×

Differential encryption utilizing trust modes

  • US 8,769,272 B2
  • Filed: 06/15/2012
  • Issued: 07/01/2014
  • Est. Priority Date: 04/02/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for implementing data security comprising:

  • generating a plurality of trust modes, each trust mode associated with data stored at a security device and associated with a set of access requirements, wherein each data access requirement associated with a trust mode must be satisfied before the data associated with the trust mode can be accessed, wherein at least one access requirement associated with a trust mode comprises a requirement that a user possess one or more encryption keys used to encrypt data stored at the security device;

    receiving, from a user device associated with a user, a request to access the data stored at the security device;

    responsive to the request, determining whether the user device is communicatively coupled to the security device;

    responsive to a determination that the user device is communicatively coupled to the security device, implementing a first trust mode associated with a first set of access requirements that must be satisfied by either the user or the user device before the request to access the data stored at the security device is granted;

    responsive to a determination that the user device is not communicatively coupled to the security device, implementing a second trust mode associated with a second set of access requirements that must be satisfied by either the user or the user device before the request to access the data stored at the security device is granted, wherein the second set of access requirements is greater than the first set of access requirements;

    for each data access requirement defined by the implemented trust mode, determining whether the user or the user device satisfies each of the set of data access requirements associated with the implemented trust mode; and

    granting the user permission to access to the requested data via the user device responsive to a determination that the user or the user device satisfies each of the set of access requirements associated with the implemented trust mode.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×