METHOD AND SYSTEM FOR CREDENTIAL MANAGEMENT AND DATA ENCRYPTION FOR iOS BASED DEVICES
First Claim
1. A device configured for communication over a network, said device comprising:
- an encryption module configured to encrypt and/or decrypt data utilizing credentials associated with the device;
a component configured to retrieve said credentials;
a component configured to store a digital signature;
a component configured to sign said encrypted data using said digital signature; and
a secure data repository configured on the device and associated with said encryption module to store said encrypted and signed data.
1 Assignment
0 Petitions
Accused Products
Abstract
A mechanism and method for managing credentials on an electronic device and providing encryption and decryption services for the electronic device comprising a mobile communication device, smart phone or other computing device. According to an embodiment the device is configured with an iOS based operating system. The device is configured with a data encryption service application and an associated secure data repository. According to an embodiment, the electronic device is configured to download and/or cache credentials from a credential management system operatively coupled to the device, comprising public-private key pairs in a PKI system. According to an embodiment, the electronic device is configured with or stores a digital verification signature. The data encryption service application is configured to encrypt/decrypt data (e.g. files, documents) and optionally digitally sign the encrypted file. The encrypted (and digitally signed data) is contained in the sandbox associated with the data encryption service application.
-
Citations
20 Claims
-
1. A device configured for communication over a network, said device comprising:
-
an encryption module configured to encrypt and/or decrypt data utilizing credentials associated with the device; a component configured to retrieve said credentials; a component configured to store a digital signature; a component configured to sign said encrypted data using said digital signature; and a secure data repository configured on the device and associated with said encryption module to store said encrypted and signed data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method for securing data associated with an application running on a device, said method comprising the steps of:
-
encrypting the data; applying a digital signature to said encrypted data; configuring a secure data repository on the device; and storing said encrypted and signed data in said secure data repository configured on the device. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product for securing data associated with an application running on a computing device, said computer program product comprising:
-
a storage medium configured to store computer readable instructions; said computer readable instructions including instructions for, encrypting the data; applying a digital signature to said encrypted data; and storing said encrypted and signed data in a secure data repository configured on the device. - View Dependent Claims (18, 19, 20)
-
Specification