SYSTEM AND METHOD FOR CONTENT PROTECTION BASED ON A COMBINATION OF A USER PIN AND A DEVICE SPECIFIC IDENTIFIER
First Claim
1. A method of generating a cryptographic key, the method comprising:
- receiving a user passcode on a device;
combining at least part of the user passcode with at least part of a non-extractable secret associated with the device to yield a derived key; and
encrypting content on the device with the derived key.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for encryption and key management. The method includes encrypting each file on a computing device with a unique file encryption key, encrypting each unique file encryption key with a corresponding class encryption key, and encrypting each class encryption key with an additional encryption key. Further disclosed are systems, methods, and non-transitory computer-readable storage media for encrypting a credential key chain. The method includes encrypting each credential on a computing device with a unique credential encryption key, encrypting each unique credential encryption key with a corresponding credential class encryption key, and encrypting each class encryption key with an additional encryption key. Additionally, a method of generating a cryptographic key based on a user-entered password and a device-specific identifier secret utilizing an encryption algorithm is disclosed.
-
Citations
22 Claims
-
1. A method of generating a cryptographic key, the method comprising:
-
receiving a user passcode on a device; combining at least part of the user passcode with at least part of a non-extractable secret associated with the device to yield a derived key; and encrypting content on the device with the derived key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for retrieving content protected by a derived key, the system comprising:
-
a processor; a first module configured to control the processor to retrieve, on a device, content protected by a derived key; a second module configured to control the processor to receive a user passcode; a third module configured to control the processor to generate a reproduced derived key by combining at least part of the user passcode with at least part of a device-specific secret; and a fourth module configured to control the processor to decrypt at least part of the content based on the reproduced derived key. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing instructions which, when executed by a computing device, cause the computing device to protect data on the computing device, the instructions comprising:
-
combining at least part of a user passcode with at least part of a non-extractable secret specific to the computing device to yield a derived key; and encrypting content on the computing device with the derived key. - View Dependent Claims (16, 17, 18)
-
-
19. A method for accessing protected content on a device, the method comprising:
-
requesting a user passcode from a user; receiving the user passcode from the user; combining the user passcode with a non-extractable unique secret stored in the device to yield a derived key; and unprotecting at least part of the protected content based on the derived key. - View Dependent Claims (20, 21, 22)
-
Specification