Movatterモバイル変換


[0]ホーム

URL:


US20060182283A1 - Architecture for asymmetric crypto-key storage - Google Patents

Architecture for asymmetric crypto-key storage
Download PDF

Info

Publication number
US20060182283A1
US20060182283A1US11/055,987US5598705AUS2006182283A1US 20060182283 A1US20060182283 A1US 20060182283A1US 5598705 AUS5598705 AUS 5598705AUS 2006182283 A1US2006182283 A1US 2006182283A1
Authority
US
United States
Prior art keywords
user
key
private
stored
multiple factors
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/055,987
Inventor
Ravinderpal Sandhu
Brett Schoppert
Ravi Ganesan
Mihir Bellare
Colin deSa
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
VMware LLC
Original Assignee
Tricipher Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tricipher IncfiledCriticalTricipher Inc
Priority to US11/055,987priorityCriticalpatent/US20060182283A1/en
Assigned to TRICIPHER, INC.reassignmentTRICIPHER, INC.CORRECTED ASSIGNMENT - RESUBMITTING CORRECTED ASSIGNMENT TO INCLUDE ALL INVENTOR'S SIGNATURES AND EXECTUTION DATES AS REQUESTED.Assignors: BELLARE, MIHIR, GANESAN, RAVI, SCHOPPERT, BRETT JASON, DESA, COLLIN JOSEPH, SANDHU, RAVINDERPAL SINGH
Priority to PCT/US2006/001256prioritypatent/WO2006078555A2/en
Publication of US20060182283A1publicationCriticalpatent/US20060182283A1/en
Priority to US12/729,469prioritypatent/US8340287B2/en
Assigned to VMWARE, INC.reassignmentVMWARE, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: TRICIPHER, INC.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Techniques for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions are provided. A first one of multiple factors is stored. All of the factors are under the control of a user and all are required to generate a first private portion of the split private key. The first private portion not stored in a persistent state. A second private portion of the split private key under control of an entity other than the user is also stored. The first private portion and the second private portion are combinable to form a complete private portion.

Description

Claims (20)

US11/055,9872005-01-182005-02-14Architecture for asymmetric crypto-key storageAbandonedUS20060182283A1 (en)

Priority Applications (3)

Application NumberPriority DateFiling DateTitle
US11/055,987US20060182283A1 (en)2005-02-142005-02-14Architecture for asymmetric crypto-key storage
PCT/US2006/001256WO2006078555A2 (en)2005-01-182006-01-13Architecture for asymmetric crypto-key storage
US12/729,469US8340287B2 (en)2005-02-142010-03-23Securing multifactor split key asymmetric crypto keys

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US11/055,987US20060182283A1 (en)2005-02-142005-02-14Architecture for asymmetric crypto-key storage

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US12/729,469ContinuationUS8340287B2 (en)2005-02-142010-03-23Securing multifactor split key asymmetric crypto keys

Publications (1)

Publication NumberPublication Date
US20060182283A1true US20060182283A1 (en)2006-08-17

Family

ID=36815644

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US11/055,987AbandonedUS20060182283A1 (en)2005-01-182005-02-14Architecture for asymmetric crypto-key storage
US12/729,469Expired - Fee RelatedUS8340287B2 (en)2005-02-142010-03-23Securing multifactor split key asymmetric crypto keys

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US12/729,469Expired - Fee RelatedUS8340287B2 (en)2005-02-142010-03-23Securing multifactor split key asymmetric crypto keys

Country Status (1)

