System and method for securing wireless data
First Claim
Patent Images
1. A method in a device for handling encrypted data, comprising:
- receiving encrypted data for a specific recipient from a rules database, the encrypted data having been encrypted at the rules database using an encryption key, wherein recipient user identification information associated with the specific recipient is stored on an external security information source and the rules database contains a copy of the recipient user identification information;
obtaining external user identification information from the external security information source, wherein the external security information source has a location proximate to the device;
obtaining a public key from the rules database, wherein the public key is generated based on the copy of the recipient user identification information and the encryption key;
generating a decryption key using the public key and the external user identification information;
decrypting the encrypted data using the decryption key; and
wherein the encrypted data is accessible when the external user identification information matches the recipient user identification information.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for operation upon a data processing device for handling secure data stored on the device. The device is configurable to communicate over a data channel with an external security information source. User identification information is received from the external security information source which identifies a user of the device. The device, based upon the received user identification information, determines whether the secure data stored on the device is to be accessed by a user of the device.
-
Citations
20 Claims
-
1. A method in a device for handling encrypted data, comprising:
-
receiving encrypted data for a specific recipient from a rules database, the encrypted data having been encrypted at the rules database using an encryption key, wherein recipient user identification information associated with the specific recipient is stored on an external security information source and the rules database contains a copy of the recipient user identification information; obtaining external user identification information from the external security information source, wherein the external security information source has a location proximate to the device; obtaining a public key from the rules database, wherein the public key is generated based on the copy of the recipient user identification information and the encryption key; generating a decryption key using the public key and the external user identification information; decrypting the encrypted data using the decryption key; and wherein the encrypted data is accessible when the external user identification information matches the recipient user identification information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A wireless device for handling encrypted data, comprising:
-
a wireless transceiver for communicating over a data channel; and
wherein;the wireless device is configured to receive encrypted data for a specific recipient from a rules database, the encrypted data having been encrypted at the rules database using an encryption key, wherein recipient user identification information associated with the specific recipient is stored on an external security information source and the rules database contains a copy of the recipient user identification information; the wireless device is configured to receive external user identification information from the external security information source, wherein the external security information source has a location proximate to the device; the wireless device is configured to receive a public key from the rules database, wherein the public key is generated based on the copy of the recipient user identification information and the encryption key; the wireless device is configured to generate a decryption key using the public key and the external user identification information; the wireless device is configured to decrypt the encrypted data using the decryption key; and the wireless device is configured to make the encrypted data accessible when the external user identification information matches the recipient user identification information. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A wireless device comprising:
-
means for receiving encrypted data for a specific recipient from a rules database, the encrypted data having been encrypted at the rules database using an encryption key, wherein recipient user identification information associated with the specific recipient is stored on an external security information source and the rules database contains a copy of the recipient user identification information means for receiving external user identification information from the external security information source, wherein the external security information source has a location proximate to the device; means for receiving a public key from the rules database, wherein the public key is generated based on the copy of the recipient user identification information and the encryption key; means for generating a decryption key using the public key and the external user identification information; means for decrypting the encrypted data using the decryption key; and means for making the encrypted data accessible when the external user identification information matches the recipient user identification information.
-
Specification