System and method for protecting master encryption keys
First Claim
1. A method of protecting master transport encryption keys stored on a first computing device, wherein at least one master transport encryption key is used to secure data communications between the first computing device and a second computing device, the method comprising the steps of:
- generating at least one temporary encryption key;
encrypting the at least one master transport encryption key;
storing the encrypted at least one master transport encryption key in a non-volatile store; and
storing the at least one temporary encryption key in a volatile store, such that the at least one temporary encryption key is usable to facilitate decryption of data received at the first computing device from the second computing device while the first computing device is locked.
5 Assignments
0 Petitions
Accused Products
Abstract
A system and method for protecting master transport encryption keys stored on a computing device. Master transport encryption keys are used to secure data communications between computing devices. In one example embodiment, there is provided a method in which a copy of a master transport encryption key is generated and stored in a volatile store of a first computing device (e.g. a mobile device). This copy of the master transport encryption key can be used to facilitate the decryption of data received at the first computing device from a second computing device (e.g. a data server), even while the first computing device is locked. The method also comprises encrypting the master transport encryption key, with a content protection key for example, and storing the encrypted master transport encryption key in a non-volatile store of the first computing device.
184 Citations
20 Claims
-
1. A method of protecting master transport encryption keys stored on a first computing device, wherein at least one master transport encryption key is used to secure data communications between the first computing device and a second computing device, the method comprising the steps of:
-
generating at least one temporary encryption key;
encrypting the at least one master transport encryption key;
storing the encrypted at least one master transport encryption key in a non-volatile store; and
storing the at least one temporary encryption key in a volatile store, such that the at least one temporary encryption key is usable to facilitate decryption of data received at the first computing device from the second computing device while the first computing device is locked. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification