key store configured to store a plurality of cryptographic keys;
a memory configured to store data; and
a data protection system configured to receive data, to determine whether the communication device is in the first operational state or the second operational state, to encrypt the received data using a first of the plurality of cryptographic keys where the communication device is in the first operational state or a second of the plurality of cryptographic keys where the communication device is in the second operational state, and to store the encrypted received data in the memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of protecting data on a communication device comprising the steps of:
-
storing a first protected cryptographic key and a second cryptographic key on the communication device;
receiving data at the communication device;
determining whether the first protected cryptographic key is accessible;
encrypting the received data using the first protected cryptographic key where the first protected cryptographic key is accessible;
encrypting the received data using the second cryptographic key where the first protected cryptographic key is inaccessible; and
storing the encrypted received data in memory on the communication device. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41)
-
-
42. A system of protecting data on a communication device comprising:
-
means for storing a first protected cryptographic key and a second cryptographic key on the communication device;
means for receiving data at the communication device;
means for determining whether the first protected cryptographic key is accessible;
means for encrypting the received data using the first protected cryptographic key where the first protected cryptographic key is accessible;
means for encrypting the received data using the second cryptographic key where the first protected cryptographic key is inaccessible; and
means for storing the encrypted received data in memory on the communication device.
-
Specification