×

Protecting sensitive information using a trusted device

  • US 9,654,452 B2
  • Filed: 11/10/2014
  • Issued: 05/16/2017
  • Est. Priority Date: 11/11/2013
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for protecting sensitive information, the method comprising:

  • receiving first information transmitted by an untrusted device, where the first information enables the sensitive information to be transmitted from a trusted device to a server;

    receiving the sensitive information input by a user;

    generating second information based on the first information and the sensitive information;

    encrypting at least the sensitive information in the second information with a first secret key;

    transmitting the second information containing the encrypted sensitive information to the untrusted device for forwarding to the server indicated by the first information;

    receiving an authentication identification originated from the server and forwarded by the untrusted device;

    decrypting the authentication identification; and

    transmitting the decrypted authentication identification to the untrusted device to enable the untrusted device to use the authentication identification to communicate with the server;

    wherein the first secret key meets one of the following;

    the untrusted device does not know the first secret key; and

    the untrusted device knows the first secret key but is unable use the first secret key to decrypt the encrypted sensitive information.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×