CountryLink
US (2)US20060182283A1 (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070067618A1 (en)*2005-01-182007-03-22Tricipher, Inc.Asymmetric crypto-graphy with rolling key security
US20090222658A1 (en)*2005-02-142009-09-03Ravinderpal Singh SandhuRoaming utilizing an asymmetric key pair
US20100202609A1 (en)*2005-02-142010-08-12Ravinderpal Singh SandhuSecuring multifactor split key asymmetric crypto keys
WO2011051400A1 (en)*2009-10-302011-05-05Universitetet I StavangerSystem for protecting an encrypted information unit
US20120163590A1 (en)*2010-12-232012-06-28Morega Systems Inc.Cryptography module for use with fragmented key and methods for use therewith
US20130019096A1 (en)*2010-03-192013-01-17mr.QR10 GMBH & CO. KGSystem and method for communicating between different entities using different data portions for different channels
US20130138974A1 (en)*2011-11-282013-05-30Hon Hai Precision Industry Co.,Ltd.System and method for encrypting and storing data
US8719952B1 (en)2011-03-252014-05-06Secsign Technologies Inc.Systems and methods using passwords for secure storage of private keys on mobile devices
US8739260B1 (en)2011-02-102014-05-27Secsign Technologies Inc.Systems and methods for authentication via mobile communication device
US20140223527A1 (en)*2013-02-062014-08-07Dropbox, Inc.Client application assisted automatic user log in
US20140281562A1 (en)*2013-03-142014-09-18Research In Motion LimitedSystem and method for unified passcode processing
US20160323263A1 (en)*2007-09-282016-11-03Pulse Secure, LlcUpdating stored passwords
US10389535B2 (en)*2017-03-012019-08-20International Business Machines CorporationUsing public keys provided by an authentication server to verify digital signatures
US10547444B2 (en)*2015-02-172020-01-28Visa International Service AssociationCloud encryption key broker apparatuses, methods and systems
US10581595B2 (en)2017-03-012020-03-03International Business Machines CorporationGenerating public/private key pairs to deploy public keys at computing devices to verify digital signatures
US10607031B2 (en)*2018-04-252020-03-31Blockchain Asics LlcCryptographic ASIC with autonomous onboard permanent storage
US10885228B2 (en)2018-03-202021-01-05Blockchain ASICs Inc.Cryptographic ASIC with combined transformation and one-way functions
US10936758B2 (en)2016-01-152021-03-02Blockchain ASICs Inc.Cryptographic ASIC including circuitry-encoded transformation function
US11336686B2 (en)*2018-06-282022-05-17Cryptium CorporationElectronic authentication infrastructure
US11429540B2 (en)*2013-04-012022-08-30Secturion Systems, Inc.Multi-level independent security architecture
US20220417002A1 (en)*2019-10-182022-12-29Illinois At Singapore Pte LtdA security device and method of provenance verification
US20230291548A1 (en)*2022-03-082023-09-14Western Digital Technologies, Inc.Authorization requests from a data storage device to multiple manager devices

