Method and device for credential and data protection
First Claim
Patent Images
1. A computer-implemented security method for securing data and logins comprising:
- capturing user biometric data;
transforming the captured user biometric data;
generating a random primary code through algorithmic manipulation of the transformed user biometric data;
generating a protected secure code through algorithmic manipulation of the transformed user biometric data and the random primary code;
generating secure credentials using the random primary code, site or application identifying data, and captured user data;
dynamically generating data protection encryption keys using said random protected secure code, file identifying data, and user data;
dynamically generating without storing all keys, credentials, and random primary codes; and
using the data protection encryption keys to encrypt, when writing, or to decrypt, when reading, at-rest data files or in-motion data streams.
0 Assignments
0 Petitions
Accused Products
Abstract
A security method and system for capturing user specific binary information used to identify the user; using the user specific binary information to generate a secured primary code, generating strong user credentials for accessing web based or applications logins, intercepting credential requests from local applications or remote web sites, regenerating strong user credentials dynamically, using the secure primary code to generate encryption keys for protection of data inside or outside the machine of creation, and using secure primary code protection in conjunction with subsidiary key exchanges to allow data sharing while retaining data security.
-
Citations
9 Claims
-
1. A computer-implemented security method for securing data and logins comprising:
-
capturing user biometric data; transforming the captured user biometric data; generating a random primary code through algorithmic manipulation of the transformed user biometric data; generating a protected secure code through algorithmic manipulation of the transformed user biometric data and the random primary code; generating secure credentials using the random primary code, site or application identifying data, and captured user data; dynamically generating data protection encryption keys using said random protected secure code, file identifying data, and user data; dynamically generating without storing all keys, credentials, and random primary codes; and using the data protection encryption keys to encrypt, when writing, or to decrypt, when reading, at-rest data files or in-motion data streams.
-
-
2. A computer-implemented security method for managing and providing user credentials comprising:
-
using application software initiated during system startup for intercepting password requests from browsers or local applications and collecting site, application and user specific data; generating credentials for a web site or local application by generating a primary code through algorithmic manipulation of transformed user binary data without storage of said input user binary data; generating a protected secure code through algorithmic manipulation of the transformed user binary data and the random primary code; generating secure credentials using said primary code, site or application identifying data, and user data; dynamically generating data protection encryption keys using said secure primary code, file identifying data, and user data; dynamically generating without storing all keys, credentials, and primary codes; transparently encrypting data on write, and transparently decrypting data on reads using raw data, file-specific information and user-specific information; and using the data protection encryption keys to encrypt, when writing, or to decrypt when reading, at-rest data files or in-motion data streams. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
Specification