Method for associating a pass phase with a secured public/private key pair
First Claim
1. A method for associating a pass phrase with a secured user public/private key pair within a computer system, said method comprising:
- establishing a user public/private key pair for a user, wherein said user public/private key pair includes a user public key and a user private key;
encrypting said user private key along with a random password;
generating a first symmetric key;
encrypting said random password utilizing said first symmetric key;
generating a first password by hashing a first pass phrase;
encrypting said first password along with said first symmetric key;
utilizing said first pass phrase to access said user private key for performing an authentication function;
generating a second password by hashing a second pass phrase;
generating a second symmetric key;
encrypting said random password utilizing said second symmetric key;
encrypting said second password along with said second symmetric key; and
utilizing said second pass phrase to access said user private key for performing an authentication function.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for associating a pass phrase with a secured public/private key pair is disclosed. A user public/private key pair is first established for a user. The user public/private key pair includes a user public key and a user private key. Then, the user public/private key pair is encrypted along with a random password, utilizing a chip public key. Next, a first symmetric key is generated. The random password is encrypted utilizing the first symmetric key. A first password is generated by hashing a first pass phrase. Finally, the first password is encrypted along with the first symmetric key, also utilizing the chip public key. As a result, a user can access the user private key to perform an authentication function by providing the first pass phrase.
-
Citations
14 Claims
-
1. A method for associating a pass phrase with a secured user public/private key pair within a computer system, said method comprising:
-
establishing a user public/private key pair for a user, wherein said user public/private key pair includes a user public key and a user private key;
encrypting said user private key along with a random password;
generating a first symmetric key;
encrypting said random password utilizing said first symmetric key;
generating a first password by hashing a first pass phrase;
encrypting said first password along with said first symmetric key;
utilizing said first pass phrase to access said user private key for performing an authentication function;
generating a second password by hashing a second pass phrase;
generating a second symmetric key;
encrypting said random password utilizing said second symmetric key;
encrypting said second password along with said second symmetric key; and
utilizing said second pass phrase to access said user private key for performing an authentication function. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer system having a password associated with a secured user public/private key pair, said computer system comprising:
-
means for establishing a user public/private key pair for a user, wherein said user public/private key pair includes a user public key and a user private key;
means for encrypting said user private key along with a random password;
means for generating a first symmetric key;
means for encrypting said random password utilizing said first symmetric key;
means for generating a first password by hashing a first pass phrase;
means for encrypting said first password along with said first symmetric key;
means for utilizing said first pass phrase to access said user private key for performing an authentication functions;
means for generating a second password by hashing a second pass phrase;
means for generating a second symmetric key;
means for encrypting said random password utilizing said second symmetric key;
means for encrypting said second password along with said second symmetric key; and
means for utilizing said second pass phrase to access said user private key for performing an authentication function. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer program product for associating a pass phrase with a secured user public/private key pair within a computer system, said computer program product comprising:
-
program code means for establishing a user public/private key pair for a user, wherein said user public/private key pair includes a user public key and a user private key;
program code means for encrypting said user private key along with a random password;
program code means for generating a first symmetric key;
program code means for encrypting said random password utilizing said first symmetric key;
program code means for generating a first password by hashing a first pass phrase;
program code means for encrypting said first password along with said first symmetric key;
program code means for utilizing said first pass phrase to access said user private key for performing an authentication functions;
program code means for generating a second password by hashing a second pass phrase;
program code means for generating a second symmetric key;
program code means for encrypting said random password utilizing said second symmetric key;
program code means for encrypting said second password along with said second symmetric key; and
program code means for utilizing said second pass phrase to access said user private key for performing an authentication function. - View Dependent Claims (12, 13, 14)
13.The computer program product according to claim 11, wherein program code means for encrypting said random password performs an encryption utilizing a chip public key. -
13. The computer program product according to claim 11, wherein said program code means for encrypting said user private key along with a random password further includes encrypting said user private key and said random password along with said user public key.
-
14. The computer program product according to claim 11, wherein said program code means for encrypting said second password along with said second symmetric key is performed utilizing a chip public key.
-
Specification