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9544143B2 (en)2010-03-032017-01-10Duo Security, Inc.System and method of notifying mobile devices to complete transactions
US9532222B2 (en)2010-03-032016-12-27Duo Security, Inc.System and method of notifying mobile devices to complete transactions after additional agent verification
US8990574B1 (en)2010-10-062015-03-24Prima Cinema, Inc.Secure device authentication protocol
US9282085B2 (en)*2010-12-202016-03-08Duo Security, Inc.System and method for digital user authentication
US8583911B1 (en)2010-12-292013-11-12Amazon Technologies, Inc.Network application encryption with server-side key management
US9094379B1 (en)2010-12-292015-07-28Amazon Technologies, Inc.Transparent client-side cryptography for network applications
US8538020B1 (en)*2010-12-292013-09-17Amazon Technologies, Inc.Hybrid client-server cryptography for network applications
US8843752B1 (en)2011-01-242014-09-23Prima Cimema, Inc.Multi-factor device authentication
WO2012122217A2 (en)*2011-03-072012-09-13Adtran, Inc.Method and apparatus for network access control
US8819768B1 (en)2011-05-032014-08-26Robert KoetenSplit password vault
US9467463B2 (en)2011-09-022016-10-11Duo Security, Inc.System and method for assessing vulnerability of a mobile device
US8763077B2 (en)2011-10-072014-06-24Duo Security, Inc.System and method for enforcing a policy for an authenticator device
US9524388B2 (en)2011-10-072016-12-20Duo Security, Inc.System and method for enforcing a policy for an authenticator device
TWI459188B (en)*2012-03-092014-11-01Phison Electronics CorpMemory card with smart card function and power control method and power control circuit thereof
US9039392B2 (en)2012-03-202015-05-26Aperia Technologies, Inc.Tire inflation system
US8699715B1 (en)*2012-03-272014-04-15Emc CorporationOn-demand proactive epoch control for cryptographic devices
US9049011B1 (en)*2012-08-152015-06-02Washington State UniversitySecure key storage and distribution
US9582671B2 (en)*2014-03-062017-02-28Sensity Systems Inc.Security and data privacy for lighting sensory networks
EP2904759B1 (en)*2013-01-082020-05-27Bar-Ilan UniversityA method for providing security using secure computation
US9443073B2 (en)2013-08-082016-09-13Duo Security, Inc.System and method for verifying status of an authentication device
US8893230B2 (en)2013-02-222014-11-18Duo Security, Inc.System and method for proxying federated authentication protocols
US9607156B2 (en)2013-02-222017-03-28Duo Security, Inc.System and method for patching a device through exploitation
US9338156B2 (en)2013-02-222016-05-10Duo Security, Inc.System and method for integrating two-factor authentication in a device
US9780950B1 (en)*2013-03-152017-10-03Symantec CorporationAuthentication of PKI credential by use of a one time password and pin
US9166970B1 (en)2013-03-152015-10-20Symantec CorporationDynamic framework for certificate application configuration
US9053310B2 (en)2013-08-082015-06-09Duo Security, Inc.System and method for verifying status of an authentication device through a biometric profile
US9608814B2 (en)2013-09-102017-03-28Duo Security, Inc.System and method for centralized key distribution
US9092302B2 (en)2013-09-102015-07-28Duo Security, Inc.System and method for determining component version compatibility across a device ecosystem
US9762590B2 (en)2014-04-172017-09-12Duo Security, Inc.System and method for an integrity focused authentication service
US9979719B2 (en)2015-01-062018-05-22Duo Security, Inc.System and method for converting one-time passcodes to app-based authentication
US9641341B2 (en)2015-03-312017-05-02Duo Security, Inc.Method for distributed trust authentication
US10127485B2 (en)2015-07-012018-11-13Carrier CorporationOnion layer encryption scheme for secure multi-access with single card
US9774579B2 (en)2015-07-272017-09-26Duo Security, Inc.Method for key rotation
EP3371731B1 (en)2015-11-042020-01-08Screening Room Media, Inc.Digital content delivery system
SE1551459A1 (en)*2015-11-112017-05-12Authentico Tech AbMethod and system for user authentication
GB201617620D0 (en)*2016-10-182016-11-30Cybernetica AsComposite digital signatures
US11190344B2 (en)*2017-01-252021-11-30Salesforce.Com, Inc.Secure user authentication based on multiple asymmetric cryptography key pairs
US10452819B2 (en)2017-03-202019-10-22Screening Room Media, Inc.Digital credential system
US10320758B2 (en)*2017-04-252019-06-11International Business Machines CorporationCryptography using multi-factor key system and finite state machine
US10412113B2 (en)2017-12-082019-09-10Duo Security, Inc.Systems and methods for intelligently configuring computer security
GB201721021D0 (en)*2017-12-152018-01-31Nchain Holdings LtdComputer-implemented methods and systems
CN109241016B (en)2018-08-142020-07-07阿里巴巴集团控股有限公司Multi-party security calculation method and device and electronic equipment
US11658962B2 (en)2018-12-072023-05-23Cisco Technology, Inc.Systems and methods of push-based verification of a transaction
US11388008B2 (en)2019-07-162022-07-12International Business Machines CorporationTrusted platform module swarm
US20230068597A1 (en)*2021-08-262023-03-02Weikeng ChenCryptocurrency system and method for performing financial transactions
US12348641B2 (en)2023-07-112025-07-01BKey, Inc.Authentication and key regeneration using a regenerated secret

