发明名称 PROTECTING SENSITIVE INFORMATION USING AN UNTRUSTED DEVICE
摘要 The invention relates to information processing field, and discloses a method for protecting sensitive information, comprising: determining that the sensitive information is required by a server; transmitting first information to a trusted device connected to the untrusted device, where the first information enables the sensitive information to be transmitted from the trusted device to the server, wherein the sensitive information is input on the trusted device; receiving second information transmitted by the trusted device, the second information is generated based on the first information and includes the sensitive information encrypted with a first secret key, wherein the first secret key meets one of the following: the untrusted device does not know the first secret key; the untrusted device knows the first secret key but is unable to use the first secret key to decrypt the encrypted sensitive information; forwarding the second information to the server.
申请公布号 US2016352697(A1) 申请公布日期 2016.12.01
申请号 US201414537223 申请日期 2014.11.10
申请人 International Business Machines Corporation 发明人 Li Qining;Wang Xi Qing;Yan Yan;Yang Zhen Xiang;Zhao Shiwan
分类号 H04L29/06;H04L9/30;H04L9/14 主分类号 H04L29/06
代理机构 代理人
主权项 1. A method for protecting sensitive information, the method being executed on an untrusted device, the method comprising: determining that the sensitive information is required by a server; transmitting first information to a trusted device connected to the untrusted device, where the first information enables the sensitive information to be transmitted from the trusted device to the server, wherein the sensitive information is input on the trusted device; receiving second information transmitted by the trusted device, where the second information is generated based on the first information and the second information includes the sensitive information encrypted with a first secret key; and forwarding the second information to the server; wherein the first secret key meets one of the following: the untrusted device does not know the first secret key; and the untrusted device knows the first secret key but is unable to use the first secret key to decrypt the encrypted sensitive information.
地址 Armonk NY US