GENERATING PUBLIC-PRIVATE KEY PAIR BASED ON USER INPUT DATA
First Claim
Patent Images
1. An invention comprising a method of providing keys of a public-private key pair, the method comprising the steps of:
- (a) receiving into a computer system input data from a user;
(b) generating within the computer system a first key as a deterministic function of said received data of said step (a);
(c) clearing from the computer system said received data of said step (a) so that said received data is no longer available for generating the first key;
(d) generating within the computer system a second key as a deterministic function of said generated first key of said step (b), said generated first and second keys comprising a public-private key pair; and
(e) following said step (d) of generating said second key, clearing said generated first key from the computer system so that said generated first key is no longer available for generating the second key.
3 Assignments
0 Petitions
Accused Products
Abstract
Keys of a public-private key pair are provided by: receiving into a computer system input data from a user (UID); generating within the computer system a first key as a deterministic function of the UID; and generating within the computer system a second key as a deterministic function of the first key. The first key is the private key and the second key is the public key. The first key is cleared from the computer system following generation of the second key. Neither the UID nor the first key is exported from the computer system. The second key may be exported from the computer system.
-
Citations
38 Claims
-
1. An invention comprising a method of providing keys of a public-private key pair, the method comprising the steps of:
-
(a) receiving into a computer system input data from a user;
(b) generating within the computer system a first key as a deterministic function of said received data of said step (a);
(c) clearing from the computer system said received data of said step (a) so that said received data is no longer available for generating the first key;
(d) generating within the computer system a second key as a deterministic function of said generated first key of said step (b), said generated first and second keys comprising a public-private key pair; and
(e) following said step (d) of generating said second key, clearing said generated first key from the computer system so that said generated first key is no longer available for generating the second key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
27. The invention of 25, wherein said overwriting comprises writing pseudo random bit strings to data blocks in which said generated first key of said step (b) was stored in the computer system.
Specification