×

Encryption output data generation method and system

  • US 7,925,886 B2
  • Filed: 06/13/2007
  • Issued: 04/12/2011
  • Est. Priority Date: 06/13/2007
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method, comprising:

  • receiving, by a computing system comprising a computer processor, first source data (S1);

    first applying, by said computing system, a first hash function to said first source data (S1);

    generating as a result of said first applying, by said first hash function, a first hash output (H1);

    performing, by said computing system, an operation relating, said first source data (S1) with at least a portion of said first hash output (H1) to generate second source data (S2);

    second applying, by said computing system, said first hash function to said second source data (S2); and

    generating as a result of said second applying, by said computer processor executing said first hash function, a second hash output (H2), wherein the second hash output (H2) is used to prevent unauthorized access to one or more computing systems including said computing system.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×