Patent
Computer system employing a split-secret cryptographic key linked to a password-based cryptographic key security scheme
TLDR
In computer environments where passwords are used to compute retained secrets by methods such as password-based encryption, the authors describes a method that allows a fully operational system to modify the retained secrets without retaining passwords or requiring human intervention.Abstract:
In computer environments where passwords are used to compute retained secrets by methods such as password-based encryption, a need often arises to update these secrets. Retaining the password value, or the keys computed from the password, would be unwise; and requiring each password owner to type in their password would be cumbersome. The present invention describes a method that allows a fully operational system to modify the retained secrets without retaining passwords or requiring human intervention.read more
Citations
More filters
Patent
Secure data parser method and system
TL;DR: A secure data parser as discussed by the authors parses data and then splits the data into multiple portions that are stored or communicated distinctly, which can be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
Patent
Systems and methods for securing data in motion
Rick L. Orsini,Mark S. O'hare +1 more
TL;DR: In this article, the authors present a solution that makes data provably secure and accessible, by addressing data security at the bit level, thereby eliminating the need for multiple perimeter hardware and software technologies.
Patent
Systems and methods for securing data in the cloud
TL;DR: In this article, a secure data parser is provided that may be integrated into any suitable system for securely storing data in and communicating data with cloud computing resources, and the parser parses data and then splits the data into multiple portions that are stored or communicated distinctly.
Patent
Context sensitive dynamic authentication in a cryptographic system
TL;DR: In this article, a system for performing authentication of a first user to a second user includes the ability for the first users to submit multiple instances of authentication data which are evaluated and then used to generate an overall level of confidence in the claimed identity of the first user.
Patent
Systems and methods for secure data sharing
TL;DR: In this paper, a sharable file-level key is generated based on a workgroup key associated with the data file, as well as unique information associated with a data file.
References
More filters
Patent
Cryptographic communications system and method
TL;DR: In this paper, a message-to-be-transferred message is enciphered to ciphertext at the encoding terminal by first encoding the message as a number M in a predetermined set, and then raising that number to a first predetermined power (associated with the intended receiver) and finally computing the remainder, or residue, C, when the exponentiated number is divided by the product of two predetermined prime numbers associated with intended receiver.