Automatic data encryption and access control based on bluetooth device proximity
First Claim
1. A security method, comprising:
- a. pairing two Bluetooth devices,b. designating at least one of said paired Bluetooth devices as a trusted device for the other, a secured device;
c. designating at least a portion of the data storage on said secured device as sensitive data;
d. detecting when said trusted device is no longer in proximity with said secured device;
e. encrypting said sensitive data when said trusted device is no longer in proximity with said secured device; and
f. de-encrypting said sensitive data when said trusted device is detected as being in proximity with said secured device.
7 Assignments
0 Petitions
Accused Products
Abstract
A method, apparatus, and system for using Bluetooth devices to secure sensitive data on other Bluetooth devices is described. A Bluetooth device is paired with a “trusted” Bluetooth device. When contact with the trusted device is lost, designated sensitive data on the secured Bluetooth device is automatically encrypted. When contact is restored, the data is automatically decrypted. In an alternate embodiment, a secured device can be associated with multiple trusted devices, and the secured device designate different sensitive data for each trusted device. In this way, multiple users can share a common, “public” Bluetooth device without concern that the other users will access their sensitive data on the device when the device is not being used by that user.
-
Citations
13 Claims
-
1. A security method, comprising:
-
a. pairing two Bluetooth devices, b. designating at least one of said paired Bluetooth devices as a trusted device for the other, a secured device; c. designating at least a portion of the data storage on said secured device as sensitive data; d. detecting when said trusted device is no longer in proximity with said secured device; e. encrypting said sensitive data when said trusted device is no longer in proximity with said secured device; and f. de-encrypting said sensitive data when said trusted device is detected as being in proximity with said secured device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An integrated circuit, said integrated circuit including an application layer that performs the method comprising:
-
a. pairing two Bluetooth devices, b. designating at least one of said paired Bluetooth devices as a trusted device for the other, a secured device; c. designating at least a portion of the data storage on said secured device as sensitive data; d. detecting when said trusted device is no longer in proximity with said secured device; e. encrypting said sensitive data when said trusted device is no longer in proximity with said secured device; and f. de-encrypting said sensitive data when said trusted device is detected as being in proximity with said secured device. - View Dependent Claims (9, 10, 11, 12, 13)
-
Specification