Method of operating a computing device, computing device and computer program
First Claim
1. A computing device, comprising:
- a memory; and
at least one hardware processor communicatively coupled with the memory and configured to;
receive, at a first application and from a second application, a request requesting the first application to send the second application a data access application key, wherein both the first application and the second application execute on the computing device, the first application is different than the second application, the second application generates a public/private key pair including a public key and a private key, and the request includes the public key;
derive, at the first application, the requested data access application key as a function of at least the public key; and
send, from the first application to the second application, the derived data access application key, wherein the second application uses the derived data access application key to decrypt data that is stored in an encrypted form on the computing device.
3 Assignments
0 Petitions
Accused Products
Abstract
A computing device has a first application and a second application. The first application generates a data access application key for use by the second application to enable decryption of data that is stored in encrypted form on the computing device using the data access application key. In operation, the second application generates a public/private key pair. The second application sends a request to the first application for the first application to send the second application a data access application key, the request including the public key. The first application derives the requested data access application key as a function of at least the public key. The first application sends the derived data access application key to the second application.
-
Citations
30 Claims
-
1. A computing device, comprising:
-
a memory; and at least one hardware processor communicatively coupled with the memory and configured to; receive, at a first application and from a second application, a request requesting the first application to send the second application a data access application key, wherein both the first application and the second application execute on the computing device, the first application is different than the second application, the second application generates a public/private key pair including a public key and a private key, and the request includes the public key; derive, at the first application, the requested data access application key as a function of at least the public key; and send, from the first application to the second application, the derived data access application key, wherein the second application uses the derived data access application key to decrypt data that is stored in an encrypted form on the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of operating a computing device, the method comprising:
-
receiving, at a first application and from a second application, a request requesting the first application to send the second application a data access application key, wherein both the first application and the second application execute on the computing device, the first application is different than the second application, the second application generates a public/private key pair including a public key and a private key, and the request includes the public key; deriving, at the first application, the requested data access application key as a function of at least the public key; and sending, from the first application to the second application, the derived data access application key, wherein the second application uses the derived data access application key to decrypt data that is stored in an encrypted form on the computing device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer-readable medium containing instructions which, when executed, cause a computing device to perform operations comprising:
-
receiving, at a first application and from a second application, a request requesting the first application to send the second application a data access application key, wherein both the first application and the second application execute on the computing device, the first application is different than the second application, the second application generates a public/private key pair including a public key and a private key, and the request includes the public key; deriving, at the first application, the requested data access application key as a function of at least the public key; and sending, from the first application to the second application, the derived data access application key, wherein the second application uses the derived data access application key to decrypt data that is stored in an encrypted form on the computing device. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification