Supercharge Your Innovation With Domain-Expert AI Agents!

Two-factor content protection

A technology of content and protection function, applied in the field of protecting the content stored in the first device

Active Publication Date: 2007-12-26
RES IN MOTION LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] While these measures increase the security of the user's hard drive contents, if an unauthorized user is able to break the encryption on the hard drive's protected content, the unauthorized user may still be able to access sensitive information after an authorized user starts the computer with a smart card
[0006] Problems in providing content protection also arise when sensitive content is stored on other devices with memory, such as mobile communication devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-factor content protection
  • Two-factor content protection
  • Two-factor content protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the embodiments. However, one of ordinary skill in the art would understand that the embodiments may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail so as not to obscure the embodiments.

[0016] Figure 1 is a schematic diagram of an example system including an authentication device, according to some embodiments of the invention. System 100 includes personal computer 106 , smart card reader 102 and mobile device 104 . Smart card 103 is shown inserted in smart card reader 102 . The mobile device 104 includes a user input interface 105 and the personal computer 106 includes a user input interface 107 .

[0017] It is desirable to apply content protection to personal computers 106 and / or mobile devices 104 . Personal computer 106 and sma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for providing two-factor content protection includes a first device (404) that is enabled with content protection, and a second device (401) that is used to authenticate users of the first device. The first device (404) uses the public key (K PUBLIC ) of a public / private key pair belonging to the second device (401) to encrypt its content protection key.

Description

technical field [0001] The invention relates to a method for protecting content stored in a first device. Background technique [0002] When a computer is connected to a network such as a local area network (LAN) or the Internet, the computer's hard drive is exposed to attacks by other users who intend to obtain sensitive information on the hard drive without the owner's permission. Often, sensitive personal information such as Social Security numbers or proprietary company information is stored on a computer's hard drive. With this type of sensitive information, it is desirable to protect it from unauthorized users. For some computers, sensitive information may be stored using content protection, for example, by encrypting the information with a key generated from a password entered by a user of the device via an input interface of the computer. The passphrase can be used to generate an Advanced Encryption Standard (AES) key for an encryption algorithm. However, a common...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30G06F21/31G06F21/34G06F21/62
CPCG06F21/6218G06F21/31G06F21/34
Inventor 迈克尔・K・布朗尼尔・亚当斯迈克尔・S・布朗
Owner RES IN MOTION LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More