Asymmetric cryptography with user authentication
First Claim
Patent Images
1. A method for encrypting data comprising:
- receiving at least one user authentication factor;
generating a decryption key from the at least one user authentication factor;
generating an encryption key from a one-way function of the decryption key;
encrypting data using the encryption key;
encrypting the at least one user authentication factor using the encryption key to produce an encrypted at least one user authentication factor;
storing the encrypted data;
storing the encryption key to be used in a later authentication process; and
storing the encrypted at least one user authentication factor to be used in the later authentication process.
3 Assignments
0 Petitions
Accused Products
Abstract
A device uses a user authentication factor to generate a decryption key for use in asymmetric cryptography. An encryption key is generated from the decryption key using a one-way function.
-
Citations
36 Claims
-
1. A method for encrypting data comprising:
-
receiving at least one user authentication factor; generating a decryption key from the at least one user authentication factor; generating an encryption key from a one-way function of the decryption key; encrypting data using the encryption key; encrypting the at least one user authentication factor using the encryption key to produce an encrypted at least one user authentication factor; storing the encrypted data; storing the encryption key to be used in a later authentication process; and storing the encrypted at least one user authentication factor to be used in the later authentication process. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for decrypting data comprising:
-
receiving at least one user authentication factor; generating a decryption key from the at least one user authentication factor; decrypting stored data using the decryption key; and encrypting the at least one user authentication factor using a stored encryption key to produce a result, and comparing the result with a stored encrypted user authentication factor, wherein the stored encryption key was previously generated from a one-way function of a decryption key that was generated from a previously received at least one user authentication factor. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. An apparatus with a non-transitory machine readable medium having instructions stored thereon that when accessed result in a machine performing:
-
receiving at least one user authentication factor; generating a decryption key from the at least one user authentication factor; generating an encryption key from a one-way function of the decryption key; encrypting data using the encryption key; encrypting the at least one user authentication factor using the encryption key to produce an encrypted at least one user authentication factor; storing the encrypted data; storing the encryption key to be used in a later authentication process; and storing the encrypted at least one user authentication factor to be used in the later authentication process. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. An apparatus with a non-transitory machine readable medium having instructions stored thereon that when accessed result in a machine performing:
-
receiving at least one user authentication factor; generating a decryption key from the at least one user authentication factor; decrypting stored data using the decryption key; and encrypting the at least one user authentication factor using a stored encryption key to produce a result, and comparing the result with a stored encrypted user authentication factor, wherein the stored encryption key was previously generated from a one-way function of a decryption key that was generated from a previously received at least one user authentication factor. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A computer system for storing and accessing encrypted data, comprising:
-
a user authentication factor collection component to receive at least one user authentication factor; a decryption key generation component to generate a decryption key from the at least one user authentication factor; an encryption key generation component to generate an encryption key from the decryption key using a one-way function; an encryption process component to encrypt data and the at least one user authentication factor using the encryption key; a decryption process component to decrypt encrypted data using the decryption key; and a non-transitory machine readable medium to store the encryption key and the encrypted at least one user authentication factor for later authentication. - View Dependent Claims (27, 28, 29, 30)
-
-
31. An apparatus comprising:
-
means for collecting at least one user authentication factor; means for generating a decryption key from the at least one user authentication factor; means for generating an encryption key from the decryption key using a one-way function; means for encrypting data and the at least one user authentication factor using the encryption key; means for decrypting data using the decryption key; and a non-transitory machine readable medium to store the encryption key and the encrypted at least one user authentication factor for later authentication.
-
-
32. A handheld device to store encrypted data, comprising:
-
a biometric collection device to collect a biometric user authentication factor; an asymmetric cryptography engine to generate an asymmetric decryption key from the biometric user authentication factor, and to generate an asymmetric encryption key from the asymmetric decryption key, and to encrypt the biometric user authentication factor using the asymmetric encryption key; and a non-transitory machine readable medium to store the asymmetric encryption key and the encrypted biometric user authentication factor for later authentication. - View Dependent Claims (33, 34, 35, 36)
-
Specification