METHOD OF OPERATING A COMPUTING DEVICE, COMPUTING DEVICE AND COMPUTER PROGRAM
First Claim
1. A computing device, the computing device comprising:
- a first application and a second application;
the first application being arranged to generate a data access application key for use by the second application to enable decryption of data that is stored in encrypted form on the computing device using said data access application key, wherein;
the second application is arranged to generate a public/private key pair;
the second application is arranged to send a request to the first application for the first application to send the second application a data access application key, the request including the public key;
the first application is arranged to derive the requested data access application key as a function of at least the public key; and
the first application is arranged to send the derived data access application key to the second application.
3 Assignments
0 Petitions
Accused Products
Abstract
A computing device has a first application and a second application. The first application generates a data access application key for use by the second application to enable decryption of data that is stored in encrypted form on the computing device using the data access application key. In operation, the second application generates a public/private key pair. The second application sends a request to the first application for the first application to send the second application a data access application key, the request including the public key. The first application derives the requested data access application key as a function of at least the public key. The first application sends the derived data access application key to the second application.
15 Citations
32 Claims
-
1. A computing device, the computing device comprising:
-
a first application and a second application; the first application being arranged to generate a data access application key for use by the second application to enable decryption of data that is stored in encrypted form on the computing device using said data access application key, wherein; the second application is arranged to generate a public/private key pair; the second application is arranged to send a request to the first application for the first application to send the second application a data access application key, the request including the public key; the first application is arranged to derive the requested data access application key as a function of at least the public key; and the first application is arranged to send the derived data access application key to the second application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of operating a computing device, the method comprising:
a first application running on the computing device generating a data access application key for use by a second application running on the computing device to enable decryption of data that is stored in encrypted form on the computing device using said data access application key, wherein; the second application generates a public/private key pair; the second application sends a request to the first application for the first application to send the second application a data access application key, the request including the public key; the first application derives the requested data access application key as a function of at least the public key; and the first application sends the derived data access application key to the second application. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
21. A computer program, comprising code such that when the computer program is executed on a computing device comprising a first application and a second application:
the first application generates a data access application key for use by the second application to enable decryption of data that is stored in encrypted form on the computing device using said data access application key, wherein; the second application generates a public/private key pair; the second application sends a request to the first application for the first application to send the second application a data access application key, the request including the public key; the first application derives the requested data access application key as a function of at least the public key; and the first application sends the derived data access application key to the second application. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
31. A method, comprising configuring at least one processor and at least one memory to cause the at least one processor to:
-
receive, at a first application installed on a user device, a first message from a second application for a first authentication response; receive, at the first application, a second message from a third application for a second authentication response; forward a response to the first request, the response comprising control data and authentication data to enable decryption of data that is stored in encrypted form on the computing device; and invoke, on the basis of data contained within a further message received from the second application, foreground processing resources in order to service the second message from the third application, wherein the data contained within the further message is directly related to said control data.
-
-
32. A computer program, comprising a set of instructions, which, when executed by a processing system, causes the processing system to perform the steps of:
-
receive, at a first application installed on a user device, a first message from a second application for a first authentication response; receive, at the first application, a second message from a third application for a second authentication response; forward a response to the first request, the response comprising control data and authentication data to enable decryption of data that is stored in encrypted form on the computing device; and invoke, on the basis of data contained within a further message received from the second application, foreground processing resources in order to service the second message from the third application, wherein the data contained within the further message is directly related to said control data.
-
Specification