US 11,861,597 B1
Database encryption wallet
Phillip H. Griffin, Raleign, NC (US); and Jeffrey J. Stapleton, O'Fallon, MO (US)
Assigned to Wells Fargo Bank, N.A., San Francisco, CA (US)
Filed by Wells Fargo Bank, N.A., San Francisco, CA (US)
Filed on Jun. 24, 2022, as Appl. No. 17/849,342.
Application 17/849,342 is a continuation of application No. 16/239,308, filed on Jan. 3, 2019, granted, now 11,373,172.
This patent is subject to a terminal disclaimer.
Int. Cl. G06Q 20/36 (2012.01); H04L 9/08 (2006.01)
CPC G06Q 20/3678 (2013.01) [H04L 9/0822 (2013.01); G06Q 2220/00 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method, comprising:
generating a cryptogram by encrypting, by a hardware security module (HSM), a keyed-hash message authentication code (HMAC) key by a master key encryption key (MK);
transmitting, by the HSM to a database server, the cryptogram;
destroying, by the HSM, the cryptogram at the HSM, in response to the transmitting the cryptogram to the database server;
receiving, by the HSM from the database server, the cryptogram and an identifier (ID) generated by the database server;
generating, by the HSM, a wallet password based on the ID and the received cryptogram;
generating, by the HSM, a digital wallet comprising a data encryption key (DK) retrievable only via the wallet password;
transmitting, by the HSM to the database server, the digital wallet comprising the DK without the wallet password;
destroying, by the HSM, the wallet password in response to the transmitting the DK to the database server;
decrypting, by the HSM, the received cryptogram into a decrypted HMAC key;
regenerating, by the HSM, the wallet password using the ID and the decrypted HMAC key;
encrypting, by the HSM, the regenerated wallet password; and
transmitting, by the HSM to the database server, the encrypted regenerated wallet password,
wherein the database server is configured to decrypt the encrypted regenerated wallet password, and retrieve the DK from the digital wallet using the decrypted regenerated wallet password.