Encryption / decryption of data with non-persistent, non-shared passkey
First Claim
1. A method of decrypting encoded data in a processor of a computer, wherein the processor is connected to a plurality of storage components including a first storage component and a second storage component, said method comprising the steps of:
- receiving a user entered PassKey into the processor, wherein the PassKey was previously created by the user;
retrieving a first portion of a Split Private Key into the processor from a first storage component;
retrieving a second portion of a Split Private Key from a second storage component; and
decrypting the encoded data in the process of a computer using the first portion and second portion of the Split Private Key, to facilitate the secure receipt of information;
wherein the PassKey is not stored in a persistent state on any of the plurality of storage components connected to the processor.
0 Assignments
0 Petitions
Accused Products
Abstract
The method herein teaches encrypting a Private Key using a Passkey from an RSA generated private key/public key pair; the encrypted Private Key is split and then the portions are stored in two different databases. To encrypt data a new AES key is created that encrypts the data that is stored in another database. All users have their AES key encrypted using their associated public encryption keys such that the encrypted AES keys are stored in another database. To decrypt data the user enters his PassKey that is used to decrypt a rejoined split private key from portions that were retrieved from their respective databases. Next the encrypted AES key is retrieved and decrypted using the decrypted Private Key. Finally the AES encrypted data is retrieved from a database and decrypted using the decrypted AES key.
27 Citations
13 Claims
-
1. A method of decrypting encoded data in a processor of a computer, wherein the processor is connected to a plurality of storage components including a first storage component and a second storage component, said method comprising the steps of:
-
receiving a user entered PassKey into the processor, wherein the PassKey was previously created by the user; retrieving a first portion of a Split Private Key into the processor from a first storage component; retrieving a second portion of a Split Private Key from a second storage component; and decrypting the encoded data in the process of a computer using the first portion and second portion of the Split Private Key, to facilitate the secure receipt of information; wherein the PassKey is not stored in a persistent state on any of the plurality of storage components connected to the processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification