Credential Vault Encryption
First Claim
Patent Images
1. A method comprising:
- encrypting a number of secondary passwords with a primary password;
storing the secondary passwords in a credential vault; and
decrypting an encrypted secondary password from the credential vault using the primary password and providing the secondary password to an application.
2 Assignments
0 Petitions
Accused Products
Abstract
A number of secondary passwords can be encrypted with a primary password and stored in a credential vault. An encrypted secondary password from the credential vault can be decrypted using the primary password and provided the secondary password to an application. Encrypted secondary passwords can be updated when the primary password changes.
-
Citations
23 Claims
-
1. A method comprising:
-
encrypting a number of secondary passwords with a primary password; storing the secondary passwords in a credential vault; and decrypting an encrypted secondary password from the credential vault using the primary password and providing the secondary password to an application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer readable medium including code to:
-
encrypt a number of secondary passwords with a primary password; store the secondary passwords in a credential vault; and decrypt an encrypted secondary password from the credential vault using the primary password and providing the secondary password to an application. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method comprising:
-
encrypting a number of secondary passwords with a primary password; encrypting a fixed string with the primary password; storing the secondary passwords and encrypted fixed string in a credential vault; and receiving a password for user; using the received password to decrypt the encrypted fixed string; if the decrypted fixed string does not match the fixed string, prompting a user to input both new and old primary passwords, decrypting the secondary passwords with the old primary password and then re-encrypting the secondary passwords with the new primary password. - View Dependent Claims (20, 21, 22, 23)
-
Specification