PROVIDING CRYPTOGRAPHIC KEY BASED ON USER INPUT DATA
First Claim
1. An invention comprising a method of providing an ephemeral cryptographic key, the method comprising the steps of:
- (a) receiving into a computer system input data from a user;
(b) generating within the computer system a cryptographic key as a deterministic function of said received data of said step (a);
(c) following said step (b) of generating the cryptographic key, clearing from the computer system said received data of said step (a) so that said received data is no longer available for generating the cryptographic key; and
(d) clearing from the computer system said generated cryptographic key upon expiration of a predetermined period of time.
3 Assignments
0 Petitions
Accused Products
Abstract
A cryptographic key is provided based on user input data (UID) by: receiving into a computer system the UID; generating within the computer system the cryptographic key as a deterministic function of the UID; and clearing from the computer system the UID following the generation of the cryptographic key. The UID is not exported from the computer system. The cryptographic key may be a public key or private key. If the cryptographic key is a public key, then the cryptographic key is exported from the computer system. If the cryptographic key is a private key, then the cryptographic key is not exported from the computer system, and is cleared from the computer system within a single day of the generation of the cryptographic key.
-
Citations
28 Claims
-
1. An invention comprising a method of providing an ephemeral cryptographic key, the method comprising the steps of:
-
(a) receiving into a computer system input data from a user;
(b) generating within the computer system a cryptographic key as a deterministic function of said received data of said step (a);
(c) following said step (b) of generating the cryptographic key, clearing from the computer system said received data of said step (a) so that said received data is no longer available for generating the cryptographic key; and
(d) clearing from the computer system said generated cryptographic key upon expiration of a predetermined period of time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An invention comprising a method of providing a cryptographic key, the method comprising the steps of:
-
(a) receiving into a computer system input data from a user;
(b) generating within the computer system a cryptographic key as a deterministic function of said received data of said step (a);
(c) following said step (b) of generating the cryptographic key, clearing from the computer system said received data of said step (a) so that said received data is no longer available for generating the cryptographic key; and
(d) exporting said generated cryptographic key from the computer system. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification