Hidden data backup and retrieval for a secure device
First Claim
1. A method of securely storing information, performed by a computer and storage system, said method comprising the steps of:
- receiving a request for storage from a user along with an irreversibly encrypted authentication code that is unique to a user identity;
receiving a reversibly encrypted information that has an encryption key different from the irreversibly encrypted authentication code; and
in response to the request, storing the reversibly encrypted information indexed to the irreversibly encrypted authentication code without any further identification of the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Authentication vicarious execution is rendered more secure in the handling of a user'"'"'s personal information. In such a system, an agent computer system, acting on behalf of the user, provides the personal information to various wide area network sites for conducting online transactions. A user of the system has a secure device with a built-in unique device identifier. A personal information backup center has a computer system to be coupled to the secure device during backup of the personal information separate from the agent. The personal information is encrypted with a unique user ID as a key. The user ID is entered by the user and is, for example, a user PIN. The user ID, e.g. PIN, is irreversibly encrypted to generate a unique irreversibly encrypted user identifier. The secure device includes a computer readable storage medium having computer readable data executable to control establishing a new account for the user, renewing an old account of the user with a new secure device and former device nullification, and transmitting of the encrypted information along with the unique device identifier and the unique irreversibly encrypted user identifier to the backup center. The unique device identifier and the unique irreversibly encrypted user identifier are used for indexing the storage of the encrypted information.
114 Citations
22 Claims
-
1. A method of securely storing information, performed by a computer and storage system, said method comprising the steps of:
-
receiving a request for storage from a user along with an irreversibly encrypted authentication code that is unique to a user identity;
receiving a reversibly encrypted information that has an encryption key different from the irreversibly encrypted authentication code; and
in response to the request, storing the reversibly encrypted information indexed to the irreversibly encrypted authentication code without any further identification of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A portable secure device, comprising:
-
a data transmission coupling;
a computer readable storage medium having thereon computer readable data executable to control sending and obtaining data through said coupling to and from a separate data storage;
said medium having thereon computer readable data representing a unique portable secure device ID;
said medium having thereon computer readable data executable to at least partially control irreversibly encrypting a unique user PIN to obtain a unique irreversibly encrypted user ID;
said medium having thereon computer readable data executable to at least partially control sending the unique portable secure device ID and the unique irreversibly encrypted user ID to the separate data storage to establish a record indexed on a combination of the unique portable secure device ID and the unique irreversibly encrypted user ID;
said medium having thereon computer readable data executable to at least partially control reversibly encrypting user information to obtain reversibly encrypted user information; and
said medium having thereon computer readable data executable to at least partially control sending the reversibly encrypted user information, the unique portable secure device ID, the unique irreversibly encrypted user ID and a request for storage to the separate data storage to become part of the record indexed on the combination of the unique portable secure device ID and the unique irreversibly encrypted user ID. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A data storage method performed by a portable secure device having a unique secure device ID, comprising the steps of:
-
irreversibly encrypting a unique user PIN to obtain a unique irreversibly encrypted user ID;
reversibly encrypting user information to obtain reversibly encrypted user information with an encryption key different from the encrypted user ID; and
sending, to a separate data storage through a data transmission coupling, the reversibly encrypted user information, the unique irreversibly encrypted user ID as the sole user identification and a request for storage. - View Dependent Claims (20, 21, 22)
-
Specification