ENCRYPTING AND STORING DATA
First Claim
1. A user equipment for encrypting and storing data, the user equipment comprising:
- a key generator configured to generate two or more keys based on a shared secret made available to the user equipment and a server,wherein the two or more keys comprise at least one perfect forward secrecy key and at least one limited forward secrecy key;
a data encryptor configured to encrypt data using at least one of the two or more keys; and
a data recorder configured to store the encrypted data in a first memory.
3 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatus for encrypting and storing data. The methods and apparatus provide different levels of security and usability. The methods and apparatus generate two or more keys based on a shared secret made available to a user equipment and a server. The two or more keys comprise at least one perfect forward secrecy key, and at least one limited forward secrecy key. The methods and apparatus encrypt data using at least one of the two or more keys. The methods and apparatus store the encrypted data in a memory of the user equipment and/or transmit the data from the user equipment to the server.
37 Citations
27 Claims
-
1. A user equipment for encrypting and storing data, the user equipment comprising:
-
a key generator configured to generate two or more keys based on a shared secret made available to the user equipment and a server, wherein the two or more keys comprise at least one perfect forward secrecy key and at least one limited forward secrecy key; a data encryptor configured to encrypt data using at least one of the two or more keys; and a data recorder configured to store the encrypted data in a first memory. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method of operating a user equipment, comprising:
-
generating by a key generator, two or more keys based on a shared secret made available to the user equipment and a server, wherein the two or more keys comprises at least one perfect forward secrecy key, and at least one limited forward secrecy key; encrypting data by a data encryptor using at least one of the two or more keys; and storing the encrypted data at a memory by a data recorder. - View Dependent Claims (21)
-
-
20. (canceled)
-
22. A server comprising:
-
a receiver configured to receive encrypted data from a user equipment; a key generator configured to generate two or more keys based on a shared secret made available to the server and a user equipment, wherein the two or more keys comprise at least one perfect forward secrecy key and at least one limited forward secrecy key; a decryptor configured to decrypt the received encrypted data using at least one of the two or more keys; and a data recorder configured to store at least part of the decrypted data in a memory. - View Dependent Claims (23, 24)
-
-
25. A method of operating a server, comprising:
-
receiving by a receiver encrypted data from a user equipment; generating by a key generator, two or more keys based on a shared secret made available to the server and a user equipment, wherein the two or more keys comprises at least one perfect forward secrecy key, and at least one limited forward secrecy key; decrypting by a decryptor, the received encrypted data using at least one of the two or more keys; and storing the decrypted data in a memory by a data recorder. - View Dependent Claims (27)
-
-
26. (canceled)
Specification