×

System, method and apparatus for cryptography key management for mobile devices

  • US 9,425,958 B2
  • Filed: 08/05/2005
  • Issued: 08/23/2016
  • Est. Priority Date: 08/05/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising binding encryption and decryption keys using a unique user identifier (UID), a unique device identifier (UDID), and a user password (Pswd) to a client mobile device in an enterprise cryptography key management system, wherein binding the encryption and decryption keys comprises:

  • requesting the UDID from the client mobile device by the cryptography key management system;

    receiving a hashed unique device identifier H(UDID) encrypted by the Pswd by the cryptography key management system from a key management application module included on the client mobile device; and

    associating the H(UDID) with the user account, comprising;

    decrypting the encrypted H(UDID) by the cryptography key management system using the Pswd;

    if decryption fails, then terminating communication with the client mobile device; and

    if the decryption is successful, then validating integrity of the decrypted H(UDID) by comparing the H(UDID) sent by the key management application module with other H(UDID)s in the cryptography key management system to ensure that the H(UDID) is unique for the client mobile device; and

    registering a cryptography/data recovery key for the associated client mobile device with the enterprise using the cryptography/data recovery key, the UID, the H(UDID), and a unique key identifier (KeyID),wherein registering the cryptography/data recovery key for the associated client mobile device with the enterprise comprises, upon validating that the H(UDID) exists for the UID;

    storing the data recovery key and the KeyID associated with the UDID by the cryptography key management system,encrypting the KeyID using a symmetric cryptography key derived from the Pswd to obtain a password-encrypted KeyID and sending the password-encrypted KeyID to the key management application module by the cryptography key management system, anddecrypting the password-encrypted KeyID using a symmetric cryptography key derived from the password to obtain the KeyID and storing the obtained KeyID by the key management application module.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×