Asymmetric cryptography with user authentication
First Claim
Patent Images
1. A method for encrypting data comprising:
- receiving at least one user authentication factor;
generating a decryption key from the at least one user authentication factor;
generating an encryption key from a one-way function of the decryption key; and
encrypting data using the encryption key.
3 Assignments
0 Petitions
Accused Products
Abstract
A device uses a user authentication factor to generate a decryption key for use in asymmetric cryptography. An encryption key is generated from the decryption key using a one-way function.
112 Citations
41 Claims
-
1. A method for encrypting data comprising:
-
receiving at least one user authentication factor;
generating a decryption key from the at least one user authentication factor;
generating an encryption key from a one-way function of the decryption key; and
encrypting data using the encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for decrypting data comprising:
-
receiving at least one user authentication factor;
generating a decryption key from the at least one user authentication factor; and
decrypting stored data using the decryption key. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. An apparatus with a machine accessible medium having instructions stored thereon that when accessed result in a machine performing:
-
receiving at least one user authentication factor;
generating a decryption key from the at least one user authentication factor;
generating an encryption key from a one-way function of the decryption key; and
encrypting data using the encryption key. - View Dependent Claims (18, 19, 20, 21, 22)
-
-
23. An apparatus with a machine accessible medium having instructions stored thereon that when accessed result in a machine performing:
-
receiving at least one user authentication factor;
generating a decryption key from the at least one user authentication factor; and
decrypting stored data using the decryption key. - View Dependent Claims (24, 25, 26, 27, 28, 29)
-
-
30. A computer system for storing and accessing encrypted data, comprising:
-
a user authentication factor collection component to receive at least one user authentication factor;
a decryption key generation component to generate a decryption key from the at least one user authentication factor;
an encryption key generation component to generate an encryption key from the decryption key using a one-way function;
an encryption process component to encrypt data using the encryption key; and
a decryption process component to decrypt encrypted data using the decryption key. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. An apparatus comprising:
-
means for collecting at least one user authentication factor;
means for generating a decryption key from the at least one user authentication factor;
means for generating an encryption key from the decryption key using a one-way function;
means for encrypting data using the encryption key; and
means for decrypting data using the decryption key.
-
-
37. A handheld device to store encrypted data, comprising:
-
a biometric collection device to collect a biometric user authentication factor; and
an asymmetric cryptography engine to generate an asymmetric decryption key from the biometric user authentication factor, and to generate an asymmetric encryption key from the asymmetric decryption key. - View Dependent Claims (38, 39, 40, 41)
-
Specification