SELECTIVELY SECURING DATA AND/OR ERASING SECURE DATA CACHES RESPONSIVE TO SECURITY COMPROMISING CONDITIONS
First Claim
1. A method for processing from a cache data stored in a backing storage device in encrypted form using a data processing device that includes a processor, the method comprising:
- detecting a condition indicative of user authentication;
reading data from the backing storage when the condition indicative of user authentication is detected;
evaluating the data read from the cache to identify the data as either encrypted or unencrypted;
unencrypting the data to provide unencrypted data when the data read from the cache is identified as being encrypted; and
storing the unencrypted data in the cache.
4 Assignments
0 Petitions
Accused Products
Abstract
Techniques are generally described for methods, systems, data processing devices and computer readable media configured to decrypt data to be stored in a data cache when a particular condition indicative of user authentication or data security has occurred. The described techniques may also be arranged to terminate the storage of decrypted data in the cache when a particular condition that may compromise the security of the data is detected. The describe techniques may further be arranged to erase the decrypted data stored in the cache when a particular condition that may compromise the security of the data is detected.
-
Citations
20 Claims
-
1. A method for processing from a cache data stored in a backing storage device in encrypted form using a data processing device that includes a processor, the method comprising:
-
detecting a condition indicative of user authentication; reading data from the backing storage when the condition indicative of user authentication is detected; evaluating the data read from the cache to identify the data as either encrypted or unencrypted; unencrypting the data to provide unencrypted data when the data read from the cache is identified as being encrypted; and storing the unencrypted data in the cache. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method of protecting unencrypted data stored in a cache on a data processing device, comprising:
-
detecting a condition indicating that the security of data stored in the cache may be compromised; and erasing at least some of the data stored in the cache when the condition indicating the security of data stored in the cache is detected as compromised. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A data processing system responsive to input from a user, the data processing system comprising:
-
an authentication device for generating authentication data associated with user input; a cache to store data; and a data processor arranged to decrypt data to be stored in the cache, wherein the data processor is configured to; detect a condition indicative of user authentication in response to the authentication data; receive data; determine when a portion of the received data is encrypted; when the condition indicative of user authentication is detected, decrypt the portion of received data that is determined to be encrypted to generate decrypted data; and storing the decrypted data in the cache. - View Dependent Claims (16, 17, 18)
-
-
19. A data processing system comprising:
-
a cache for storing data; and a data processor arranged in cooperation with the cache, wherein the data processor is configured to; detect a condition indicating that the security of data stored in the cache may be compromised; and erase at least a portion of the data stored in the cache after the condition indicating that the security of data stored in the cache may be compromised is detected.
-
-
20. A computer accessible medium having stored thereon computer executable instructions to be executed by a processor for data cache encryption and decryption, wherein the computer executable instructions are configured to enable the processor to:
-
detect a condition indicating that the security of data stored in the cache may be compromised; and erase at least a portion of the data stored in the cache after the condition indicating that the security of data stored in the cache may be compromised.
-
Specification