Method and apparatus for camouflaging of data, information and functional transformations
First Claim
1. A method for camouflaging a secret, the method comprising:
- representing, in digital form, the secret to be protected against unauthorized access, wherein the secret is retrievable using a correct password;
representing said secret as a number of objects; and
storing, in a non-transitory computer-readable memory, a composition function, wherein;
the composition function is executable to generate a candidate secret using a candidate password and at least a subset of the number of objects;
the candidate secret matches the secret only if the candidate password matches the correct password;
the candidate secret does not match the secret if the candidate password does not match the correct password; and
the candidate secret when the candidate password matches the correct password and the candidate secret when the candidate password does not match the correct password have a common form.
3 Assignments
0 Petitions
Accused Products
Abstract
A computer-representable object (including, without limitation, a cryptographic key, or a graph or a Boolean description of a system) is secured using a generalized camouflaging technique. The secured object need not be stored in the system, not even in encrypted form. Instead, the technique employs a composition function that regenerates the secured object when one inputs a valid password (which may be any computer-representable information held by a user). By regenerating the secured object each time a valid password is entered, there is no need to store the secured object. If one inputs an invalid password, the technique may generate an incorrect object, such that the user is unable to distinguish this incorrect object from the secured object. If the user tries to use the incorrect object, the user can be exposed as unauthorized, without the user'"'"'s knowledge that he has been exposed.
75 Citations
20 Claims
-
1. A method for camouflaging a secret, the method comprising:
-
representing, in digital form, the secret to be protected against unauthorized access, wherein the secret is retrievable using a correct password; representing said secret as a number of objects; and storing, in a non-transitory computer-readable memory, a composition function, wherein; the composition function is executable to generate a candidate secret using a candidate password and at least a subset of the number of objects; the candidate secret matches the secret only if the candidate password matches the correct password; the candidate secret does not match the secret if the candidate password does not match the correct password; and the candidate secret when the candidate password matches the correct password and the candidate secret when the candidate password does not match the correct password have a common form. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product residing on a non-transitory processor-readable medium and comprising processor-readable instructions configured to:
-
represent, in digital form, a secret to be protected against unauthorized access, wherein the secret is retrievable using a correct password; represent the secret as a number of objects; store a composition function, wherein; the composition function is executable to generate a candidate secret using a candidate password and at least a subset of the number of objects; receive the candidate password from a user; and generate, using the candidate password, the candidate secret, wherein; the candidate secret matches the secret only if the candidate password matches the correct password; the candidate secret does not match the secret if the candidate password does not match the correct password; and the candidate secret when the candidate password matches the password and the candidate secret when the candidate password does not match the password have a common form. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. An apparatus for camouflaging a secret, the apparatus comprising:
-
means for representing, in digital form, the secret to be protected against unauthorized access, wherein the secret is retrievable using a correct password; means for representing said secret as a number of objects; and means for storing a composition function, wherein; the composition function is executable to generate a candidate secret using a candidate password and at least a subset of the number of objects; the candidate secret matches the secret only if the candidate password matches the correct password; the candidate secret does not match the secret if the candidate password does not match the correct password; and the candidate secret when the candidate password matches the password and the candidate secret when the candidate password does not match the correct password have a common form. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification