Symmetric cryptography with user authentication
First Claim
Patent Images
1. A method for encrypting data in a mobile electronic device comprising:
- receiving, at the mobile electronic device, at least one user authentication factor to authenticate a user to the mobile electronic device;
generating, by the mobile electronic device, a symmetric key as a function of the at least one user authentication factor; and
encrypting, by the mobile electronic device, the at least one user authentication factor using the symmetric key to produce an encrypted at least one user authentication factor.
3 Assignments
0 Petitions
Accused Products
Abstract
A device uses a user authentication factor to generate a symmetric key for use in symmetric cryptography. The user authentication factor is encrypted and stored for authentication during decryption.
58 Citations
37 Claims
-
1. A method for encrypting data in a mobile electronic device comprising:
-
receiving, at the mobile electronic device, at least one user authentication factor to authenticate a user to the mobile electronic device; generating, by the mobile electronic device, a symmetric key as a function of the at least one user authentication factor; and encrypting, by the mobile electronic device, the at least one user authentication factor using the symmetric key to produce an encrypted at least one user authentication factor. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for decrypting data in a mobile electronic device comprising:
-
receiving, at the mobile electronic device, at least one user authentication factor to authenticate a user to the mobile electronic device; generating, by the mobile electronic device, a symmetric key as a function of the at least one user authentication factor; and encrypting, by the mobile electronic device, the at least one user authentication factor using the symmetric key to produce a result, and comparing the result with a stored encrypted user authentication factor. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A mobile device with a machine accessible non-transitory medium having instructions stored thereon that when accessed result in the mobile device performing:
-
receiving at least one user authentication factor to authenticate a user to the mobile device; generating a symmetric key as a function of the at least one user authentication factor; and encrypting the at least one user authentication factor using the symmetric key to produce an encrypted at least one user authentication factor. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A mobile device with a machine accessible non-transitory medium having instructions stored thereon that when accessed result in the mobile device performing:
-
receiving at least one user authentication factor to authenticate a user to the mobile device; generating a symmetric key as a function of the at least one user authentication factor; and encrypting the at least one user authentication factor using the symmetric key to produce a result, and comparing the result with a stored encrypted user authentication factor. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. A computer system for storing and accessing encrypted data, comprising:
-
a user authentication factor collection component to receive at least one user authentication factor to authenticate a user to the computer system; a symmetric key generation component to generate a symmetric key as a function of the at least one user authentication factor; an encryption process component to encrypt data and the at least one user authentication factor using the symmetric key; and a decryption process component to decrypt encrypted data using the symmetric key. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. A mobile device comprising:
-
means for collecting at least one user authentication factor to authenticate a user to the mobile device; means for generating a symmetric key as a function of the at least one user authentication factor; means for encrypting the at least one user authentication factor using the symmetric key; means for encrypting data using the symmetric key; and means for decrypting data using the symmetric key.
-
-
33. A handheld device to store encrypted data, comprising:
-
a biometric collection device to collect a biometric user authentication factor to authenticate a user to the handheld device; and a symmetric cryptography engine to generate a symmetric key as a function of the biometric user authentication factor, and to encrypt the biometric user authentication factor using the symmetric key. - View Dependent Claims (34, 35, 36, 37)
-
Specification