×

Server-assisted regeneration of a strong secret from a weak secret

  • US 6,829,356 B1
  • Filed: 05/17/2000
  • Issued: 12/07/2004
  • Est. Priority Date: 06/29/1999
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for enabling devices to securely regenerate a user'"'"'s strong secret data from weak secret data for the user, the method comprising:

  • determining the user'"'"'s weak secret data;

    computing secret components for each of at least two secret holding servers, wherein the secret component for each secret holding server is a function of the user'"'"'s weak secret data and of server secret data for the secret holding server, said computing secret components includes, for at least one secret holding server;

    computing server request data for the secret holding server, wherein the server request data is a function of the weak secret data and of an ephemeral client secret, and the server request data does not reveal information about the weak secret data without knowledge of the ephemeral client secret, receiving server response data from the secret holding server, wherein the server response data is a function of the server secret data for the secret holding server and of the server request data, and the server response data does not reveal information about the server secret data without knowledge of the weak secret data and the ephemeral client secret, and computing the secret component for the secret holding server as a function of the server response data received from the secret holding server and of the ephemeral client secret, wherein the secret component is a function of the weak secret data and of the server secret data but is independent of the ephemeral client secret;

    computing the user'"'"'s strong secret data, wherein the strong secret data is a function of the secret components for the secret holding servers; and

    determining verifier data for each of at least two verification servers, wherein the verifier data for each verification server enables the verification server to verify that a device has successfully recovered the strong secret data but it is computationally infeasible for the verification server to determine the weak secret data based only on access to its verifier data.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×