Secure relocation of encrypted files
    1.
    发明授权
    Secure relocation of encrypted files 有权
    安全地重新安置加密文件

    公开(公告)号:US08886963B2

    公开(公告)日:2014-11-11

    申请号:US13233090

    申请日:2011-09-15

    IPC分类号: G06F21/00 G06F21/62

    CPC分类号: G06F21/6218

    摘要: Systems and methods are disclosed for secure relocation of encrypted files for a system having non-volatile memory (“NVM”). A system can include an encryption module that is configured to use a temporary encryption seed (e.g., a randomly generated key and a corresponding initialization vector) to decrypt and encrypt data files in an NVM. These data files may have originally been encrypted with different encryption seeds. Using such an approach, data files can be securely relocated even if the system does not have access to the original encryption seeds. In addition, the temporary encryption seed allows the system to bypass a default key scheme.

    摘要翻译: 公开了用于具有非易失性存储器(“NVM”)的系统的加密文件的安全重定位的系统和方法。 系统可以包括被配置为使用临时加密种子(例如,随机生成的密钥和相应的初始化向量)来加密NVM中的数据文件的加密模块。 这些数据文件最初可能用不同的加密种子加密。 使用这种方法,即使系统无法访问原始加密种子,也可以安全地重新定位数据文件。 此外,临时加密种子允许系统绕过默认密钥方案。

    SECURE RELOCATION OF ENCRYPTED FILES
    2.
    发明申请
    SECURE RELOCATION OF ENCRYPTED FILES 有权
    加密文件的安全转移

    公开(公告)号:US20130073870A1

    公开(公告)日:2013-03-21

    申请号:US13233090

    申请日:2011-09-15

    IPC分类号: G06F12/14

    CPC分类号: G06F21/6218

    摘要: Systems and methods are disclosed for secure relocation of encrypted files for a system having non-volatile memory (“NVM”). A system can include an encryption module that is configured to use a temporary encryption seed (e.g., a randomly generated key and a corresponding initialization vector) to decrypt and encrypt data files in an NVM. These data files may have originally been encrypted with different encryption seeds. Using such an approach, data files can be securely relocated even if the system does not have access to the original encryption seeds. In addition, the temporary encryption seed allows the system to bypass a default key scheme.

    摘要翻译: 公开了用于具有非易失性存储器(NVM)的系统的加密文件的安全重定位的系统和方法。 系统可以包括被配置为使用临时加密种子(例如,随机生成的密钥和相应的初始化向量)来加密NVM中的数据文件的加密模块。 这些数据文件最初可能用不同的加密种子加密。 使用这种方法,即使系统无法访问原始加密种子,也可以安全地重新定位数据文件。 此外,临时加密种子允许系统绕过默认密钥方案。

    System and method for device dependent and rate limited key generation
    7.
    发明授权
    System and method for device dependent and rate limited key generation 有权
    用于设备依赖和速率限制密钥生成的系统和方法

    公开(公告)号:US08681976B2

    公开(公告)日:2014-03-25

    申请号:US13106268

    申请日:2011-05-12

    IPC分类号: H04L29/06

    CPC分类号: H04L9/0863 H04L9/0866

    摘要: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a device dependent cryptographic key in a rate-limited way. A system configured to practice the method first receives data associated with a user. The data associated with the user can be a password, a personal identification number (PIN), or a hash of the password. Then the system performs a first encryption operation on the user data based on a device-specific value to yield first intermediate data and performs a second encryption operation on the first intermediate data based on the device-specific value to yield second intermediate data. Then the system iteratively repeats the second encryption operation until a threshold is met, wherein each second encryption operation is performed on the second intermediate data from a previous second encryption operation. The iterations produce a final cryptographic key which the system can then output or use for a cryptographic operation.