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5623546A (en)*1995-06-231997-04-22Motorola, Inc.Encryption method and system for portable data
US5768388A (en)*1996-03-011998-06-16Goldwasser; ShafiTime delayed key escrow
US6026163A (en)*1995-12-132000-02-15Micali; SilvioDistributed split-key cryptosystem and applications
US6072876A (en)*1996-07-262000-06-06Nippon Telegraph And Telephone CorporationMethod and system for depositing private key used in RSA cryptosystem
US20020078345A1 (en)*2000-12-192002-06-20Ravi SandhuSystem and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys
US6542608B2 (en)*1997-02-132003-04-01Tecsec IncorporatedCryptographic key split combiner
US6662299B1 (en)*1999-10-282003-12-09Pgp CorporationMethod and apparatus for reconstituting an encryption key based on multiple user responses
US20050002532A1 (en)*2002-01-302005-01-06Yongxin ZhouSystem and method of hiding cryptographic private keys
US6845160B1 (en)*1998-11-122005-01-18Fuji Xerox Co., Ltd.Apparatus and method for depositing encryption keys
US7095851B1 (en)*1999-03-112006-08-22Tecsec, Inc.Voice and data encryption method using a cryptographic key split combiner
US7260552B2 (en)*2001-12-122007-08-21Scytl Online World Security, SaSecure remote electronic voting system and cryptographic protocols and computer programs employed

Family Cites Families (37)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4588991A (en)*1983-03-071986-05-13Atalla CorporationFile access security method and means
US5241598A (en)*1991-05-221993-08-31Ericsson Ge Mobile Communications, Inc.Rolling key resynchronization in cellular verification and validation system
US5485519A (en)*1991-06-071996-01-16Security Dynamics Technologies, Inc.Enhanced security for a secure token code
US5825880A (en)*1994-01-131998-10-20Sudia; Frank W.Multi-step digital signature method and system
US5481613A (en)*1994-04-151996-01-02Northern Telecom LimitedComputer network cryptographic key distribution system
US5737419A (en)*1994-11-091998-04-07Bell Atlantic Network Services, Inc.Computer system for securing communications using split private key asymmetric cryptography
KR19990022451A (en)*1995-06-051999-03-25피터 씨. 프레운드 Multilevel digital signature method and system
US5764772A (en)*1995-12-151998-06-09Lotus Development CoporationDifferential work factor cryptography method and system
US7080260B2 (en)*1996-11-192006-07-18Johnson R BrentSystem and computer based method to automatically archive and retrieve encrypted remote client data files
US6169802B1 (en)*1996-12-172001-01-02Motorola, Inc.Dynamic private key security system for personal messaging devices
US5953422A (en)*1996-12-311999-09-14Compaq Computer CorporationSecure two-piece user authentication in a computer network
US5920630A (en)*1997-02-251999-07-06United States Of AmericaMethod of public key cryptography that includes key escrow
US6212635B1 (en)*1997-07-182001-04-03David C. ReardonNetwork security system allowing access and modification to a security subsystem after initial installation when a master token is in place
US7095852B2 (en)*1998-02-132006-08-22Tecsec, Inc.Cryptographic key split binder for use with tagged data elements
US6697488B1 (en)*1998-08-262004-02-24International Business Machines CorporationPractical non-malleable public-key cryptosystem
US6970562B2 (en)*2000-12-192005-11-29Tricipher, Inc.System and method for crypto-key generation and use in cryptosystem
US20030115452A1 (en)*2000-12-192003-06-19Ravi SandhuOne time password entry to access multiple network sites
US7711122B2 (en)*2001-03-092010-05-04Arcot Systems, Inc.Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys
US20020159588A1 (en)*2001-04-272002-10-31Kauffman Jason R.Cryptography with unconditional security for the internet, commercial intranets, and data storage
US7050589B2 (en)*2001-08-172006-05-23Sun Microsystems, Inc.Client controlled data recovery management
US7146009B2 (en)*2002-02-052006-12-05Surety, LlcSecure electronic messaging system requiring key retrieval for deriving decryption keys
US7221764B2 (en)*2002-02-142007-05-22Agere Systems Inc.Security key distribution using key rollover strategies for wireless networks
GB0215590D0 (en)*2002-07-052002-08-14Hewlett Packard CoMethod and apparatus for generating a cryptographic key
US6931133B2 (en)*2002-09-032005-08-16Verisign, Inc.Method and system of securely escrowing private keys in a public key infrastructure
US7136489B1 (en)*2002-09-122006-11-14Novell, Inc.Method and system for enhancing network security using a multilateral authorization mechanism
GB2400699B (en)*2003-04-172006-07-05Hewlett Packard Development CoSecurity data provision method and apparatus and data recovery method and system
US7275159B2 (en)*2003-08-112007-09-25Ricoh Company, Ltd.Multimedia output device having embedded encryption functionality
US7596704B2 (en)*2003-10-102009-09-29Jing-Jang HwangPartition and recovery of a verifiable digital secret
US7624269B2 (en)*2004-07-092009-11-24Voltage Security, Inc.Secure messaging system with derived keys
US20060182283A1 (en)*2005-02-142006-08-17Tricipher, Inc.Architecture for asymmetric crypto-key storage
US7630493B2 (en)*2005-01-182009-12-08Tricipher, Inc.Multiple factor private portion of an asymmetric key
US7596697B2 (en)*2005-02-142009-09-29Tricipher, Inc.Technique for providing multiple levels of security
US20060182277A1 (en)*2005-02-142006-08-17Tricipher, Inc.Roaming utilizing an asymmetric key pair
US7386720B2 (en)*2005-02-142008-06-10Tricipher, Inc.Authentication protocol using a multi-factor asymmetric key pair
WO2006078572A2 (en)*2005-01-182006-07-27Tricipher, Inc.Asymmetric crypto-graphy with rolling key security
US7571471B2 (en)*2006-05-052009-08-04Tricipher, Inc.Secure login using a multifactor split asymmetric crypto-key with persistent key security
US7734045B2 (en)*2006-05-052010-06-08Tricipher, Inc.Multifactor split asymmetric crypto-key with persistent key security

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5623546A (en)*1995-06-231997-04-22Motorola, Inc.Encryption method and system for portable data
US6026163A (en)*1995-12-132000-02-15Micali; SilvioDistributed split-key cryptosystem and applications
US5768388A (en)*1996-03-011998-06-16Goldwasser; ShafiTime delayed key escrow
US6072876A (en)*1996-07-262000-06-06Nippon Telegraph And Telephone CorporationMethod and system for depositing private key used in RSA cryptosystem
US6542608B2 (en)*1997-02-132003-04-01Tecsec IncorporatedCryptographic key split combiner
US6845160B1 (en)*1998-11-122005-01-18Fuji Xerox Co., Ltd.Apparatus and method for depositing encryption keys
US7095851B1 (en)*1999-03-112006-08-22Tecsec, Inc.Voice and data encryption method using a cryptographic key split combiner
US6662299B1 (en)*1999-10-282003-12-09Pgp CorporationMethod and apparatus for reconstituting an encryption key based on multiple user responses
US20020078345A1 (en)*2000-12-192002-06-20Ravi SandhuSystem and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys
US7260552B2 (en)*2001-12-122007-08-21Scytl Online World Security, SaSecure remote electronic voting system and cryptographic protocols and computer programs employed
US20050002532A1 (en)*2002-01-302005-01-06Yongxin ZhouSystem and method of hiding cryptographic private keys

Cited By (41)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070067618A1 (en)*2005-01-182007-03-22Tricipher, Inc.Asymmetric crypto-graphy with rolling key security
US8099607B2 (en)2005-01-182012-01-17Vmware, Inc.Asymmetric crypto-graphy with rolling key security
US8213608B2 (en)2005-02-142012-07-03Vmware, Inc.Roaming utilizing an asymmetric key pair
US20090222658A1 (en)*2005-02-142009-09-03Ravinderpal Singh SandhuRoaming utilizing an asymmetric key pair
US20100202609A1 (en)*2005-02-142010-08-12Ravinderpal Singh SandhuSecuring multifactor split key asymmetric crypto keys
US8340287B2 (en)2005-02-142012-12-25Vmware, Inc.Securing multifactor split key asymmetric crypto keys
US10075432B2 (en)*2007-09-282018-09-11Pulse Secure, LlcUpdating stored passwords
US20160323263A1 (en)*2007-09-282016-11-03Pulse Secure, LlcUpdating stored passwords
US8855317B2 (en)2009-10-302014-10-07Universitetet I StavangerSystem for protecting an encrypted information unit
WO2011051400A1 (en)*2009-10-302011-05-05Universitetet I StavangerSystem for protecting an encrypted information unit
US20130019096A1 (en)*2010-03-192013-01-17mr.QR10 GMBH & CO. KGSystem and method for communicating between different entities using different data portions for different channels
US20120163590A1 (en)*2010-12-232012-06-28Morega Systems Inc.Cryptography module for use with fragmented key and methods for use therewith
US8892908B2 (en)*2010-12-232014-11-18Morega Systems Inc.Cryptography module for use with fragmented key and methods for use therewith
US8739260B1 (en)2011-02-102014-05-27Secsign Technologies Inc.Systems and methods for authentication via mobile communication device
US8719952B1 (en)2011-03-252014-05-06Secsign Technologies Inc.Systems and methods using passwords for secure storage of private keys on mobile devices
US8756420B2 (en)*2011-11-282014-06-17Hong Fu Jin Precision Industry (Shenzhen) Co., Ltd.System and method for encrypting and storing data
US20130138974A1 (en)*2011-11-282013-05-30Hon Hai Precision Industry Co.,Ltd.System and method for encrypting and storing data
US20140223527A1 (en)*2013-02-062014-08-07Dropbox, Inc.Client application assisted automatic user log in
US9027097B2 (en)*2013-02-062015-05-05Dropbox, Inc.Client application assisted automatic user log in
US20140281562A1 (en)*2013-03-142014-09-18Research In Motion LimitedSystem and method for unified passcode processing
US9171140B2 (en)*2013-03-142015-10-27Blackberry LimitedSystem and method for unified passcode processing
US11429540B2 (en)*2013-04-012022-08-30Secturion Systems, Inc.Multi-level independent security architecture
US10547444B2 (en)*2015-02-172020-01-28Visa International Service AssociationCloud encryption key broker apparatuses, methods and systems
US10936758B2 (en)2016-01-152021-03-02Blockchain ASICs Inc.Cryptographic ASIC including circuitry-encoded transformation function
US10581595B2 (en)2017-03-012020-03-03International Business Machines CorporationGenerating public/private key pairs to deploy public keys at computing devices to verify digital signatures
US11088848B2 (en)*2017-03-012021-08-10International Business Machines CorporationUsing public keys provided by an authentication server to verify digital signatures
US10979216B2 (en)2017-03-012021-04-13International Business Machines CorporationGenerating public/private key pairs to deploy public keys at computing devices to verify digital signatures
US10389535B2 (en)*2017-03-012019-08-20International Business Machines CorporationUsing public keys provided by an authentication server to verify digital signatures
US10885228B2 (en)2018-03-202021-01-05Blockchain ASICs Inc.Cryptographic ASIC with combined transformation and one-way functions
US10796024B2 (en)2018-04-252020-10-06Blockchain ASICs Inc.Cryptographic ASIC for derivative key hierarchy
US11042669B2 (en)2018-04-252021-06-22Blockchain ASICs Inc.Cryptographic ASIC with unique internal identifier
US10607030B2 (en)2018-04-252020-03-31Blockchain Asics LlcCryptographic ASIC with onboard permanent context storage and exchange
US11093654B2 (en)2018-04-252021-08-17Blockchain ASICs Inc.Cryptographic ASIC with self-verifying unique internal identifier
US11093655B2 (en)2018-04-252021-08-17Blockchain ASICs Inc.Cryptographic ASIC with onboard permanent context storage and exchange
US10607031B2 (en)*2018-04-252020-03-31Blockchain Asics LlcCryptographic ASIC with autonomous onboard permanent storage
US11336686B2 (en)*2018-06-282022-05-17Cryptium CorporationElectronic authentication infrastructure
US11831680B2 (en)2018-06-282023-11-28Cryptium CorporationElectronic authentication infrastructure
US20220417002A1 (en)*2019-10-182022-12-29Illinois At Singapore Pte LtdA security device and method of provenance verification
US12177336B2 (en)*2019-10-182024-12-24Illinois At Singapore Pte LtdSecurity device and method of provenance verification
US20230291548A1 (en)*2022-03-082023-09-14Western Digital Technologies, Inc.Authorization requests from a data storage device to multiple manager devices
US12225111B2 (en)*2022-03-082025-02-11SanDisk Technologies, Inc.Authorization requests from a data storage device to multiple manager devices

