DATA MANAGEMENT METHOD
First Claim
Patent Images
1. A data management method comprising:
- storing a second encryption key for encrypting a first encryption key, and a third encryption key for encrypting data when the data is transmitted;
decrypting the first encryption key by using the second encryption key, in response to receiving the first encryption key;
decrypting data by using the first encryption key, in response to receiving the data encrypted with the first encryption key;
encrypting the data with the third encryption key; and
transmitting the data encrypted with the third encryption key externally.
2 Assignments
0 Petitions
Accused Products
Abstract
A data management method includes decrypting the first encryption key using the second encryption in response to receiving the first encryption key, decrypting the data by using the first encryption key in response to receiving the data encrypted with the first encryption key, and encrypting the data with the third encryption key and transmitting the data externally.
31 Citations
20 Claims
-
1. A data management method comprising:
-
storing a second encryption key for encrypting a first encryption key, and a third encryption key for encrypting data when the data is transmitted; decrypting the first encryption key by using the second encryption key, in response to receiving the first encryption key; decrypting data by using the first encryption key, in response to receiving the data encrypted with the first encryption key; encrypting the data with the third encryption key; and transmitting the data encrypted with the third encryption key externally. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A data management method comprising:
-
receiving an encryption key and data, the encryption key being encrypted with a first transmission key, the data being encrypted with the encryption key; decrypting the encryption key using the first transmission key which is input directly; decrypting the data with the encryption key; encrypting the data by using a second transmission key, different from the first transmission key; and inputting the data to an electronic device after encoding the data encrypted with the second transmission key in a transmission format. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A data management method comprising:
-
receiving, via direct input, a first key and a second key; receiving a third key encrypted with the first key; decrypting the third key using the first key; receiving data encrypted with the third key; decrypting the data with the third key; encrypting the data with the second key; and inputting the data to an electronic device. - View Dependent Claims (17, 18, 19, 20)
-
Specification