Systems and methods for protecting data stored on removable storage devices by requiring external user authentication
First Claim
1. A computer-implemented method for protecting data stored on removable storage devices by requiring external user authentication, at least a portion of the method being performed by a removable storage device comprising at least one processor, the method comprising:
- identifying an attempt by a computing device to access encrypted data stored on the removable storage device;
prior to allowing access to the encrypted data, authenticating a user of the computing device by;
obtaining, at the removable storage device, security credentials from the user, wherein the security credentials comprise a time-synchronized password generated by an external authentication device that is valid for only one login session;
verifying, at the removable storage device, the validity of the security credentials;
upon authenticating the user, allowing access to the encrypted data stored on the removable storage device for only one login session.
6 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for protecting data stored on removable storage devices may include (1) identifying an attempt by a computing device to access encrypted data stored on a removable storage device and then, prior to allowing access to the encrypted data, (2) authenticating a user of the computing device by (a) obtaining security credentials from the user that include a time-synchronized authentication code generated by an external authentication device and (b) verifying the validity of the security credentials. Upon authenticating the user, the method may include allowing access to the encrypted data stored on the removable storage device. Various additional methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for protecting data stored on removable storage devices by requiring external user authentication, at least a portion of the method being performed by a removable storage device comprising at least one processor, the method comprising:
-
identifying an attempt by a computing device to access encrypted data stored on the removable storage device; prior to allowing access to the encrypted data, authenticating a user of the computing device by; obtaining, at the removable storage device, security credentials from the user, wherein the security credentials comprise a time-synchronized password generated by an external authentication device that is valid for only one login session; verifying, at the removable storage device, the validity of the security credentials; upon authenticating the user, allowing access to the encrypted data stored on the removable storage device for only one login session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method for authenticating users of removable storage devices, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
receiving a request from a user for a password for accessing a removable storage device; authenticating the user by; obtaining security credentials from the user; verifying the validity of the security credentials; generating a time-synchronized password for the user that is valid for only one login session using; a timestamp obtained from a real-time clock that has been synchronized with an additional real-time clock located within the removable storage device; a seed value associated with the removable storage device; providing the time-synchronized password to the user to enable the user to provide the time-synchronized password to the removable storage device to gain access to the encrypted data for the only one login session. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A removable storage device comprising:
-
memory; an authentication module programmed to; identify an attempt by a computing device to access encrypted data stored in the memory of the removable storage device; prior to allowing access to the encrypted data, authenticate a user of the computing device by; obtaining, at the removable storage device, security credentials from the user, wherein the security credentials comprise a time-synchronized password generated by an external authentication device that is valid for only one login session; verifying, at the removable storage device, the validity of the security credentials; upon authenticating the user, allow access to the encrypted data stored in the memory of the removable storage device for only one login session; at least one processor configured to execute the authentication module. - View Dependent Claims (19, 20)
-
Specification