Hybrid symmetric/asymmetric cryptography with user authentication
First Claim
Patent Images
1. A method for encrypting data comprising:
- receiving at least one user authentication factor;
generating an asymmetric decryption key from the at least one user authentication factor;
generating an asymmetric encryption key from a one-way function of the asymmetric decryption key; and
encrypting a symmetric key using the asymmetric encryption key.
3 Assignments
0 Petitions
Accused Products
Abstract
A device uses a user authentication factor to generate an asymmetric decryption key for use in cryptography. An asymmetric encryption key is generated from the asymmetric decryption key using a one-way function, and the asymmetric encryption key is used to encrypt a symmetric key.
-
Citations
41 Claims
-
1. A method for encrypting data comprising:
-
receiving at least one user authentication factor;
generating an asymmetric decryption key from the at least one user authentication factor;
generating an asymmetric encryption key from a one-way function of the asymmetric decryption key; and
encrypting a symmetric key using the asymmetric encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for decrypting data comprising:
-
receiving at least one user authentication factor;
generating an asymmetric decryption key from the at least one user authentication factor; and
decrypting a stored symmetric key using the asymmetric decryption key. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. An apparatus with a machine accessible medium having instructions stored thereon that when accessed result in a machine performing:
-
receiving at least one user authentication factor;
generating an asymmetric decryption key from the at least one user authentication factor;
generating an asymmetric encryption key from a one-way function of the asymmetric decryption key; and
encrypting a symmetric key using the asymmetric encryption key. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. An apparatus with a machine accessible medium having instructions stored thereon that when accessed result in a machine performing:
-
receiving at least one user authentication factor;
generating an asymmetric decryption key from the at least one user authentication factor; and
decrypting a stored symmetric key using the asymmetric decryption key. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A computer system for storing and accessing encrypted data, comprising:
-
a user authentication factor collection component to receive at least one user authentication factor;
an asymmetric decryption key generation component to generate an asymmetric decryption key from the at least one user authentication factor;
an asymmetric encryption key generation component to generate an asymmetric encryption key from the asymmetric decryption key using a one-way function;
a symmetric encryption/decryption process component to encrypt data using a symmetric encryption key; and
an asymmetric encryption/decryption process component to encrypt the symmetric key using the asymmetric encryption key. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. An apparatus comprising:
-
means for collecting at least one user authentication factor;
means for generating an asymmetric decryption key from the at least one user authentication factor;
means for generating an asymmetric encryption key from the asymmetric decryption key using a one-way function;
means for encrypting a symmetric key using the asymmetric encryption key; and
means for encrypting data using the symmetric key.
-
-
37. A handheld device to store encrypted data, comprising:
-
a biometric collection device to collect a biometric user authentication factor; and
a hybrid symmetric/asymmetric cryptography engine to generate an asymmetric decryption key from the biometric user authentication factor, to generate an asymmetric encryption key from the asymmetric decryption key, and to encrypt a symmetric key using the asymmetric encryption key. - View Dependent Claims (38, 39, 40, 41)
-
Specification