Systems and Methods for Controlling Access to Encrypted Data Stored on a Mobile Device
First Claim
1. A method for accessing encrypted data with a mobile device, the method comprising:
- prearranging a response to a prompt;
obtaining a decryption key from an access control system includingreceiving the prompt over a first communication channel from the access control system,providing the response to the access control system, andreceiving by the mobile device the decryption key from the access control system; and
using the decryption key to decrypt the encrypted data with the mobile device.
7 Assignments
0 Petitions
Accused Products
Abstract
Encrypted data on mobile devices is protected by remotely storing a decryption key. In order to decrypt the encrypted data on the mobile device, the mobile device obtains the decryption key from an access control system that is remote from the mobile device. The access control system can control access to the encrypted data by controlling access to the decryption key. For example, the access control system can implement user authentication as a condition for providing the decryption key. Access to the encrypted data can also be controlled by withholding the decryption key where, for instance, a mobile device has been reported to be lost or stolen, or once an individual'"'"'s access privilege has been revoked, or at certain times of the day.
-
Citations
22 Claims
-
1. A method for accessing encrypted data with a mobile device, the method comprising:
-
prearranging a response to a prompt; obtaining a decryption key from an access control system including receiving the prompt over a first communication channel from the access control system, providing the response to the access control system, and receiving by the mobile device the decryption key from the access control system; and using the decryption key to decrypt the encrypted data with the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for controlling access to encrypted data stored on a mobile device, the method comprising:
-
sending a prompt to the mobile device over a first communication channel; receiving a claimant response to the prompt; determining a match between the claimant response and a response template associated with the prompt; and sending the decryption key to the mobile device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
a computing system including logic programmed to send a prompt over a first communication channel; receive a claimant response to the prompt; determine a match between the claimant response and a response template associated with the prompt; and send the decryption key. - View Dependent Claims (19, 20, 21, 22)
Specification