SECURING A SECRET OF A USER
First Claim
Patent Images
1. A method of securing a secret of a user, comprising:
- receiving, by a user server, a secret from the user;
generating encrypted shares based on the secret, a policy, and a plurality of public keys;
providing the encrypted shares to a custodian server of a first custodian; and
verifying, by the custodian server, that the encrypted shares can be used to reconstitute the secret upon receiving the encrypted shares.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems and apparatuses for securing a secret are disclosed. One method includes receiving a secret from the user and generating encrypted shares based on the secret, a policy, and a plurality of public keys. The encrypted shares are provided to a custodian, wherein the custodian verifies that the encrypted shares can be used to reconstitute the secret upon receiving the encrypted shares.
51 Citations
24 Claims
-
1. A method of securing a secret of a user, comprising:
-
receiving, by a user server, a secret from the user; generating encrypted shares based on the secret, a policy, and a plurality of public keys; providing the encrypted shares to a custodian server of a first custodian; and verifying, by the custodian server, that the encrypted shares can be used to reconstitute the secret upon receiving the encrypted shares. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A system for securing a secret, comprising:
a user server operative to; receive a secret from the user; generate encrypted shares based on the secret, a policy, and a plurality of public keys; and provide the encrypted shares to a custodian server;
whereinthe custodian server verifies that the encrypted shares can be used to reconstitute the secret upon receiving the encrypted shares.
-
24. A custodian server operating a cloud connect service, the custodian server operative to:
-
receive encrypted shares from a user server, wherein the encrypted shares based on a secret, a policy, and a plurality of public keys, an wherein the secret is received from a user of the user device; and verify that the encrypted shares can be used to reconstitute the secret upon receiving the encrypted shares.
-
Specification