| CPC H04L 9/3231 (2013.01) [H04L 9/0819 (2013.01); H04L 9/0894 (2013.01)] | 18 Claims |

|
1. A computer-implemented method, comprising:
receiving, with at least one processor, first password data associated with a first password, first biometric input data associated with a first biometric input, and first secret key data associated with a first secret key;
generating, with at least one processor, a second secret key using the first secret key, the first password, and a password-to-random protocol;
generating, with at least one processor, fuzzy extractor helper data using the first biometric input and the second secret key;
storing, with at least one processor, the fuzzy extractor helper data and the first secret key;
receiving, with at least one processor, one of attempted password data associated with an attempted password or second biometric input data associated with a second biometric input; and
obliviously generating, with at least one processor, a reconstructed second secret key using the first secret key and the attempted password in response to receiving the attempted password data or using the second biometric input and the fuzzy extractor helper data in response to receiving the second biometric input.
|