US 12,348,641 B2
Authentication and key regeneration using a regenerated secret
Mark D. Hetherington, Crystal Lake, IL (US); Jorn Lyseggen, London (GB); Edgardo M. Cruz-Zeno, Round Lake, IL (US); Nai Sum Wong, Palatine, IL (US); and Ming Dai, Buffalo Grove, IL (US)
Assigned to BKey, Inc., Schaumburg, IL (US)
Filed by BKey, Inc., Schaumburg, IL (US)
Filed on Jul. 11, 2024, as Appl. No. 18/770,587.
Claims priority of provisional application 63/513,114, filed on Jul. 11, 2023.
Prior Publication US 2025/0023737 A1, Jan. 16, 2025
Int. Cl. H04L 9/32 (2006.01); H04L 9/08 (2006.01)
CPC H04L 9/3236 (2013.01) [H04L 9/0825 (2013.01); H04L 9/0869 (2013.01)] 27 Claims
OG exemplary drawing
 
1. A method, comprising:
identifying a first instance of a first secret;
receiving and hashing a first instance of first data from a first source to generate a first hashed instance of the first data, wherein the first instance of the first data from the first source is discarded;
computing a first mapping function between the first hashed instance of the first data and the first instance of the first secret, wherein the first mapping function is stored and the first hashed instance of the first data and the first instance of the first secret are discarded;
receiving and hashing a second instance of the first data from the first source to generate a second hashed instance of the first data;
applying the first mapping function to the second hashed instance of the first data to generate a second instance of the first secret;
identifying a first instance of a second secret;
generating a first instance of a first codeword based on the first instance of the second secret;
receiving a first instance of second data from a second source;
computing a second mapping function between the first instance of second data from the second source and the first instance of the first codeword, wherein the second mapping function is stored and the first instance of second data from the second source and the first instance of the first codeword are discarded;
receiving a second instance of second data from the second source;
applying the second mapping function to the second instance of second data from the second source to generate a second instance of the first codeword;
generating a second instance of the second secret based on the second instance of the first codeword; and
generating a key using the second instance of the first secret and the second instance of the second secret.