Key encryption using a client-unique additional key for fraud prevention
First Claim
1. A computer-implemented method for a client, comprising:
- determining a first key unique and particular to the client without user intervention;
encrypting at least a second key with the first key;
storing the second key as encrypted with the first key on a storage;
retrieving the second key as encrypted with the first key from the storage;
redetermining the first key;
decrypting the second key with the first key as redetermined;
determining whether decrypting the second key was successful; and
upon determining that decrypting the second key was unsuccessful, indicating so to the user and requesting that the user reregister the first key with a registering authority.
6 Assignments
0 Petitions
Accused Products
Abstract
Encryption of a key using another key that is unique and particular to a given client is disclosed. In one embodiment, a computer-implemented method determines a first key that is unique and particular to the client, without user intervention. In varying embodiments, this key can be one or more of: a processor identifier, a network card address, an IP address, a checksum of a component, a serial number of a hard disk drive, a number of cylinders of a hard disk drive, and a user name in a registry file. At least a second key that provides access to information, such as multimedia information, is encrypted with this first key. The second key as encrypted with the first key may be stored on a storage.
178 Citations
8 Claims
-
1. A computer-implemented method for a client, comprising:
-
determining a first key unique and particular to the client without user intervention;
encrypting at least a second key with the first key;
storing the second key as encrypted with the first key on a storage;
retrieving the second key as encrypted with the first key from the storage;
redetermining the first key;
decrypting the second key with the first key as redetermined;
determining whether decrypting the second key was successful; and
upon determining that decrypting the second key was unsuccessful, indicating so to the user and requesting that the user reregister the first key with a registering authority. - View Dependent Claims (2)
-
-
3. A computer-implemented method for a client comprising:
-
determining a first key unique and particular to the client without user intervention;
encrypting at least a second key with the first key;
storing the second key as encrypted with the first key on a storage;
retrieving the second key as encrypted with the first key from the storage;
redetermining the first key;
decrypting the second key with the first key as redetermined;
determining whether decrypting the second key was successful; and
upon determining that decrypting the second key was unsuccessful, indicating so to the user; and
upon determining that decrypting the information was unsuccessful, requesting that the user reregister the first key with a registering authority. - View Dependent Claims (4)
-
-
5. A machine-readable medium having instructions stored thereon for execution by a processor of a client to perform a method comprising:
-
determining a first key unique and particular to the client without user intervention;
encrypting at least a second key with the first key;
storing the second key as encrypted with the first key on a storage;
retrieving the second key as encrypted with the first key from the storage;
redetermining the first key;
decrypting the second key with the first key as redetermined;
determining whether decrypting the second key was successful; and
upon determining that decrypting the second key was unsuccessful, indicating so to the user and requesting that the user reregister the first key with a registering authority. - View Dependent Claims (6)
-
-
7. An apparatus comprising;
-
a storage;
at least one component having an identifier particularly and uniquely identifying the apparatus; and
means for;
determining a first key from the identifier;
encrypting at least a second key with the first key; and
,storing the second key as encrypted on the storage, wherein the means is further for retrieving the second key as encrypted from the storage and redetermining the first key from the identifier; and
decrypting the second key with the first key as redetermined, wherein the means is further for determining whether decrypting the second key was successful and wherein the means is further for, upon determining that decrypting the second key was unsuccessful, indicating so to the user and requesting that the user reregister the first key with a registering authority. - View Dependent Claims (8)
-
Specification