Also Published As

Publication numberPublication date
US8340287B2 (en)2012-12-25
US20100202609A1 (en)2010-08-12

Similar Documents

PublicationPublication DateTitle
US8340287B2 (en)Securing multifactor split key asymmetric crypto keys
US7630493B2 (en)Multiple factor private portion of an asymmetric key
US7599493B2 (en)Asymmetric key pair having a kiosk mode
US7386720B2 (en)Authentication protocol using a multi-factor asymmetric key pair
US8213608B2 (en)Roaming utilizing an asymmetric key pair
US8099607B2 (en)Asymmetric crypto-graphy with rolling key security
US7571471B2 (en)Secure login using a multifactor split asymmetric crypto-key with persistent key security
US7734045B2 (en)Multifactor split asymmetric crypto-key with persistent key security
US7055032B2 (en)One time password entry to access multiple network sites
US7069435B2 (en)System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys
US7017041B2 (en)Secure communications network with user control of authenticated personal information provided to network entities
US7596697B2 (en)Technique for providing multiple levels of security
US7895437B2 (en)Augmented single factor split key asymmetric cryptography-key generation and distributor
US6940980B2 (en)High security cryptosystem
US7065642B2 (en)System and method for generation and use of asymmetric crypto-keys each having a public portion and multiple private portions
US7149310B2 (en)Method and system for authorizing generation of asymmetric crypto-keys
US7565527B2 (en)Technique for asymmetric crypto-key generation
WO2006078561A2 (en)Technique for asymmetric crypto-key generation
WO2006078560A2 (en)Roaming utilizing an asymmetric key pair
WO2006078557A2 (en)Authentication protocol using a multi-factor asymmetric key pair
WO2006078555A2 (en)Architecture for asymmetric crypto-key storage
WO2006078559A2 (en)Asymmetric key pair having a kiosk mode
WO2006078556A2 (en)Technique for providing multiple levels of security

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:TRICIPHER, INC., CALIFORNIA

Free format text:CORRECTED ASSIGNMENT - RESUBMITTING CORRECTED ASSIGNMENT TO INCLUDE ALL INVENTOR'S SIGNATURES AND EXECTUTION DATES AS REQUESTED.;ASSIGNORS:SANDHU, RAVINDERPAL SINGH;SCHOPPERT, BRETT JASON;GANESAN, RAVI;AND OTHERS;REEL/FRAME:017460/0577;SIGNING DATES FROM 20050214 TO 20050404

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION

ASAssignment

Owner name:VMWARE, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:TRICIPHER, INC.;REEL/FRAME:025402/0645

Effective date:20101130


[8]ページ先頭

©2009-2025 Movatter.jp