Abstract:
A method herein is for encryption key update in a station. In the method, a first data block is encrypted using a first plurality of round keys over a first plurality of rounds to generate a first encrypted data block, wherein the first plurality of round keys are generated based on an initial block key. A round key of the first plurality of round keys is retained for use as a basis for a first derived block key. A second data block is encrypted using a second plurality of round keys over a second plurality of rounds to generate a second encrypted data block, wherein the second plurality of round keys are generated based on the first derived block key. A round key of the second plurality of round keys may be retained for use as a basis for a second derived block key.
Abstract:
Disclosed is an apparatus, system, and method to decrypt an encrypted account credential at a second device that is received from a first device. The second device may receive a first share of a master key and the encrypted account credential from the first device. The second device may reconstruct the master key with the first share of the master key and a second share of the master key stored at the second device. The second device may decrypt the encrypted account credential with the reconstructed master key. Based upon the decrypted account credential, the second device may be enabled to access an account based upon the decrypted account credential.
Abstract:
Systems and methods for protecting digital assets (40) associated with a computing device are described herein. An example of a method according to the disclosure includes assigning at least one asset worth value to respective digital assets (40) associated with a device (10), computing at least one device worth value using the at least one asset worth value assigned to the digital assets (40) associated with the device (10), identifying at least one device worth value threshold, performing a comparison of the at least one device worth value to the at least one worth value threshold, and initiating at least one action with respect to the digital assets (40) associated with the device (10) based on the comparison.