Movatterモバイル変換


[0]ホーム

URL:


US20240022399A1 - System and method for generating a cryptographic key - Google Patents

System and method for generating a cryptographic key
Download PDF

Info

Publication number
US20240022399A1
US20240022399A1US18/361,643US202318361643AUS2024022399A1US 20240022399 A1US20240022399 A1US 20240022399A1US 202318361643 AUS202318361643 AUS 202318361643AUS 2024022399 A1US2024022399 A1US 2024022399A1
Authority
US
United States
Prior art keywords
data
segments
computer
user
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US18/361,643
Inventor
Robert Coleridge
Malcolm Hutchinson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chol Inc USA
Original Assignee
Chol Inc USA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chol Inc USAfiledCriticalChol Inc USA
Priority to US18/361,643priorityCriticalpatent/US20240022399A1/en
Publication of US20240022399A1publicationCriticalpatent/US20240022399A1/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system and method for generating a cryptographic key using a sequence of data segments selected by a user from one or more data resources. Raw data from the one or more data resources corresponding to each of the selected data segments, and the sequence in which such data segments are selected, is extracted and processed to generate a key. The key can be used for any cryptographic and authentication purpose. By enabling a user to select the sequence of data segments from the one or more data resources in any manner the user desires, the user can create a strong key, but also easily remember the underlying data resource and chosen sequence. This technique provides enhanced security while maintaining ease of creation and use of such security.

Description

Claims (21)

US18/361,6432014-11-132023-07-28System and method for generating a cryptographic keyPendingUS20240022399A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US18/361,643US20240022399A1 (en)2014-11-132023-07-28System and method for generating a cryptographic key

Applications Claiming Priority (5)

Application NumberPriority DateFiling DateTitle
US201462079031P2014-11-132014-11-13
US14/939,490US10050784B2 (en)2014-11-132015-11-12System and method for generating a cryptographic key
US16/102,601US11398903B1 (en)2014-11-132018-08-13System and method for generating a cryptographic key
US17/814,784US11716197B2 (en)2014-11-132022-07-25System and method for generating a cryptographic key
US18/361,643US20240022399A1 (en)2014-11-132023-07-28System and method for generating a cryptographic key

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US17/814,784ContinuationUS11716197B2 (en)2014-11-132022-07-25System and method for generating a cryptographic key

Publications (1)

Publication NumberPublication Date
US20240022399A1true US20240022399A1 (en)2024-01-18

Family

ID=55962686

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US14/939,490Active2036-05-10US10050784B2 (en)2014-11-132015-11-12System and method for generating a cryptographic key
US16/102,601ActiveUS11398903B1 (en)2014-11-132018-08-13System and method for generating a cryptographic key
US17/814,784ActiveUS11716197B2 (en)2014-11-132022-07-25System and method for generating a cryptographic key
US18/361,643PendingUS20240022399A1 (en)2014-11-132023-07-28System and method for generating a cryptographic key

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US14/939,490Active2036-05-10US10050784B2 (en)2014-11-132015-11-12System and method for generating a cryptographic key
US16/102,601ActiveUS11398903B1 (en)2014-11-132018-08-13System and method for generating a cryptographic key
US17/814,784ActiveUS11716197B2 (en)2014-11-132022-07-25System and method for generating a cryptographic key

Country Status (1)

CountryLink
US (4)US10050784B2 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10050784B2 (en)*2014-11-132018-08-14Secure Channels Inc.System and method for generating a cryptographic key
US9692598B2 (en)2015-08-072017-06-27Terry L. DavisMulti-use long string authentication keys
TWI590092B (en)*2015-11-302017-07-01Chunghwa Telecom Co Ltd Authentication code generation system and method using virtual reality
FR3058845B1 (en)2016-11-162020-11-13Moving Magnet Tech STATOR FOR HIGH SPEED ELECTRIC MACHINE
CN109101830A (en)*2018-09-032018-12-28安徽太阳石科技有限公司Real time data safety protecting method and system based on block chain
CN109117096B (en)*2018-09-032020-04-21安徽太阳石科技有限公司 Blockchain-based distributed data storage method and system
US11283598B2 (en)*2019-01-252022-03-22Infineon Technologies AgSelective real-time cryptography in a vehicle communication network
FR3099016B1 (en)2019-07-182021-07-30In Idt Method for generating a private key from biometric characteristics.
US12003488B2 (en)*2020-11-172024-06-04Sap SeProtecting cloud application secret key with multi-party computation algorithm

