AUTOMATIC DATA ENCRYPTION AND ACCESS CONTROL BASED ON BLUETOOTH DEVICE PROXIMITY
First Claim
8. A system for securing data on Bluetooth enabled devices, comprising two paired Bluetooth devices, wherein a first one of said devices is designated a “
- trusted”
device and the second one of said devices contains sensitive data, and said second one of said devices encrypts said sensitive data when said first one of said devices leaves the proximity of said second one of said devices.
6 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with a “trusted” Bluetooth device. When contact with the trusted device is lost, designated sensitive data on the secured Bluetooth device is automatically encrypted. When contact is restored, the data is automatically decrypted. In an alternate embodiment, a secured device can be associated with multiple trusted devices, and the secured device designate different sensitive data for each trusted device. In this way, multiple users can share a common, “public” Bluetooth device without concern that the other users will access their sensitive data on the device when the device is not being used by that user.
41 Citations
20 Claims
-
8. A system for securing data on Bluetooth enabled devices, comprising two paired Bluetooth devices, wherein a first one of said devices is designated a “
- trusted”
device and the second one of said devices contains sensitive data, and said second one of said devices encrypts said sensitive data when said first one of said devices leaves the proximity of said second one of said devices. - View Dependent Claims (1, 2, 3, 4, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
- trusted”
-
16-1. The integrated circuit of claim 15, further delaying the encrypting of sensitive data until the expiration of a timer.
Specification