摘要 |
Techniques and systems for protecting verifiable digital secrets such as encryption keys and identification codes based on partition and recovery processes are described. Implementations of the present techniques may be used, for example, to offer individuals a personalized tool for protecting secret data and to provide enhanced security. The partition and recovery may be carried out at the same computer or on separate computers.
|