scispace - formally typeset
Patent

Computer system employing a split-secret cryptographic key linked to a password-based cryptographic key security scheme

David Kurn
TLDR
In computer environments where passwords are used to compute retained secrets by methods such as password-based encryption, the authors describes a method that allows a fully operational system to modify the retained secrets without retaining passwords or requiring human intervention.
Abstract
In computer environments where passwords are used to compute retained secrets by methods such as password-based encryption, a need often arises to update these secrets. Retaining the password value, or the keys computed from the password, would be unwise; and requiring each password owner to type in their password would be cumbersome. The present invention describes a method that allows a fully operational system to modify the retained secrets without retaining passwords or requiring human intervention.

read more

Citations
More filters
Patent

Secure data parser method and system

TL;DR: A secure data parser as discussed by the authors parses data and then splits the data into multiple portions that are stored or communicated distinctly, which can be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
Patent

Systems and methods for securing data in motion

TL;DR: In this article, the authors present a solution that makes data provably secure and accessible, by addressing data security at the bit level, thereby eliminating the need for multiple perimeter hardware and software technologies.
Patent

Systems and methods for securing data in the cloud

TL;DR: In this article, a secure data parser is provided that may be integrated into any suitable system for securely storing data in and communicating data with cloud computing resources, and the parser parses data and then splits the data into multiple portions that are stored or communicated distinctly.
Patent

Context sensitive dynamic authentication in a cryptographic system

TL;DR: In this article, a system for performing authentication of a first user to a second user includes the ability for the first users to submit multiple instances of authentication data which are evaluated and then used to generate an overall level of confidence in the claimed identity of the first user.
Patent

Systems and methods for secure data sharing

TL;DR: In this paper, a sharable file-level key is generated based on a workgroup key associated with the data file, as well as unique information associated with a data file.
References
More filters
Patent

Cryptographic communications system and method

TL;DR: In this paper, a message-to-be-transferred message is enciphered to ciphertext at the encoding terminal by first encoding the message as a number M in a predetermined set, and then raising that number to a first predetermined power (associated with the intended receiver) and finally computing the remainder, or residue, C, when the exponentiated number is divided by the product of two predetermined prime numbers associated with intended receiver.