×

Sealing secret data with a policy that includes a sensor-based constraint

  • US 9,411,970 B2
  • Filed: 08/19/2011
  • Issued: 08/09/2016
  • Est. Priority Date: 08/19/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method executed at a mobile computing device, the method comprising:

  • at a processor on a mobile computing device;

    receiving, from an application executing on the mobile computing device, a request to access secret data retained on computer-readable storage of the mobile computing device;

    responsive to receiving the request, retrieving an encrypted policy from the computer-readable storage on the mobile computing device and decrypting the encrypted policy, the policy comprising a sensor-based constraint, the sensor-based constraint tied to a sensor on the mobile computing device, the policy defines a value from the sensor that satisfies the sensor-based constraint;

    responsive to retrieving and decrypting the encrypted policy, requesting a sensor reading from the sensor on the mobile computing device;

    receiving the sensor reading;

    determining whether the policy is satisfied based upon a comparison between the value defined in the policy and the sensor reading from the sensor; and

    when and only when the policy is satisfied, providing the application with the secret data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×