Methods, apparatus, and systems are disclosed for, among other things, secure passphrase handling for computing devices. In one respect, a method is provided. The method includes receiving a plurality of passphrase elements from an input device. The method also includes performing a sequence of secu
Methods, apparatus, and systems are disclosed for, among other things, secure passphrase handling for computing devices. In one respect, a method is provided. The method includes receiving a plurality of passphrase elements from an input device. The method also includes performing a sequence of secure delay processing operations, each operation generating a delayed output value from an initial value. The passphrase is verified upon completion of the sequence of secure delay processing operations. Further, initial values of respective secure delay processing operations are based on respective passphrase elements and, for each secure delay processing operation after a first secure delay processing operation, a delayed output value from at least one other secure delay processing operations.
대표청구항▼
1. A method comprising: receiving, at a secure messaging system, an electronic message for a recipient;generating, at the secure messaging system, an encrypted message using a first key and the electronic message, wherein the first key is operable for a first period of time;storing the encrypted mes
1. A method comprising: receiving, at a secure messaging system, an electronic message for a recipient;generating, at the secure messaging system, an encrypted message using a first key and the electronic message, wherein the first key is operable for a first period of time;storing the encrypted message in a file on the secure messaging system;generating a decrypted message using a second key and the encrypted message, wherein the second key is operable for a second period of time; andtransmitting, to an electronic device associated with the recipient, the decrypted message, wherein the electronic message and the decrypted message are not stored in files on the secure messaging system. 2. The method of claim 1, further comprising: coupling a hardware device with the secure messaging system, the hardware device storing at least one of: (i) the first key, or (ii) the second key; andreceiving, from the hardware device, the stored at least one of: (i) the first key, or (ii) the second key. 3. The method of claim 2, further comprising disabling the hardware device based at least in part on a comparison between a current time and a period of time associated with the stored at least one of: (i) the first key, or (ii) the second key. 4. The method of claim 1, further comprising receiving, from a device associated with a sender of the electronic message, the first key. 5. The method of claim 1, further comprising receiving, at the secure messaging system from a device associated with a sender of the electronic message, user authenticating information, wherein generating the encrypted message is further based at least in part on the user authenticating information. 6. The method of claim 5, wherein the user authenticating information comprises a passphrase input. 7. The method of claim 1, further comprising: storing, in a database coupled with the secure computing system, an association between the first key and the file. 8. The method of claim 7, further comprising: determining the first period of time associated with the first key is expired;deleting, from the database, the association between the first key and the file; anddeleting the file from the secure computing system. 9. The method of claim 1, wherein the electronic message comprises at least one of image data, text data, video data, or audio data. 10. The method of claim 1, further comprising determining the first period of time has not expired, and wherein said generating the encrypted message is performed in response to determining that the first period of time has not expired. 11. A secure messaging system comprising: a receiver configured to receive an electronic message for a recipient;a memory storing machine readable instructions; andone or more processors configured to execute the machine readable instructions to cause the secure messaging system to: generate an encrypted message using a first key and the electronic message, wherein the first key is operable for a first period of time;store the encrypted message in a file on the memory;generate a decrypted message using a second key and the encrypted message, wherein the second key is operable for a second period of time; andtransmit, to an electronic device associated with the recipient, the decrypted message, wherein the electronic message and the decrypted message are not stored in files on the secure messaging system. 12. The secure messaging system of claim 11, wherein the one or more processors are further configured to execute the machine readable instructions to cause the secure messaging system to receive at least one of: (i) the first key, or (ii) the second key from a hardware device storing the at least one of: (i) the first key, or (ii) the second key. 13. The secure messaging system of claim 12, wherein the secure messaging system comprises the hardware device. 14. The secure messaging system of claim 12, wherein the hardware device comprises a disposable integrated circuit device. 15. The secure messaging system of claim 12, wherein the one or more processors are further configured to execute the machine readable instructions to cause the secure messaging system to disable the hardware device based least in part on a comparison between a current time and a period of time associated with the stored at least one of: (i) the first key, or (ii) the second key. 16. The secure messaging system of claim 11, the receiver is further configured to receive, from a device associated with a sender of the electronic message, the first key. 17. The secure messaging system of claim 11, wherein receive is further configured to receive, from a device associated with a sender of the electronic message, user authenticating information, wherein generating the encrypted message is further based at least in part on the user authenticating information. 18. The secure messaging system of claim 17, wherein the user authenticating information comprises a passphrase input. 19. The secure messaging system of claim 11, wherein the one or more processors are further configured to execute the machine readable instructions to cause the secure messaging system to: store, in the memory, an association between the first key and the file;determine the first period of time associated with the first key is expired;delete, from the memory, the association between the first key and the file; anddelete, from the memory, the file. 20. A non-transitory computer-readable storage medium including instructions executable by one or more processors of a secure messaging system, the instructions causing the secure messaging system to: receive an electronic message for a recipient;generate an encrypted message using a first key and the electronic message, wherein the first key is operable for a first period of time;store the encrypted message in a file on the secure messaging system;generate a decrypted message using a second key and the encrypted message, wherein the second key is operable for a second period of time; andtransmit, to an electronic device associated with the recipient, the decrypted message, wherein the electronic message and the decrypted message are not stored in files on the secure messaging system.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (90)
Epstein, Michael A., Administration and utilization of private keys in a networked environment.
Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302) Graziano James M. (4662 Weld County Rd. 34 Platteville CO 80651), Document authentication apparatus.
Kitaori Shoji,JPX ; Koganezawa Yuichi,JPX, Electronic signature addition method, electronic signature verification method, and system and computer program product.
Zdybel ; Jr. Frank (Palo Alto CA) Sang ; Jr. Henry W. (Cupertino CA) Pedersen Jan O. (Palo Alto CA) Smith ; III Z. E. (Palo Alto CA) Henderson ; Jr. D. A. (Palo Alto CA) Hecht David L. (Palo Alto CA), Hardcopy lossless data storage and communications for electronic document processing systems.
Martino Michael J. (Gardiner NY) Meissner Geoffrey L. (Poughkeepsie NY) Paulsen ; Jr. Robert C. (Highland NY), Identity verification system resistant to compromise by observation of its use.
Graziano James M. (4662 Weld County Road 34 Platteville CO 80651) Dziewit Halina S. (5260 Centennial Trail Boulder CO 80302), Knowledge based system for document authentication (apparatus).
Turnbull James Arthur,CAX ; Curry Ian H.,CAX ; Van Oorschot Paul C.,CAX ; Hillier Stephen William,CAX, Method and apparatus for extending secure communication operations via a shared list.
Abadi Martin ; Needham Roger Michael,GBX ; Lomas Thomas Mark Angus,GBX, Method and apparatus for strengthening passwords for protection of computer systems.
Anderson Milton ; Jaffe Frank ; Hibbert Chris ; Virkki Jyri ; Kravitz Jeffrey ; Chang Sheveling ; Palmer Elaine, Method and system for processing electronic documents.
Horino Naoharu,JPX ; Suto Masayuki,JPX ; Matsui Kineo,JPX, Method of and apparatus for embedding data into an electronic document by modulating spaces between words.
Terao,Taro, One-way function generation method, one-way function value generation device, proving device, authentication method, and authentication device.
Pintsov Leon A. (West Hartford CT) Connell Richard A. (South Salem NY) Sansone Ronald P. (Weston CT) Schmidt Alfred C. (Wilton CT), Postal rating system with verifiable integrity.
Force Gordon (San Jose CA) Davis Timothy D. (Arlington TX) Duncan Richard L. (Bedford TX) Norcross Thomas M. (Arlington TX) Shay Michael J. (Arlington TX) Short Timothy A. (Duncanville TX), Programmable distributed personal security.
Bisbee Stephen F. ; Moskowitz Jack J. ; Sheehan Edward R. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission, storage and retrieval of authenticated documents.
Lloyd, Michael; Shepley, Christopher; Stidman, Sean; Browne, H. Lee; Generous, Curtis; Lycas, John, System and method for personalizing electronic mail messages.
Heckman Dean A. (Palmyra NY) Tuttle Steven R. (Rochester NY) Qureshi Irshad H. (Fairport NY), System for electronically printing plural-color tamper-resistant documents.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.