PROTECTING SENSITIVE INFORMATION USING A TRUSTED DEVICE
First Claim
Patent Images
1. A method for protecting sensitive information, the method comprising:
- encrypting sensitive information with a first secret key;
transmitting the encrypted sensitive information to an untrusted device for forwarding to a server for authentication;
receiving an authentication identification originated from the server and forwarded by the untrusted device;
decrypting the authentication identification; and
transmitting the decrypted authentication identification to the untrusted device to enable the untrusted device to use the authentication identification to communicate with the server.
1 Assignment
0 Petitions
Accused Products
Abstract
The invention relates to the information processing field, and discloses a method for protecting sensitive information, comprising: encrypting sensitive information with a first secret key; transmitting the encrypted sensitive information to an untrusted device for forwarding to a server for authentication; receiving an authentication identification originated from the server and forwarded by the untrusted device; decrypting the authentication identification; and transmitting the decrypted authentication identification to the untrusted device to enable the untrusted device to use the authentication identification to communicate with the server.
-
Citations
20 Claims
-
1. A method for protecting sensitive information, the method comprising:
-
encrypting sensitive information with a first secret key; transmitting the encrypted sensitive information to an untrusted device for forwarding to a server for authentication; receiving an authentication identification originated from the server and forwarded by the untrusted device; decrypting the authentication identification; and transmitting the decrypted authentication identification to the untrusted device to enable the untrusted device to use the authentication identification to communicate with the server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A trusted device for protecting sensitive information, the trusted device comprising one or more hardware processors configured to execute the following program instructions:
-
program instructions programmed to encrypt sensitive information with a first secret key; program instructions programmed to transmit the encrypted sensitive information to an untrusted device for forwarding to a server for authentication; program instructions programmed to receive an authentication identification originated from the server and forwarded by the untrusted device; program instructions programmed to decrypt the authentication identification; and program instructions programmed to transmit the decrypted authentication identification to the untrusted device to enable the untrusted device to use the authentication identification to communicate with the server. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system for protecting sensitive information, the computer system comprising:
-
an untrusted device; and a trusted device; wherein the trusted device comprises one or more hardware processors configured to execute the following program instructions; program instructions programmed to encrypt sensitive information with a first secret key; program instructions programmed to transmit the encrypted sensitive information to an untrusted device for forwarding to a server for authentication; program instructions programmed to receive an authentication identification originated from the server and forwarded by the untrusted device; program instructions programmed to decrypt the authentication identification; and program instructions programmed to transmit the decrypted authentication identification to the untrusted device to enable the untrusted device to use the authentication identification to communicate with the server. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification