Parameter based key derivation

作者: Eric D. Crahen , Kevin Ross O'neill , Nathan R. Fitch , Bradley Jeffery Behm , Gregory B. Roth

DOI:

关键词:

摘要: Systems and methods for authentication generate keys from secret credentials shared between authenticating parties authenticators. Generation of the may involve utilizing specialized information that, as a result being used to keys, renders generated usable smaller scope uses than credential. Further, key generation multiple invocations function where each at least subset results in that has permissible use produced previous invocation function. Generated be signing sign messages. One or more actions taken depending on whether message and/or manner which was submitted complies with restrictions key's use.

参考文章(221)
Martin A. Nemzow, Ron M. Redlich, Digital information infrastructure and method ,(2009)
John Stavropoulos, Jack Crystal, Alan Neuhauser, Wendell Lynch, Anand Jain, Vladimir Kuznetsov, System and method for determinimg contextual characteristics of media exposure data ,(2011)
Joseph Bjorn Ovick, Ryan Hagey, Patrick Stan, Mark Carlson, Margaret Reid, Glenn Powell, Patrick Wright, Krishna Prasad Koganti, Systems and methods to use transaction authorization communications to process offers ,(2013)
Hiroshi Nakayama, Toshiaki Enami, Kohei Umemoto, Takeru Kaneko, Terminal device, information processing system, information processing method, and program ,(2013)