Systems and methods for secure storage on a mobile device
First Claim
1. A computer-implemented method comprising:
- detecting, on a mobile computing device, an application security status, wherein when the application security status is active an application passcode is required to access functionality of a mobile application operating on the mobile computing device;
performing, on the mobile computing device, a first encryption of data associated with the mobile application, wherein the first encryption uses a first encryption key when the application security status is active, and wherein the first encryption uses a second encryption key when the application security status is not active;
detecting, on the mobile computing device, a mobile device passcode status, wherein when the mobile device passcode status is active a mobile device passcode is required to access functionality of the mobile computing device; and
performing, on the mobile computing device, a second encryption of the data when the mobile device passcode status is active, wherein the second encryption uses a third encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment the present invention includes a computer-implemented method for a mobile device. An application security status is detected. When the application security status is active an application passcode is required to access functionality of a mobile application operating on the mobile device. A first encryption of data associated with the mobile application is performed, where the first encryption uses a first encryption key when the application security status is active, and the first encryption uses a second encryption key when the application security status is not active. A mobile device passcode status is detected. When the mobile device passcode status is active a mobile device passcode is required to access functionality of the mobile computing device. A second encryption of the data is performed when the mobile device passcode status is active, where the second encryption uses a third encryption key.
31 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
detecting, on a mobile computing device, an application security status, wherein when the application security status is active an application passcode is required to access functionality of a mobile application operating on the mobile computing device; performing, on the mobile computing device, a first encryption of data associated with the mobile application, wherein the first encryption uses a first encryption key when the application security status is active, and wherein the first encryption uses a second encryption key when the application security status is not active; detecting, on the mobile computing device, a mobile device passcode status, wherein when the mobile device passcode status is active a mobile device passcode is required to access functionality of the mobile computing device; and performing, on the mobile computing device, a second encryption of the data when the mobile device passcode status is active, wherein the second encryption uses a third encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A mobile computing device comprising:
-
a processor; and a non-transitory computer readable medium having stored thereon one or more programs, which when executed by the processor, causes the processor to; detect an application security status, wherein when the application security status is active an application passcode is required to access functionality of a mobile application operating on the mobile computing device; perform a first encryption of data associated with the mobile application, wherein the first encryption uses a first encryption key when the application security status is active, and wherein the first encryption uses a second encryption key when the application security status is not active; detect a mobile device passcode status, wherein when the mobile device passcode status is active a mobile device passcode is required to access functionality of the mobile computing device; and perform a second encryption of the data when the mobile device passcode status is active, wherein the second encryption uses a third encryption key. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable storage medium storing one or more programs, the one or more programs comprising instructions for:
-
detecting an application security status, wherein when the application security status is active an application passcode is required to access functionality of a mobile application operating on a mobile computing device; performing a first encryption of data associated with the mobile application, wherein the first encryption uses a first encryption key when the application security status is active, and wherein the first encryption uses a second encryption key when the application security status is not active; detecting a mobile device passcode status, wherein when the mobile device passcode status is active a mobile device passcode is required to access functionality of the mobile computing device; and performing a second encryption of the data when the mobile device passcode status is active, wherein the second encryption uses a third encryption key. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification