SECURE STORAGE
First Claim
1. A computer-implemented method for configuring secure storage on a computing device, the method comprising:
- storing, at a first application running on a first computing device, authentication data associated with an authenticated communications session conducted between the first application and a second application running on a second computing device different from the first computing device;
receiving, at the first application, an activation command comprising encryption data from the second application;
authenticating, by the first application, the activation command based on the stored authentication data; and
configuring, by the first application, secure storage on the first computing device based at least in part on the activation command received from the second application, wherein configuring the secure storage comprises encrypting application data associated with execution of the first application based on the encryption data.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems and computer readable media for configuring secure storage on a computing device. A method comprises: storing, at a first application running on a first computing device, authentication data associated with an authenticated communications session conducted between the first application and a second application running on a second computing device different from the first computing device; receiving, at the first application, an activation command comprising encryption data from the second application; authenticating, by the first application, the activation command based on the stored authentication data; and configuring, by the first application, secure storage on the first device based at least in part on the activation command received from the second application, wherein configuring the secure storage comprises encrypting application data associated with execution of the first application based on the encryption data.
-
Citations
20 Claims
-
1. A computer-implemented method for configuring secure storage on a computing device, the method comprising:
-
storing, at a first application running on a first computing device, authentication data associated with an authenticated communications session conducted between the first application and a second application running on a second computing device different from the first computing device; receiving, at the first application, an activation command comprising encryption data from the second application; authenticating, by the first application, the activation command based on the stored authentication data; and configuring, by the first application, secure storage on the first computing device based at least in part on the activation command received from the second application, wherein configuring the secure storage comprises encrypting application data associated with execution of the first application based on the encryption data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer-implemented method for configuring secure storage on a computing device, the method comprising:
-
storing, at a first application running on a first computing device, authentication data associated with an authenticated communications session initiated between the first application and a second application running on a second computing device different from the first computing device; receiving, from a remote server, policy data indicative of one or more data access policies associated with application data stored by the second application; generating, at the first application, encryption data for the second application in response to receipt of an activation request from the second application; generating, at the first application, an activation command comprising the encryption data and the policy data; signing, by the first application, the activation command using the authentication data; and sending the activation command from the first application to the second application, wherein the activation is configured to activate secure storage associated with the second application.
-
-
20. A non-transitory computer-readable storage medium comprising computer-executable instructions which, when executed by a processor, cause a computing device to perform a method of configuring secure storage on a computing device, the method comprising:
-
storing, at a first application running on a first computing device, authentication data associated with an authenticated communications session conducted between the first application and a second application running on a second computing device different from the first computing device; receiving, at the first application, an activation command comprising encryption data from the second application; authenticating, by the first application, the activation command based on the stored authentication data; and configuring, by the first application, secure storage on the first computing device based at least in part on the activation command received from the second application, wherein configuring the secure storage comprises encrypting application data associated with execution of the first application based on the encryption data.
-
Specification