Encryption method and system for portable data
First Claim
1. A method for providing access through a new host to encrypted data using an encryption key, wherein a first split of a password-modified key is stored in a portable encryption device, and a second split of said password-modified key is stored elsewhere, said method comprising the steps of:
- a) connecting said portable encryption device to said new host;
b) providing a password;
c) obtaining said second split of said password-modified key; and
d) recreating said encryption key with said password to produce a recreated encryption key, first split of said password-modified key, and said second split of said password-modified key.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method allows portable, encrypted data to be accessible through multiple hosts, including new hosts (14), without requiring a secure link to the new hosts. A split key encryption system encrypts (52) data and stores the encrypted data on a portable device (10). A split of the encryption key is stored (54) in the portable device (10), and another split of the key is stored (54) in a home host (12) . A password-modified key is then made (58) by combining a password with the encryption key. This password-modified key is then reduced (58), with one split being stored on the host (12) and another split stored on the portable device (10) . Data can be accessed with a new host (14) by transferring (78) the host password-modified split to the new host (14) and entering (80) the password into the portable device (10).
-
Citations
18 Claims
-
1. A method for providing access through a new host to encrypted data using an encryption key, wherein a first split of a password-modified key is stored in a portable encryption device, and a second split of said password-modified key is stored elsewhere, said method comprising the steps of:
-
a) connecting said portable encryption device to said new host; b) providing a password; c) obtaining said second split of said password-modified key; and d) recreating said encryption key with said password to produce a recreated encryption key, first split of said password-modified key, and said second split of said password-modified key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for providing portable encrypted data which are accessible by multiple hosts without requiring a secure communication link between an existing host and a new host, said method comprising the steps of:
-
a) encrypting data using an encryption key; b) storing said portable encrypted data in a portable device; c) obtaining a user password; d) reducing said user password and said encryption key into a portable password-modified split and a home host password-modified split; and e) storing said home host password-modified split in a home host. - View Dependent Claims (9, 10, 11)
-
-
12. A portable data encryption device comprising:
-
a) first data storage area; b) an encryption device configured to perform encryption and decryption in response to an encryption key, to encrypt data for storage in said first data storage area, and to decrypt data stored in said first data storage area; c) a logical device in data communication with said encryption device, said logical device being configured to combine a password with said encryption key to form a password-modified encryption key; and d) a second data storage area in data communication with said logical device, said second data storage area being configured to store a first split of said password-modified encryption key. - View Dependent Claims (13, 14)
-
-
15. A system for providing portable encrypted data which are accessible by multiple hosts, wherein said system configures new hosts without requiring a secure link between hosts and said system comprises:
-
a) a portable encryption device configured to encrypt, store, and decrypt data, wherein said data are encrypted and decrypted in response to an encryption key, and said portable encryption device is further configured to store a first split of a password-modified key; and b) a home host configured to engage in data communication with said portable encryption device, and to store a second split of said password-modified key. - View Dependent Claims (16, 17, 18)
-
Specification