Personal encryption device
First Claim
1. A method comprising:
- receiving, at a handheld computing device from a personal encryption device, data for operating the handheld computing device with the personal encryption device, the data for operating the handheld computing device with the personal encryption device including a PK certificate of the personal encryption device;
physically connecting the personal encryption device to the handheld computing device;
responsive to the connecting, displaying a main screen user interface on a display of the handheld computing device, the main screen user interface including at least one cryptography option for a user of the handheld computing device;
receiving, at the handheld computing device, a user-defined input representative of selection of a first cryptography option of the at least one cryptography option;
implementing, by the handheld computing device and the personal encryption device, at least one cryptography process associated with the selected first cryptography option;
maintaining the PK certificate on the handheld computing device;
determining whether the personal encryption device has been disconnected from the handheld computing device; and
responsive to determining the personal encryption device has been disconnected from the handheld computing device, encrypting at least one of;
a document, a folder, and a directory with a key of the PK certificate of the personal encryption device maintained on the handheld computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for securing a handheld computing device is described. A personal encryption device may be physically connected to a handheld computing device. Responsive to the connection, a main screen user interface may be displayed on a display of the handheld computing device. The main screen user interface may include at least one cryptography option for a user of the handheld computing device. A user-defined input representative of selection of a first cryptography option of the at least one cryptography option may be received, and at least one cryptography process associated with the selected first cryptography option may be implemented by the handheld computing device and personal encryption device. The cryptography options may include encryption, decryption, digital signatures, and digital signature verification.
21 Citations
17 Claims
-
1. A method comprising:
-
receiving, at a handheld computing device from a personal encryption device, data for operating the handheld computing device with the personal encryption device, the data for operating the handheld computing device with the personal encryption device including a PK certificate of the personal encryption device; physically connecting the personal encryption device to the handheld computing device; responsive to the connecting, displaying a main screen user interface on a display of the handheld computing device, the main screen user interface including at least one cryptography option for a user of the handheld computing device; receiving, at the handheld computing device, a user-defined input representative of selection of a first cryptography option of the at least one cryptography option; implementing, by the handheld computing device and the personal encryption device, at least one cryptography process associated with the selected first cryptography option; maintaining the PK certificate on the handheld computing device; determining whether the personal encryption device has been disconnected from the handheld computing device; and responsive to determining the personal encryption device has been disconnected from the handheld computing device, encrypting at least one of;
a document, a folder, and a directory with a key of the PK certificate of the personal encryption device maintained on the handheld computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus comprising:
-
at least one processor; and at least one memory having stored therein computer executable instructions, that when executed by the at least one processor, cause the apparatus to perform a method of; transmitting data for operating a handheld computing device with the apparatus, the handheld device being physically connected to the apparatus and the data including a PK certificate of the apparatus and instructions for rendering a main screen user interface on a display of the handheld computing device, the main screen user interface including at least one cryptography option for a user of the handheld computing device; implementing, by the apparatus and the handheld computing device, at least one cryptography process associated with a selected first cryptography option of the at least one cryptography option; maintaining the PK certificate on the handheld computing device; determining whether the apparatus has been disconnected from the handheld computing device; and responsive to determining that the apparatus has been disconnected from the handheld computing device, encrypting at least one of;
a document, a folder, and a directory with a key of the PK certificate of the apparatus maintained on the handheld computing device. - View Dependent Claims (9, 10, 11, 12)
-
-
13. One or more non-transitory computer-readable media storing computer-readable instructions that, when executed by at least one processor, cause the at least one processor to perform a method of:
-
transmitting data for operating a handheld computing device with the processor, the handheld computing device being physically connected to the processor and the data including a PK certificate of the processor and instructions for rendering a main screen user interface on a display of the handheld computing device, the main screen user interface including at least one cryptography option for a user of the handheld computing device; implementing, by the processor and handheld computing device, at least one cryptography process associated with a selected first cryptography option of the at least one cryptography option; maintaining the PK certificate on the handheld computing device; determining whether the processor has been disconnected from the handheld computing device; responsive to determining that the processor has been disconnected from the handheld computing device, encrypting at least one of;
a document, a folder, and a directory with a key of the PK certificate of the processor maintained on the handheld computing device. - View Dependent Claims (14, 15, 16, 17)
-
Specification