Multifactor split asymmetric crypto-key with persistent key...

Cryptography – Key management – Having particular key generator

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S155000

Reexamination Certificate

active

07734045

ABSTRACT:
A processor generates an asymmetric crypto-key, such as an RSA crypto-key, which is associated with the user and includes a private key and a public key. It computes a first key portion based on a stored random number generation function, which has one or more constants such as a salt and/or iteration count, and a first value of a constant, and a second key portion based on the computed first key portion and one of the private key and the public key. It additionally computes another first key portion based on the stored random number generation function and a second value of that constant, and another second key portion based on the computed other first key portion and the one key. The computed first and second key portions and the computed other first and second key portions form first and second splits of the one key of the asymmetric crypto-key.

REFERENCES:
patent: 5588061 (1996-12-01), Ganesan et al.
patent: 5623546 (1997-04-01), Hardy et al.
patent: 5748735 (1998-05-01), Ganesan
patent: 6026163 (2000-02-01), Micali
patent: 6317834 (2001-11-01), Gennaro et al.
patent: 6609198 (2003-08-01), Wood et al.
patent: 6901512 (2005-05-01), Kurn et al.
patent: 7007050 (2006-02-01), Saarinen
patent: 7260724 (2007-08-01), Dickinson et al.
patent: 2002/0076042 (2002-06-01), Sandhu et al.
patent: 2002/0078344 (2002-06-01), Sandhu et al.
patent: 2002/0078345 (2002-06-01), Sandhu et al.
patent: 2004/0088260 (2004-05-01), Foster et al.
patent: 2006/0064377 (2006-03-01), Ganesan et al.
patent: 2006/0083370 (2006-04-01), Hwang
patent: 2006/0285683 (2006-12-01), Anatharaman et al.
patent: WO 00/49768 (2000-08-01), None
Thomas Wu, The Secure Remote Password Protocol, Nov. 11, 1997, Computer Science Department, Stanford University, p. 1-16.
Branovic et al. , A workload characterization of Elliptic Curve Cryptography Methods in Embedded Environment, Jun. 2004, ACM, vol. 32, No. 3.
Chen et al., “Applications of Multiple Trust Authorities in Pairing Based Cryptosystems”, 2002, pp. 260-275.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Multifactor split asymmetric crypto-key with persistent key... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Multifactor split asymmetric crypto-key with persistent key..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Multifactor split asymmetric crypto-key with persistent key... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4194187

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.