Generation of repeatable cryptographic key based on varying parameters
First Claim
1. A method for generating a repeatable cryptographic key using at least one parameter comprising the steps of:
- generating at least one index as a function of said at least one parameter, said one parameter being from a plurality of varying parameters;
retrieving at least one cryptographic share from a memory location identified as a function of said at least one index; and
generating said repeatable cryptographic key based on said at least one cryptographic share, wherein said generated repeatable cryptographic key remains the same from one said generating of said repeatable cryptographic key to a next generating of said repeatable cryptographic key regardless of whether said plurality of varying parameters change from said generating of said repeatable cryptographic key to said next generating of said repeatable cryptographic key.
2 Assignments
0 Petitions
Accused Products
Abstract
A repeatable cryptographic key is generated based on varying parameters which represent physical measurements. Locations within a share table, which locations store valid and invalid cryptographic shares, are identified as a function of received varying parameters. The share table is configured such that locations which are expected to be identified by legitimate access attempts contain valid cryptographic shares, and locations which are not expected to be identified by legitimate access attempts contain invalid cryptographic shares. The share table configuration may be modified based on prior history of legitimate access attempts. In various embodiments, the stored shares may be encrypted or compressed. A keystroke feature authentication embodiment uses the inventive techniques to implement an authentication system which authenticates based on an entered password and the manner in which (e.g. keystroke dynamics) the keystroke is entered. Another embodiment uses the inventive techniques to protect sensitive database information which is accessible using DNA measurements.
69 Citations
24 Claims
-
1. A method for generating a repeatable cryptographic key using at least one parameter comprising the steps of:
-
generating at least one index as a function of said at least one parameter, said one parameter being from a plurality of varying parameters;
retrieving at least one cryptographic share from a memory location identified as a function of said at least one index; and
generating said repeatable cryptographic key based on said at least one cryptographic share, wherein said generated repeatable cryptographic key remains the same from one said generating of said repeatable cryptographic key to a next generating of said repeatable cryptographic key regardless of whether said plurality of varying parameters change from said generating of said repeatable cryptographic key to said next generating of said repeatable cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for generating a repeatable cryptographic key comprising the steps of:
-
measuring a plurality of keystroke features during entry of a password;
generating a plurality of indices using said plurality of keystroke features;
retrieving from a data structure a plurality of cryptographic shares as a function of said plurality of indices; and
generating said repeatable cryptographic key using said cryptographic shares wherein said generated repeatable cryptographic key remains the same from one said generating of said repeatable cryptographic key to a next generating of said repeatable cryptographic key regardless of whether said plurality of keystroke features change from said one generating of said cryptographic repeatable key to said next generating of said repeatable cryptographic key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for generating a repeatable cryptographic key using a plurality of varying parameters, said varying parameters representing physical measurements, said method comprising the steps of:
-
for each of said plurality of parameters;
generating at least one index using said parameter;
retrieving an encrypted cryptographic share from a memory location as a function of said at least one index;
decrypting said encrypted cryptographic share with a function of said parameter; and
generating said repeatable cryptographic key using said decrypted cryptographic shares, wherein said generated repeatable cryptographic key remains the same from one said generating of said repeatable cryptographic key to a next generating of said repeatable cryptographic key regardless of whether said plurality of varying parameters change from said one generating of said repeatable cryptographic key to said next generating of said repeatable cryptographic key. - View Dependent Claims (20, 21)
-
-
22. A data structure for use in generating a repeatable cryptographic key based on n parameters representing physical measurements, said data structure comprising:
n storage locations each associated with a respective one of said n parameters, each particular storage location containing an encrypted cryptographic share which was encrypted using an expected value of a function of the parameter associated with said particular storage location, each said n storage location being associated with at least one index of a plurality of indices, where said plurality of indices are generated using said physical measurements such that said repeatable cryptographic key remains the same from one generation to a next generation of said repeatable cryptographic key regardless of whether said n parameters change from said one generation of said repeatable cryptographic key to said next generation of said repeatable cryptographic key. - View Dependent Claims (23, 24)
Specification