The patent's assignee for patent number 8509449 is
News editors obtained the following quote from the background information supplied by the inventors: "As computer storage technology has advanced, high capacity portable storage devices have become increasingly commonplace. While these storage devices can store a large amount of information, their portable nature and frequently small size allows them to be easily lost or stolen. Accordingly, security mechanisms are being developed that protect the data stored on portable devices. However, such security mechanisms typically involve additional steps or actions that need to be taken by the user in order for the protection to be applied. Such additional steps or actions can result in user frustration, as well as users simply not protecting their portable devices in order to avoid the additional steps or actions."
As a supplement to the background information on this patent, VerticalNews correspondents also obtained the inventors' summary information for this patent: "This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
"In accordance with one or more aspects, a key protector for a storage volume is created by generating an intermediate key and protecting, based at least in part on a public/private key pair of an entity, the intermediate key. A volume master key for encrypting and decrypting one or more volume encryption keys that are used to encrypt the storage volume can be encrypted in different manners, including being encrypted based at least in part on the intermediate key. A key protector for the storage volume is stored, the key protector being associated with the entity and including both the encrypted volume master key and information indicating how to obtain the intermediate key.
"In accordance with one or more aspects, accessing an encrypted storage volume includes obtaining a private key of an entity associated with a key protector stored on the encrypted storage volume. An intermediate key is also obtained based at least in part on the private key. The intermediate key is used to decrypt a volume master key from the key protector for decrypting one or more volume encryption keys that are used to decrypt the storage volume."
For additional information on this patent, see: Ureche, Octavian T.; Sinha, Gaurav; Dussart, Nils; Liu, Yi; Bharadwaj, Vijay G.; Ferguson, Niels T.. Key Protector for a
Keywords for this news article include:
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2013, NewsRx LLC
Most Popular Stories
- NSA Defends Global Cellphone Tracking Legality
- Ad Counts Rise in 2013 for Hispanic Magazines
- Top Websites for U.S. Hispanics
- Networks Vie for U.S. Hispanic TV Viewers
- Saab Gets Back into the Game; U.S. Auto Sales Soar
- Apple Activates Customer-Tracking iBeacon
- Dell Offers Undisclosed Number of Employee Buyouts
- Authorities Close to Deal with JPMorgan Chase over Madoff Response
- 2013 Tech Gift Guide: iPad Mini Still Hot; Chromecast a Great Low-Cost Option
- A Biography of Jonathan Ive, Apple's Creative Chief