Password encryption key
First Claim
1. A computer-implemented method for a secure transaction, comprising:
- generating a first key from a user-supplied unencrypted password provided by a user computing device, wherein generating the first key includes calculating a checksum,encrypting the user-supplied unencrypted password using the first key,creating a user record,storing the encrypted password in the user record,upon user login, generating a second key from a would-be user'"'"'s password using the same algorithm used to generate the first key from the user-supplied unencrypted password,retrieving the corresponding user record,decrypting the encrypted password in the user record using the second key, andcomparing the decrypted password with the would-be user-supplied password to see if they match.
3 Assignments
0 Petitions
Accused Products
Abstract
A password-encrypted key (PEK) is generated from a user-supplied password or other identifying data and then used to encrypt the user'"'"'s password. The encrypted password is stored in a user record on a server. At login a would-be user'"'"'s password is again used to make a key, which is then used to decrypt and compare the stored encrypted password with the would-be user'"'"'s password to complete the login. The successful PEK is stored in a temporary session record and can be used to decrypt other sensitive user information previously encrypted and stored in the user record as well as to encrypt new information for storage in the user record. A public/private key system can also be used to maintain limited access for the host to certain information in the user record.
-
Citations
10 Claims
-
1. A computer-implemented method for a secure transaction, comprising:
-
generating a first key from a user-supplied unencrypted password provided by a user computing device, wherein generating the first key includes calculating a checksum, encrypting the user-supplied unencrypted password using the first key, creating a user record, storing the encrypted password in the user record, upon user login, generating a second key from a would-be user'"'"'s password using the same algorithm used to generate the first key from the user-supplied unencrypted password, retrieving the corresponding user record, decrypting the encrypted password in the user record using the second key, and comparing the decrypted password with the would-be user-supplied password to see if they match. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-executable program residing on a computer, the execution of the program causing the computer to:
-
generate a first key from user-supplied identification data provided by a user computing device, wherein generating the first key includes calculating a checksum, encrypt the user-supplied identification data using the first key, create a user record, store the encrypted identification data in the user record, upon user login, generate a second key from a would-be user'"'"'s identification data supplied at login using the same algorithm used to generate the first key from the user-supplied unencrypted identification data, retrieve the corresponding user record, decrypt the encrypted identification data in the user record using the second key, and compare the decrypted identification data with the would-be user-supplied identification data to see if they match. - View Dependent Claims (7, 8)
-
-
9. A computing device comprising:
-
a memory configured to store a first unencrypted password supplied from a user computing device; and a processor configured to execute instructions to perform a method comprising; generating a first key from the first user-supplied unencrypted password, wherein generating the first key includes calculating a checksum; encrypting the first user-supplied unencrypted password using the first key; storing the encrypted user-supplied password in a user record; upon receiving a login request that includes a second unencrypted password from a would-be user, generating a second key from the second user-supplied unencrypted password in a manner equivalent to generating the first key from the first user-supplied unencrypted password; using the second key to decrypt the first encrypted user-supplied password in the user record; comparing the decrypted password and the second user-supplied unencrypted password to identify a match; and upon identifying a match, creating a temporary user session record and storing the second key in the temporary user session record. - View Dependent Claims (10)
-
Specification