Method of preventing unauthorized distribution and use of electronic keys using a key seed
First Claim
1. A method of generating an electronic key used in an electronic transaction, said method comprising executing a one-way function on a host that derives said electronic key from a key seed saved in a non-volatile storage unit of said host and a unique host identification, said function being executed to derive said electronic key each time an electronic transaction requiring the use of said electronic key is made.
5 Assignments
0 Petitions
Accused Products
Abstract
A method and system for generating an electronic key used in an electronic transaction can be created by executing a one-way function on a host that derives the electronic key from a key seed saved in a non-volatile storage unit of the host and a unique host identification that is resident on the host. The function is preferably executed each time an electronic transaction requiring the use of the electronic key is made.
101 Citations
38 Claims
- 1. A method of generating an electronic key used in an electronic transaction, said method comprising executing a one-way function on a host that derives said electronic key from a key seed saved in a non-volatile storage unit of said host and a unique host identification, said function being executed to derive said electronic key each time an electronic transaction requiring the use of said electronic key is made.
-
10. A system for generating an electronic key used in an electronic transaction, said system comprising:
-
a host for making said electronic transaction, said host having a unique host identification;
a non-volatile storage unit of said host for storing a key seed; and
a one-way function, stored on said host, for deriving said electronic key from said key seed and said host identification, said host executing said one-way function to derive said electronic key each time an electronic transaction requiring the use of said electronic key is made. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system for securing an electronic transaction, said system comprising:
-
means for generating an electronic key based on a first electronic input and an electronic identifier unique to a host participating in said electronic transaction; and
means for using said electronic key for security in said electronic transaction - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38)
-
Specification