MANAGEMENT OF AN ENCRYPTION KEY FOR A SECURE DATA STORAGE DEVICE ON A TRUSTED DEVICE PAIRED TO THE SECURE DEVICE OVER A PERSONAL AREA NETWORK
First Claim
1. A system comprising:
- a trusted device comprising;
a memory storing an encryption key;
a processor;
a secured data storage device comprising;
a memory, wherein a portion of the memory is allocated for sensitive data;
a processor, configured to pair, through a network, with the trusted device;
wherein the memory of the trusted device comprises instructions that when executed bythe processor of the trusted device cause the trusted device to transfer, through thefirst network, the encryption key to the secured data storage device; and
wherein upon receiving the encryption key, the secured data storage device enablesaccess to the allocated portion of the memory of the secured data storage device.
0 Assignments
0 Petitions
Accused Products
Abstract
In one aspect, a system comprises a trusted device comprising a memory storing an encryption key and a processor. The system also comprises a secured data storage device comprising a memory, wherein a portion of the memory is allocated for sensitive data; and a processor, configured to pair, through a network, with the trusted device. The memory of the trusted device comprises instructions that when executed by the processor of the trusted device cause the trusted device to transfer, through the first network, the encryption key to the secured data storage device. Upon receiving the encryption key, the secured data storage device enables access to the allocated portion of the memory of the secured data storage device.
-
Citations
20 Claims
-
1. A system comprising:
-
a trusted device comprising; a memory storing an encryption key; a processor; a secured data storage device comprising; a memory, wherein a portion of the memory is allocated for sensitive data; a processor, configured to pair, through a network, with the trusted device; wherein the memory of the trusted device comprises instructions that when executed by the processor of the trusted device cause the trusted device to transfer, through the first network, the encryption key to the secured data storage device; and wherein upon receiving the encryption key, the secured data storage device enables access to the allocated portion of the memory of the secured data storage device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification