http://rdf.ncbi.nlm.nih.gov/pubchem/patent/GB-2439568-A
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_a256c6a2721ac4037301f88c3c9cb9e3 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F12-1408 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-31 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-31 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F12-14 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 |
filingDate | 2006-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_86778b1774c54d035e86c74ca0239801 |
publicationDate | 2008-01-02-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | GB-2439568-A |
titleOfInvention | Transient protection key derivation in a computing device |
abstract | A computing device is arranged to use any possible permutation of methods available to it to authenticate a user, without needing to persistently store any unencrypted data that can be used in authentication, such data only ever being held in transient memory. A user of the device is provided with their own unique common protection key (CPK) which can be used to guard or encrypt sensitive data and functionality. Each of the authentication methods is guaranteed to return a unique consistent identification sequence (CIS) each time it is employed by any specific user. When a user registers on the device, the CIS from each authentication method is used to generate a key which in turn is used to encrypt the CPK ; this E(CPK) is then stored in a table indexed by user and authentication method. Neither the CPK nor any CIS are ever kept on the device except in transient memory. When authentication is sought, the CIS for each requested method is obtained and is used to regenerate the key that can be used to decrypt the E(CPK). All the CPKs thus decrypted must match for authentication to be granted. |
priorityDate | 2006-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Total number of triples: 26.