Architecture for asymmetric crypto-key storage
First Claim
Patent Images
1. A method for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions, comprising:
- storing a first one of multiple factors, all of which are under the control of a user, required to generate a first private portion of the split private key, the first private portion not stored in a persistent state; and
storing a second private portion of the split private key under control of an entity other than the user;
wherein the first private portion and the second private portion are combinable to form a complete private portion.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions are provided. A first one of multiple factors is stored. All of the factors are under the control of a user and all are required to generate a first private portion of the split private key. The first private portion not stored in a persistent state. A second private portion of the split private key under control of an entity other than the user is also stored. The first private portion and the second private portion are combinable to form a complete private portion.
46 Citations
20 Claims
-
1. A method for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions, comprising:
-
storing a first one of multiple factors, all of which are under the control of a user, required to generate a first private portion of the split private key, the first private portion not stored in a persistent state; and
storing a second private portion of the split private key under control of an entity other than the user;
wherein the first private portion and the second private portion are combinable to form a complete private portion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10)
-
-
8. The method of 1, further comprising:
-
generating the first private portion based upon the multiple factors, including the stored first factor;
non-persistently storing the generated first private portion for a limited time period; and
during the limited time period applying the stored first private portion to authenticate the user multiple times.
-
-
11. A system for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions, comprising:
-
a first data repository configured to store one of multiple factors, all of which are under control of a user, required to generate a first private portion of the split private key, the first private portion not stored in a persistent state and a second data repository configured to store a second private portion of the split private key, the second portion under control of an entity other than the user;
wherein the first private portion and the second private portion are combinable to form a complete private portion. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification