Method and system for securing data utilizing redundant secure key storage
First Claim
Patent Images
1. A method of key management in a data processing device, the method comprising:
- generating a first encryption key associated with a first password, the first encryption key being generated using the first password, a first key seed, and a current key;
storing the first encryption key in a first location in a memory;
generating a second encryption key associated with a second password; and
storing the second encryption key in a second location in the memory;
wherein the first encryption key is used to encrypt or decrypt a first set of data, and wherein the second encryption key is used to encrypt or decrypt a second set of data.
4 Assignments
0 Petitions
Accused Products
Abstract
A data processing device and method adapted for key management are provided. A first encryption key associated with a first password is generated, and at least a further encryption key associated with a further password is generated. Generation of the encryption key may use the associated password, a key seed, and a current key. The first encryption key and further encryption key or keys are stored in memory, and are used to encrypt and decrypt separate sets of data. Different keys and potentially different levels of encryption are thus used to protect different sets of data at the device.
26 Citations
17 Claims
-
1. A method of key management in a data processing device, the method comprising:
-
generating a first encryption key associated with a first password, the first encryption key being generated using the first password, a first key seed, and a current key; storing the first encryption key in a first location in a memory; generating a second encryption key associated with a second password; and storing the second encryption key in a second location in the memory; wherein the first encryption key is used to encrypt or decrypt a first set of data, and wherein the second encryption key is used to encrypt or decrypt a second set of data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A data processing device comprising a system for securing data, the system comprising:
-
an encryption device for encrypting and decrypting data using an encryption key from an encryption key-password pair; at least one key generating device for generating a plurality of encryption keys, each of the plurality of encryption keys being associated with a password and being generated using its associated password, a key seed, and a current key, the plurality of encryption keys comprising a first encryption key associated with a first password and a second encryption key associated with a second password; and at least one memory for storing each of the plurality of encryption keys in a separate location and for storing a register identifying the location of each of the plurality of encryption keys, wherein the first encryption key is used to encrypt or decrypt a first set of data, and the second encryption key is used to encrypt or decrypt a second set of data. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable medium storing executable code which, when executed by a data processing device, causes the data processing device to carry out the method of:
-
generating a first encryption key associated with a first password, the first encryption key being generated using the first password, a first key seed, and a current key; storing the first encryption key in a first location in a memory; generating a second encryption key associated with a second password; and storing the second encryption key in a second location in the memory; wherein the first encryption key is used to encrypt or decrypt a first set of data, and wherein the second encryption key is used to encrypt or decrypt a second set of data. - View Dependent Claims (14, 15, 16, 17)
-
Specification