    摘要翻译: 本文公开了用于以速率限制的方式生成依赖于设备的加密密钥的系统,方法和非暂时的计算机可读存储介质。 被配置为练习该方法的系统首先接收与用户相关联的数据。 与用户相关联的数据可以是密码,个人识别码(PIN)或密码的散列。 然后,系统基于设备特定值对用户数据执行第一加密操作,以产生第一中间数据,并且基于设备特定值对第一中间数据执行第二加密操作以产生第二中间数据。 然后,系统迭代地重复第二加密操作,直到满足阈值,其中从先前的第二加密操作对第二中间数据执行每个第二加密操作。 迭代产生最终的加密密钥,系统然后可以输出或用于加密操作。

    TRUST EXCEPTION MANAGEMENT
    9.
    发明申请
    TRUST EXCEPTION MANAGEMENT 有权
    信托例外管理

    公开(公告)号:US20090228986A1

    公开(公告)日:2009-09-10

    申请号:US12347691

    申请日:2008-12-31

    IPC分类号: G06F21/00

    摘要: A machine implemented method includes storing a first data representing a prior exception to a first trust failure (e.g., expired certificate). The prior exception may be stored as part of establishing a first communication with a data processing system (e.g., a handheld device). The first communication may not be trustworthy. The method may determine, as part of establishing a second communication with the data processing system, that a second trust failure has occurred. The second trust failure (e.g., revoked certificate) indicates that the second communication may not be trustworthy. The method may determine whether the prior exception applies to the second trust failure. If the prior exception does not apply, the data processing system determines, automatically, whether to create a new exception for the second trust failure.

    摘要翻译: 机器实现的方法包括将表示先前异常的第一数据存储到第一信任失败(例如,过期证书)。 可以将先前的例外存储为与数据处理系统(例如,手持设备)建立第一通信的一部分。 第一个通信可能不值得信赖。 作为与数据处理系统建立第二通信的一部分,该方法可以确定发生了第二信任故障。 第二信任失败(例如撤销的证书)指示第二通信可能不可信。 该方法可以确定先前的异常是否适用于第二信任失败。 如果先前的异常不适用,则数据处理系统自动确定是否为第二个信任失败创建新的异常。

    SYSTEM AND METHOD FOR DEVICE DEPENDENT AND RATE LIMITED KEY GENERATION
    10.
    发明申请
    SYSTEM AND METHOD FOR DEVICE DEPENDENT AND RATE LIMITED KEY GENERATION 有权
    用于设备依赖和速率的系统和方法有限的主要生成

    公开(公告)号:US20120288089A1

    公开(公告)日:2012-11-15

    申请号:US13106268

    申请日:2011-05-12

    IPC分类号: H04L9/06

    CPC分类号: H04L9/0863 H04L9/0866

    摘要: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a device dependent cryptographic key in a rate-limited way. A system configured to practice the method first receives data associated with a user. The data associated with the user can be a password, a personal identification number (PIN), or a hash of the password. Then the system performs a first encryption operation on the user data based on a device-specific value to yield first intermediate data and performs a second encryption operation on the first intermediate data based on the device-specific value to yield second intermediate data. Then the system iteratively repeats the second encryption operation until a threshold is met, wherein each second encryption operation is performed on the second intermediate data from a previous second encryption operation. The iterations produce a final cryptographic key which the system can then output or use for a cryptographic operation.

    摘要翻译: 本文公开了用于以速率限制的方式生成依赖于设备的加密密钥的系统,方法和非暂时的计算机可读存储介质。 被配置为练习该方法的系统首先接收与用户相关联的数据。 与用户相关联的数据可以是密码,个人识别码(PIN)或密码的散列。 然后,系统基于设备特定值对用户数据执行第一加密操作,以产生第一中间数据,并且基于设备特定值对第一中间数据执行第二加密操作以产生第二中间数据。 然后,系统迭代地重复第二加密操作,直到满足阈值,其中从先前的第二加密操作对第二中间数据执行每个第二加密操作。 迭代产生最终的加密密钥,系统然后可以输出或用于加密操作。