http://rdf.ncbi.nlm.nih.gov/pubchem/patent/GB-2439568-A

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_a256c6a2721ac4037301f88c3c9cb9e3
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F12-1408
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-32
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-31
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-31
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F12-14
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
filingDate 2006-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_86778b1774c54d035e86c74ca0239801
publicationDate 2008-01-02-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber GB-2439568-A
titleOfInvention Transient protection key derivation in a computing device
abstract A computing device is arranged to use any possible permutation of methods available to it to authenticate a user, without needing to persistently store any unencrypted data that can be used in authentication, such data only ever being held in transient memory. A user of the device is provided with their own unique common protection key (CPK) which can be used to guard or encrypt sensitive data and functionality. Each of the authentication methods is guaranteed to return a unique consistent identification sequence (CIS) each time it is employed by any specific user. When a user registers on the device, the CIS from each authentication method is used to generate a key which in turn is used to encrypt the CPK ; this E(CPK) is then stored in a table indexed by user and authentication method. Neither the CPK nor any CIS are ever kept on the device except in transient memory. When authentication is sought, the CIS for each requested method is obtained and is used to regenerate the key that can be used to decrypt the E(CPK). All the CPKs thus decrypted must match for authentication to be granted.
priorityDate 2006-06-08-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID420167
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID100174621
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID504480
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID171498
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID170755
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID164073
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID415859406
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID564523
http://rdf.ncbi.nlm.nih.gov/pubchem/gene/GID23678

Total number of triples: 26.