发明名称 Decryption and encryption of application data
摘要 Examples disclose providing a decryption, validation and encryption process. Specifically, disclosure includes decrypting a first encrypted application data to then validate its integrity. Disclosure also includes encrypting the decrypted application data using a technique different from that used to provide the first encrypted application data and then storing the encrypted application data.
申请公布号 US9489520(B2) 申请公布日期 2016.11.08
申请号 US201114347550 申请日期 2011.09.29
申请人 Hewlett-Packard Development Company, L.P. 发明人 Martin Robert P;Hochmuth Roland M
分类号 G06F21/60;G06F21/62;G06F21/64;G11B20/00;G06Q20/12;G06F21/12;G06F21/10 主分类号 G06F21/60
代理机构 HP Inc Patent Department 代理人 HP Inc Patent Department
主权项 1. A method for preventing unauthorized access to application data comprising: receiving, from a trusted source at a trusted source location, a first encrypted application data at a computing device at a first location, wherein the trusted source uses a first encryption technique at the trusted source location; decrypting, the first encrypted application data received at the computing device from the trusted source to generate a first decrypted application data on the computing device; validating an integrity of the first decrypted application data on the computing device by computing a data value from the first encrypted application data and comparing the data value to a stored value on the trusted source; encrypting, at the first location, the first decrypted application data on the computing device with an encryption technique different from the first encryption technique used for the first encrypted application data to generate a second encrypted application data, wherein the encryption technique on the computing device is an encryption program which uses a key specific to a user of the computing device; storing the second encrypted application data on a memory of the computing device; decrypting the second encrypted application data to generate a second decrypted application data; and executing the second decrypted application data on the computing device; validating the integrity of the second decrypted application data; and receiving a status update of the second decrypted application data from the trusted source.
地址 Houston TX US