Citations (33)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7240208B1 (en)*2003-04-232007-07-03The United States Of America As Represented By The Administrator Of The National Aeronautics And Space AdministrationEncrypting digital camera with automatic encryption key deletion
US20080072037A1 (en)*2006-09-052008-03-20Sathya NarayananRobust peer-to-peer networks and methods of use thereof
US20080229109A1 (en)*2007-03-122008-09-18Alexander GantmanHuman-recognizable cryptographic keys
US20080263361A1 (en)*2007-04-202008-10-23Microsoft CorporationCryptographically strong key derivation using password, audio-visual and mental means
US20090169003A1 (en)*2007-12-272009-07-02Samsung Electronics Co., Ltd.Broadcast processing apparatus and method thereof
US20100082970A1 (en)*2008-09-302010-04-01Aram LindahlMethod and System for Ensuring Sequential Playback of Digital Media
US20100246818A1 (en)*2009-03-302010-09-30Zongming YaoMethods and apparatuses for generating dynamic pairwise master keys
US20100287382A1 (en)*2009-05-072010-11-11John Charles GyorffyTwo-factor graphical password for text password and encryption key generation
US20100322485A1 (en)*2009-06-182010-12-23Research In Motion LimitedGraphical authentication
US20110019816A1 (en)*2008-05-292011-01-27Pfu LimitedElectronic document processing system
US20110055585A1 (en)*2008-07-252011-03-03Kok-Wah LeeMethods and Systems to Create Big Memorizable Secrets and Their Applications in Information Engineering
US20120023574A1 (en)*2006-05-242012-01-26Vidoop, LlcGraphical Image Authentication And Security System
US20120079009A1 (en)*2010-09-172012-03-29Oracle International CorporationMethod and apparatus for choosing resources based on context and inheritance
US20120159609A1 (en)*2010-12-162012-06-21Research In Motion LimitedPassword entry using moving images
US20120170832A1 (en)*2010-12-312012-07-05Industrial Technology Research InstituteDepth map generation module for foreground object and method thereof
US20120246463A1 (en)*2011-03-232012-09-27CipherPoint Software, Inc.Systems and methods for implementing transparent encryption
US20120291108A1 (en)*2011-05-122012-11-15Konvax CorporationSecure user credential control
US8321480B2 (en)*2010-11-242012-11-27Bmc Software, Inc.Full-function to high availability large database conversion
US20130016835A1 (en)*2011-07-132013-01-17Universite De GeneveApparatus and method for distributing a string of secret bits over a quantum channel
US20130198198A1 (en)*2012-01-312013-08-01Fujitsu LimitedGenerating method, generating system, and recording medium
US8532343B1 (en)*2010-04-162013-09-10Steven Jay FreedmanSystem for non-repudiable registration of an online identity
US20130254545A1 (en)*2011-11-242013-09-26Beijing Founder Apabi Technology Ltd.Method, system and apparatus for transmitting digital contents
US20130268775A1 (en)*2012-04-102013-10-10Good Technology CorporationMethod and device for generating a code
US20130305046A1 (en)*2012-05-142013-11-14Computer Associates Think, Inc.System and Method for Virtual Machine Data Protection in a Public Cloud
US8601598B2 (en)*2006-09-292013-12-03Microsoft CorporationOff-premise encryption of data storage
US8621036B1 (en)*2010-11-172013-12-31Israel L'HeureuxSecure file access using a file access server
US20140115679A1 (en)*2012-10-232014-04-24Edward M. BartonAuthentication method of enumerated pattern of field positions based challenge and enumerated pattern of field positions based response through interaction between two credentials in random partial digitized path recognition system
US20140189358A1 (en)*2005-07-142014-07-03Conax AsMultimedia data protection
US20140201644A1 (en)*2013-01-172014-07-17Campaigntrack pty ItdMethod and Apparatus for Producing Digitally Edited Images
US20140372754A1 (en)*2013-06-132014-12-18Selim AissiImage based key derivation function
US20160019538A1 (en)*2014-05-152016-01-21Koobecafe, LlcTransaction Authorization Employing Drag-And-Drop of a Security-Token-Encoded Image
US20160142204A1 (en)*2014-11-132016-05-19Teascom UK LtdSystem and method for generating a cryptographic key
US20160269178A1 (en)*2015-03-092016-09-15Crowd Ip Box Ug (Haftungsbeschraenkt)Privacy-Enhanced Biometrics-Secret Binding Scheme

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8954758B2 (en)2011-12-202015-02-10Nicolas LEOUTSARAKOSPassword-less security and protection of online digital assets

Patent Citations (34)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US7240208B1 (en)*2003-04-232007-07-03The United States Of America As Represented By The Administrator Of The National Aeronautics And Space AdministrationEncrypting digital camera with automatic encryption key deletion
US20140189358A1 (en)*2005-07-142014-07-03Conax AsMultimedia data protection
US20120023574A1 (en)*2006-05-242012-01-26Vidoop, LlcGraphical Image Authentication And Security System
US20080072037A1 (en)*2006-09-052008-03-20Sathya NarayananRobust peer-to-peer networks and methods of use thereof
US8601598B2 (en)*2006-09-292013-12-03Microsoft CorporationOff-premise encryption of data storage
US20080229109A1 (en)*2007-03-122008-09-18Alexander GantmanHuman-recognizable cryptographic keys
US20080263361A1 (en)*2007-04-202008-10-23Microsoft CorporationCryptographically strong key derivation using password, audio-visual and mental means
US20090169003A1 (en)*2007-12-272009-07-02Samsung Electronics Co., Ltd.Broadcast processing apparatus and method thereof
US20110019816A1 (en)*2008-05-292011-01-27Pfu LimitedElectronic document processing system
US20110055585A1 (en)*2008-07-252011-03-03Kok-Wah LeeMethods and Systems to Create Big Memorizable Secrets and Their Applications in Information Engineering
US20100082970A1 (en)*2008-09-302010-04-01Aram LindahlMethod and System for Ensuring Sequential Playback of Digital Media
US20100246818A1 (en)*2009-03-302010-09-30Zongming YaoMethods and apparatuses for generating dynamic pairwise master keys
US20100287382A1 (en)*2009-05-072010-11-11John Charles GyorffyTwo-factor graphical password for text password and encryption key generation
US20100322485A1 (en)*2009-06-182010-12-23Research In Motion LimitedGraphical authentication
US8532343B1 (en)*2010-04-162013-09-10Steven Jay FreedmanSystem for non-repudiable registration of an online identity
US20120079009A1 (en)*2010-09-172012-03-29Oracle International CorporationMethod and apparatus for choosing resources based on context and inheritance
US8621036B1 (en)*2010-11-172013-12-31Israel L'HeureuxSecure file access using a file access server
US8321480B2 (en)*2010-11-242012-11-27Bmc Software, Inc.Full-function to high availability large database conversion
US20120159609A1 (en)*2010-12-162012-06-21Research In Motion LimitedPassword entry using moving images
US20120170832A1 (en)*2010-12-312012-07-05Industrial Technology Research InstituteDepth map generation module for foreground object and method thereof
US20120246463A1 (en)*2011-03-232012-09-27CipherPoint Software, Inc.Systems and methods for implementing transparent encryption
US20120291108A1 (en)*2011-05-122012-11-15Konvax CorporationSecure user credential control
US20130016835A1 (en)*2011-07-132013-01-17Universite De GeneveApparatus and method for distributing a string of secret bits over a quantum channel
US20130254545A1 (en)*2011-11-242013-09-26Beijing Founder Apabi Technology Ltd.Method, system and apparatus for transmitting digital contents
US20130198198A1 (en)*2012-01-312013-08-01Fujitsu LimitedGenerating method, generating system, and recording medium
US20130268775A1 (en)*2012-04-102013-10-10Good Technology CorporationMethod and device for generating a code
US20130305046A1 (en)*2012-05-142013-11-14Computer Associates Think, Inc.System and Method for Virtual Machine Data Protection in a Public Cloud
US20140115679A1 (en)*2012-10-232014-04-24Edward M. BartonAuthentication method of enumerated pattern of field positions based challenge and enumerated pattern of field positions based response through interaction between two credentials in random partial digitized path recognition system
US20140201644A1 (en)*2013-01-172014-07-17Campaigntrack pty ItdMethod and Apparatus for Producing Digitally Edited Images
US20140372754A1 (en)*2013-06-132014-12-18Selim AissiImage based key derivation function
US20160019538A1 (en)*2014-05-152016-01-21Koobecafe, LlcTransaction Authorization Employing Drag-And-Drop of a Security-Token-Encoded Image
US20160142204A1 (en)*2014-11-132016-05-19Teascom UK LtdSystem and method for generating a cryptographic key
US11716197B2 (en)*2014-11-132023-08-01Chol, Inc.System and method for generating a cryptographic key
US20160269178A1 (en)*2015-03-092016-09-15Crowd Ip Box Ug (Haftungsbeschraenkt)Privacy-Enhanced Biometrics-Secret Binding Scheme

