Image based key deprivation function
First Claim
Patent Images
1. A computing device comprising:
- a processor; and
a non-transitory computer-readable medium comprising code executable by the processor for implementing operations including;
receiving, from another computing device, an identifier and first encrypted data that was encrypted using an image-based derived key, the identifier being stored with the image-based derived key in an entry of a database;
determining the image-based derived key associated with the identifier,wherein the image-based derived key is generated from a selection of authentication images, and a combination of image identifiers and pixel properties of the authentication images is used as an image input value to an image-based derived key function, andwherein the image-based derived key is further generated based on;
an adjustable iteration count value being an input to the image-based derived key function indicating a number of repetitions that the image-based derived key function is performed to generate the image-based derived key;
an adjustable key length indicating a length of the image-based derived key; and
a salt value based on the identifier that is stored with the image-base derived key in the entry of the database; and
decrypting the first encrypted data.
0 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption. For some embodiments, a method is disclosed comprising determining an image-based derived key, wherein the image-based derived key is generated from a selection of authentication images chosen by a user, encrypting data using the image-based derived key, and transmitting the encrypted data.
-
Citations
20 Claims
-
1. A computing device comprising:
-
a processor; and a non-transitory computer-readable medium comprising code executable by the processor for implementing operations including; receiving, from another computing device, an identifier and first encrypted data that was encrypted using an image-based derived key, the identifier being stored with the image-based derived key in an entry of a database; determining the image-based derived key associated with the identifier, wherein the image-based derived key is generated from a selection of authentication images, and a combination of image identifiers and pixel properties of the authentication images is used as an image input value to an image-based derived key function, and wherein the image-based derived key is further generated based on; an adjustable iteration count value being an input to the image-based derived key function indicating a number of repetitions that the image-based derived key function is performed to generate the image-based derived key; an adjustable key length indicating a length of the image-based derived key; and a salt value based on the identifier that is stored with the image-base derived key in the entry of the database; and decrypting the first encrypted data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method comprising:
-
receiving, from a computing device, an identifier and first encrypted data that was encrypted using an image-based derived key, the identifier being stored with the image-based derived key in an entry of a database; determining the image-based derived key associated with the identifier, wherein the image-based derived key is generated from a selection of authentication images, and a combination of image identifiers and pixel properties of the authentication images is used as an image input value to an image-based derived key function, and wherein the image-based derived key is further generated based on; an adjustable iteration count value being an input to the image-based derived key function indicating a number of repetitions that the image-based derived key function is performed to generate the image-based derived key; an adjustable key length indicating a length of the image-based derived key; and a salt value based on the identifier that is stored with the image-based derived key in the entry of the database and decrypting the first encrypted data. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification