Method and system for asymmetric key security
First Claim
Patent Images
1. A method of creating symmetric or asymmetric security key(s), comprising:
- receiving an identity key associated with a server;
generating a master key;
creating one or more seeds by utilizing an encryption function of the identity key and the master key;
utilizing the seed to create a public and private key pair; and
storing the public key at the server.
4 Assignments
0 Petitions
Accused Products
Abstract
Exemplary embodiments disclosed herein may include a method and system for creating pair-wise security keys, comprising receiving an identity key from a website, generating a master key, creating a pair-wise symmetric key or asymmetric key pair by utilizing an encryption function of the identity key and the master key, and storing the pair-wise public or symmetric key at the client and the website.
-
Citations
20 Claims
-
1. A method of creating symmetric or asymmetric security key(s), comprising:
-
receiving an identity key associated with a server;
generating a master key;
creating one or more seeds by utilizing an encryption function of the identity key and the master key;
utilizing the seed to create a public and private key pair; and
storing the public key at the server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system for authenticating a system utilizing an asymmetric or symmetric key pair comprising:
-
a processor;
a communication channel connected with the processor; and
a memory coupled with and readable by the processor, the memory containing a series of instructions that, when executed by the processor, cause the processor to receive an identity key associated with a server;
generate a master key;
create seed by utilizing an encryption function of the identity key and the master key;
utilize the seed to create a private and public key pair; and
store the public key at the server. - View Dependent Claims (15, 16, 17)
-
-
18. A computer program product encoding a computer program of instructions for executing a computer implemented method for authenticating a system, the method comprising:
-
receiving an identity key associated with a server;
generating a master key;
creating one or more seeds by utilizing an encryption function of the identity key, the master key, and one or more constants;
utilizing the one or more seeds to create a key;
storing the public key at the server;
presenting proof of knowledge of the public to the server;
determining if the public key matches a stored key; and
authenticating the identity of the server or the client based at least in part upon the public key - View Dependent Claims (19, 20)
-
Specification