METHOD AND SYSTEM FOR MANAGING INFORMATION ON MOBILE DEVICES
First Claim
1. A method for protecting information on a mobile device, comprising:
- obtaining a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device;
generating an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input;
generating an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input;
generating ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs;
associating the identifier with the ciphered information; and
storing the ciphered information as associated with the identifier.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for protecting information on a mobile device. The method and apparatus obtain a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generate an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generate ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associate the identifier with the ciphered information; and store the ciphered information as associated with the identifier.
-
Citations
16 Claims
-
1. A method for protecting information on a mobile device, comprising:
-
obtaining a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generating an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generating an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generating ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associating the identifier with the ciphered information; and storing the ciphered information as associated with the identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory storage medium recorded thereon a program that, when executed, causes a processor to execute a method for protecting information, the method comprising the steps of:
-
obtaining a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generating an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generating an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generating ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associating the identifier with the ciphered information; and storing the ciphered information as associated with the identifier.
-
-
15. A mobile device that implements an information protecting method, the information protecting method including:
-
obtaining a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generating an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generating an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generating ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associating the identifier with the ciphered information; and storing the ciphered information as associated with the identifier.
-
-
16. A system that implements an information protecting method, the information protecting method including:
-
obtaining a predetermined portion of asymmetric information upon an input of the asymmetric information in the mobile device; generating an identifier by using a first generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generating an encryption key by using a second generating algorithm that uses the predetermined portion of the asymmetric information as an algorithm input; generating ciphered information by using an encryption algorithm that uses the encryption key and the information as algorithm inputs; associating the identifier with the ciphered information; and storing the ciphered information as associated with the identifier.
-
Specification