×

Protecting sensitive information using an untrusted device

  • US 9,853,954 B2
  • Filed: 11/10/2014
  • Issued: 12/26/2017
  • Est. Priority Date: 11/11/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method for protecting sensitive information, the method comprising:

  • responsive to determining that sensitive information is required by a server, establishing a connection between the server and an untrusted device;

    responsive to receiving a public key from the server at the untrusted device, transmitting the public key to a trusted device connected to the untrusted device;

    generating a Uniform Resource Locator (URL) for population with the sensitive information by the trusted device;

    transmitting the generated URL to the trusted device, wherein the sensitive information is inputted on the trusted device through the untrusted device and the trusted device populates the generated URL with the sensitive information;

    receiving an encrypted URL transmitted by the trusted device, wherein the encrypted URL is generated by the trusted device based on the generated URL and the encrypted URL includes the sensitive information encrypted with a first secret key, wherein the first secret key is the public key;

    forwarding the encrypted URL to the server, wherein the untrusted device is unable to use the first secret key to decrypt the sensitive information present in the encrypted URL; and

    responsive to receiving an authentication identification transmitted by the server based on the sensitive information, communicating with the server by using the authentication identification.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×