×

KEY MANAGEMENT TO PROTECT ENCRYPTED DATA OF AN ENDPOINT COMPUTING DEVICE

  • US 20100303240A1
  • Filed: 05/28/2009
  • Published: 12/02/2010
  • Est. Priority Date: 05/28/2009
  • Status: Active Grant
First Claim
Patent Images

1. In a computing system environment, a method of protecting encrypted data of an endpoint computing device, the encrypted data able to be decrypted with a key located at the endpoint computing device, comprising:

  • determining whether the encrypted data has been compromised;

    upon a subsequent booting of the endpoint, launching a pre-boot phase of operation during which time a pre-boot operating system prevents a user of the endpoint from accessing the encrypted data and the key, the pre-boot phase of operation further including,determining whether the key requires disassociation from the encrypted data; and

    if so, disassociating the key.

View all claims
  • 16 Assignments
Timeline View
Assignment View
    ×
    ×