摘要 |
<p>A first processor generates a private crypto-key and a public crypto-key. The first processor divides the private crypto-key into two portions, a first private key portion, based upon a user's password, and a second private key portion (655). The private crypto-key and the first private key portion are then destroyed(660).</p> |