The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 03, 2020

Filed:

Sep. 17, 2018
Applicant:

Xage Security, Inc., Palo Alto, CA (US);

Inventors:

Susanto Junaidi Irwan, San Francisco, CA (US);

Roman M. Arutyunov, San Jose, CA (US);

Alexander Michael Valderrama, Palo Alto, CA (US);

Assignee:

Xage Security, Inc., Palo Alto, CA (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 9/30 (2006.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 9/14 (2006.01); H04L 9/06 (2006.01);
U.S. Cl.
CPC ...
H04L 9/3093 (2013.01); H04L 9/0637 (2013.01); H04L 9/085 (2013.01); H04L 9/0861 (2013.01); H04L 9/14 (2013.01); H04L 9/321 (2013.01);
Abstract

In an embodiment, a computer-implemented data security method comprises: using a first computing device, generating a plurality of encrypted shares from a plurality of shares of hidden security service data by using a separate public key from a plurality of public keys that correspond to a plurality of second computing devices; using a requesting second computing device, accessing and decrypting a first encrypted share of the plurality of encrypted shares using a first private key corresponding to the requesting second computing device to generate a first portion of the hidden security service data; using an available second computing device, decrypting a second encrypted share of the plurality of encrypted shares using a second private key corresponding to the available second computing device to generate a decrypted share; using the available second computing device, re-encrypting the decrypted share using a public key corresponding to the requesting second computing device to generate a re-encrypted share and sending the re-encrypted share to the requesting second computing device; and using the requesting second computing device, decrypting the re-encrypted share using the first private key to generate a second portion of the hidden security service data; using the first portion and second portion of the hidden security service data, forming and using a readable copy of the hidden security service data to perform authentications.


Find Patent Forward Citations

Loading…