ENCRYPTION / DECRYPTION OF DATA WITH NON-PERSISTENT, NON-SHARED PASSKEY
First Claim
1. A method of creating a Public Key/Private Key pair in an electronic device having a dedicated encryption decryption application comprising the steps of:
- receiving a PassKey entered by a user;
creating a Public Key/Private Key Pair; and
encrypting the Private Key using the Passkey.
0 Assignments
0 Petitions
Accused Products
Abstract
The method herein teaches encrypting a Private Key using a Passkey from an RSA generated private key/public key pair; the encrypted Private Key is split and then the portions are stored in two different databases. To encrypt data a new AES key is created that encrypts the data that is stored in another database. All users have their AES key encrypted using their associated public encryption keys such that the encrypted AES keys are stored in another database. To decrypt data the user enters his PassKey that is used to decrypt a rejoined split private key from portions that were retrieved from their respective databases. Next the encrypted AES key is retrieved and decrypted using the decrypted Private Key. Finally the AES encrypted data is retrieved from a database and decrypted using the decrypted AES key.
28 Citations
14 Claims
-
1. A method of creating a Public Key/Private Key pair in an electronic device having a dedicated encryption decryption application comprising the steps of:
-
receiving a PassKey entered by a user; creating a Public Key/Private Key Pair; and encrypting the Private Key using the Passkey. - View Dependent Claims (2, 3, 4)
-
-
5. A data encryption process comprising the steps of:
-
receiving data entered by a user; generating a random key; encrypting data using the random key; storing the encrypted data in a database; encrypting the random key using a public encryption key; storing the public encryption key encrypted random key in a database. - View Dependent Claims (6, 7)
-
-
8. A method of decrypting encoded data comprising the steps of:
-
receiving a user entered PassKey; retrieving a first portion of a Split Private Key from a first database; and retrieving a second portion of a Split Private Key from a second database. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
Specification