Method and apparatus for secure authentication and sensitive data management
First Claim
Patent Images
1. A method comprising:
- generating a first key component;
generating an encryption key using the first key component, a token key and a personal identification number (PIN);
encrypting data using the encryption key;
sending the data encrypted with the encryption key to a server along with the first key component.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for improved data management are described. In one embodiment, the method comprises generating a first key component, generating an encryption key using the first key component, a token key and a personal identification number (PIN), encrypting data using the encryption key, and sending the data encrypted with the encryption key to a server along with the first key component.
234 Citations
26 Claims
-
1. A method comprising:
-
generating a first key component;
generating an encryption key using the first key component, a token key and a personal identification number (PIN);
encrypting data using the encryption key;
sending the data encrypted with the encryption key to a server along with the first key component. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
encrypting data using the encryption key generating using a first key component, a token key and a personal identification number (PIN);
storing data encrypted using the encryption key; and
regenerating the encryption key after accessing the encrypted data to decrypt the encrypted data therewith. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method comprising:
-
retrieving a key component and encrypted data from a server;
recreating an encryption key using the key component, a token key and a personal identification number (PIN); and
performing a decryption operation on the encrypted data using a decryption key based on the encryption key used to encrypt the encrypted data.
-
-
21. A method for authentication comprising:
-
generating authentication data for a user based on a token key and a personal identification number (PIN), the token key being unique to the user; and
receiving a confirmation indicating that the authentication data has been verified.
-
-
22. A method comprising:
-
accessing encrypted data from a server;
decrypting the encrypted data using a token and a user-specific PIN to be accessed. - View Dependent Claims (23, 24, 25, 26)
-
Specification