The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 10, 2014

Filed:

Jun. 25, 2010
Applicants:

William M. Duane, Westford, MA (US);

Robert W. Griffin, Hollis, NH (US);

John S. Harwood, Paxton, MA (US);

Gregory W. Lazar, Upton, MA (US);

Thomas E. Linnell, Northborough, MA (US);

Inventors:

William M. Duane, Westford, MA (US);

Robert W. Griffin, Hollis, NH (US);

John S. Harwood, Paxton, MA (US);

Gregory W. Lazar, Upton, MA (US);

Thomas E. Linnell, Northborough, MA (US);

Assignee:

EMC Corporation, Hopkinton, MA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 11/30 (2006.01); G06F 3/12 (2006.01); H04L 12/417 (2006.01); H04L 9/08 (2006.01);
U.S. Cl.
CPC ...
G06F 3/1204 (2013.01); H04L 12/417 (2013.01); H04L 9/0894 (2013.01);
Abstract

A method of securely operating a computerized system includes forming a connection to a user-removable physical security device (PSD) which is uniquely paired with the computerized system and which stories cryptographically secured data required for performing a protected function on the computerized system. The PSD may be realized as a USB or similar peripheral device containing security-related data and potentially security processing capability as well. The protected function could be decrypting of encrypted data encryption keys used to encrypt/decrypt user data for example. A user who has an established association with the PSD (e.g. by some preceding registration process) is authenticated, resulting in activation of the PSD on the computerized system. Upon such activation of the PSD, the computerized system engages in a security operation using the cryptographically secured data from the PSD to enable the protected function to be performed under control of the user on the computerized system.


Find Patent Forward Citations

Loading…