SECURED STORAGE DEVICE
First Claim
1. A method of preventing unauthorized access to digital content using a storage device, the method comprising:
- obtaining from a trusted entity a public key of a public-private key pair; and
encrypting content being received to a storage device, using the public key; and
storing the encrypted content on the storage device,the content being encrypted using the public key so as to be decipherable by the trusted entity, only by using a corresponding private key of the public-private key pair,wherein access to the corresponding private key is restricted to a trusted entity alone, andwherein the encrypted content becomes decipherable by the trusted entity, only after an indication of authorization for use of the corresponding private key is being provided to the trusted entity.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of preventing unauthorized access to digital content includes obtaining from a trusted entity a public key of a public-private key pair, encrypting content being received by a storage device using the public key, and storing the encrypted content on the storage device. The public-private key pair includes the public key and a corresponding private key. The content is encrypted on the storage device using the public key so as to be decipherable using a corresponding private key. Access to the corresponding private key is restricted to the trusted entity alone and encrypted content may be decipherable by the trusted entity, only after an indication of authorization for use of the corresponding private key is provided to the trusted entity. Also provided is a method of controlling access to encrypted content that is stored on a storage device operating as a secure storage device.
70 Citations
20 Claims
-
1. A method of preventing unauthorized access to digital content using a storage device, the method comprising:
-
obtaining from a trusted entity a public key of a public-private key pair; and encrypting content being received to a storage device, using the public key; and storing the encrypted content on the storage device, the content being encrypted using the public key so as to be decipherable by the trusted entity, only by using a corresponding private key of the public-private key pair, wherein access to the corresponding private key is restricted to a trusted entity alone, and wherein the encrypted content becomes decipherable by the trusted entity, only after an indication of authorization for use of the corresponding private key is being provided to the trusted entity. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of controlling access to encrypted content that is stored on a storage device, the method comprising:
-
generating a public-private key pair having a public key and a corresponding private key, by a trusted entity; and providing the public key while restricting access of the corresponding private key to the trusted entity alone, the public key being used by a storage device for encrypting content, such that the encrypted content is stored on the storage device, wherein the encrypted content becomes decipherable by the trusted entity, only upon an indication of authorization for use of the corresponding private key is being provided to the trusted entity. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A storage device comprising:
-
an encryption unit operative to encrypt content using a public key of a public-private key pair, the content being encrypted so as to be decipherable by the trusted entity, only by using a corresponding private key of the public-private key pair; and a non-volatile memory operative to store content which is encrypted, wherein access to the corresponding private key is restricted to a trusted entity alone, and wherein the encrypted content becomes decipherable by the trusted entity, only after an indication of authorization for use of the corresponding private key is provided to the trusted entity. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A trusted entity system comprising:
-
a computing unit operative to generate a public-private key pair having a public key and a corresponding private key, the public key being used by a storage device for encrypting content; and a memory area operative to store the corresponding private key, such that access to the corresponding is restricted to the trusted entity alone, wherein the encrypted content becomes decipherable by the trusted entity, only after an indication for authorization for use of the corresponding private key is being received thereto. - View Dependent Claims (19, 20)
-
Specification