发明名称 Adding entropy to key generation on a mobile device
摘要 Methods, apparatus and articles of manufacture for adding entropy to key generation on a mobile device are provided herein. A method includes generating a prompt via a computing device interface in connection with an authentication request to access a protected resource associated with the computing device; processing input cryptographic information entered via the computing device interface in response to the prompt against a pre-determined set of cryptographic information, wherein said pre-determined set of cryptographic information comprises one or more input elements and one or more interface manipulation measures associated with the one or more input elements; and resolving the authentication request based on said processing.
申请公布号 US9407441(B1) 申请公布日期 2016.08.02
申请号 US201313927386 申请日期 2013.06.26
申请人 EMC Corporation 发明人 Dotan Yedidya;Friedman Lawrence N.;Bailey Daniel V.;Brainard John;Duane William M.
分类号 G06F21/00;H04L9/32 主分类号 G06F21/00
代理机构 Ryan, Mason & Lewis, LLP 代理人 Ryan, Mason & Lewis, LLP
主权项 1. A method comprising: generating a prompt via a computing device interface in connection with an authentication request to access a protected resource associated with the computing device; processing input cryptographic information entered via the computing device interface in response to the prompt against a pre-determined set of cryptographic information, wherein said pre-determined set of cryptographic information comprises (i) two or more input elements and (ii) two or more qualitative and/or quantitative interface manipulation measures associated with the action of entering the two or more input elements via the computing device interface, wherein the two or more qualitative and/or quantitative interface manipulation measures comprise at least (a) pace of input and (b) directionality of the manipulation of the computing device interface, and wherein said processing comprises: re-ordering the two or more input elements after being entered via the computing device interface by mapping the two or more input elements to a unique user via a mapping table stored locally on the computing device so as to identify a re-ordered version of the two or more input elements to be used in combination with the two or more qualitative and/or quantitative interface manipulation measures for granting access to the protected resource associated with the computing device; and resolving the authentication request based on said processing, wherein said resolving comprises granting access to the protected resource upon a determination that the input cryptographic information matches (i) the two or more input elements of the pre-determined set of cryptographic information and (ii) the two or more qualitative and/or quantitative interface manipulation measures of the pre-determined set of cryptographic information.
地址 Hopkinton MA US