Also Published As

Publication numberPublication date
US20230012182A1 (en)2023-01-12
US11716197B2 (en)2023-08-01
US10050784B2 (en)2018-08-14
US11398903B1 (en)2022-07-26
US20160142204A1 (en)2016-05-19

Similar Documents

PublicationPublication DateTitle
US11716197B2 (en)System and method for generating a cryptographic key
Dhawan et al.Analysis of various data security techniques of steganography: A survey
US9817954B2 (en)Multi-mode protected content wrapper
US10467387B2 (en)Computerized system and method for modifying a media file by automatically applying security features to select portions of media file content
US11582266B2 (en)Method and system for protecting privacy of users in session recordings
US10904761B2 (en)Media agnostic content obfuscation
US20130163758A1 (en)Methods and Apparatus for Key Delivery in HTTP Live Streaming
CN109214201B (en)Data sharing method, terminal equipment and computer readable storage medium
US8887290B1 (en)Method and system for content protection for a browser based content viewer
US9928352B2 (en)System and method for creating, processing, and distributing images that serve as portals enabling communication with persons who have interacted with the images
US11929993B2 (en)System, method and application for transcoding data into media files
US20150106614A1 (en)Systems and methods of safeguarding user information while interacting with online service providers
CN116076055A (en)Method and system for verifying user identification
US9740835B2 (en)Systems and methods for creating and sharing protected content
CN106203141A (en)The data processing method of a kind of application and device
CN109120576B (en)Data sharing method and device, computer equipment and storage medium
CN114785524A (en)Electronic seal generation method, device, equipment and medium
CN111131284B (en)Information verification method and device, electronic equipment and computer readable storage medium
US20230195906A1 (en)Information processing devices and information processing methods
Maheswari et al.Personalized secured API for application developer
US10909245B1 (en)Secure quarantine of potentially malicious content
US20180091295A1 (en)Data protection
CN110032832B (en)Web application processing method and device
Kumaresan et al.Reversible data hiding in encrypted images using public cloud and cellular Automata
Damsika et al.A novel mechanism for secure e-tendering in an open electronic network

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER


[8]ページ先頭

©2009-2025 Movatter.jp