| CPC H04L 9/3236 (2013.01) [H04L 9/0825 (2013.01); H04L 9/0869 (2013.01)] | 27 Claims |

|
1. A method, comprising:
identifying a first instance of a first secret;
receiving and hashing a first instance of first data from a first source to generate a first hashed instance of the first data, wherein the first instance of the first data from the first source is discarded;
computing a first mapping function between the first hashed instance of the first data and the first instance of the first secret, wherein the first mapping function is stored and the first hashed instance of the first data and the first instance of the first secret are discarded;
receiving and hashing a second instance of the first data from the first source to generate a second hashed instance of the first data;
applying the first mapping function to the second hashed instance of the first data to generate a second instance of the first secret;
identifying a first instance of a second secret;
generating a first instance of a first codeword based on the first instance of the second secret;
receiving a first instance of second data from a second source;
computing a second mapping function between the first instance of second data from the second source and the first instance of the first codeword, wherein the second mapping function is stored and the first instance of second data from the second source and the first instance of the first codeword are discarded;
receiving a second instance of second data from the second source;
applying the second mapping function to the second instance of second data from the second source to generate a second instance of the first codeword;
generating a second instance of the second secret based on the second instance of the first codeword; and
generating a key using the second instance of the first secret and the second instance of the second secret.
|