US 12,452,071 B2
Authentication information manager computer program product and device
Tsu-Pin Weng, Hsinchu (TW); Wu-Hsiung Huang, Hsinchu (TW); Jia-You Jiang, Hsinchu (TW); Yi-Yuan Ho, Hsinchu (TW); Hung-Ming Chen, Hsinchu (TW); and Yuan-Sheng Chen, Hsinchu (TW)
Assigned to EverMore Technology Inc., Hsinchu (TW)
Filed by EverMore Technology Inc., Hsinchu (TW)
Filed on Sep. 25, 2023, as Appl. No. 18/372,196.
Claims priority of application No. 112109000 (TW), filed on Mar. 10, 2023.
Prior Publication US 2024/0305462 A1, Sep. 12, 2024
Int. Cl. H04L 9/32 (2006.01)
CPC H04L 9/3226 (2013.01) [H04L 9/3213 (2013.01); H04L 9/3247 (2013.01)] 6 Claims
OG exemplary drawing
 
1. An authentication information manager method, comprising:
by a computer code of a physical private key acquisition module installed in a user equipment, receiving an identity information from a physical private key and a passcode to form an initialization authentication information comprising a part of the passcode and a part of the identity information;
by a computer code of an authentication information management module installed in the user equipment, recording a first set of authentication information for logging in to a first networking application;
by a computer code of a mapping node authentication module installed in the user equipment, transmitting the initialization authentication information to a network application serving device comprising an authentication information manager backend platform and a third-party mapping node for verification by initiating a mapping node authentication method, wherein the mapping node authentication method comprises:
randomly generating at least one ephemeral decryption key upon receiving the initialization authentication information at the user equipment;
performing a third-party mapping process, wherein the third-party mapping process comprises:
transmitting the at least one ephemeral decryption key from the user equipment to the third-party mapping node;
correspondingly generating a key index based on the at least one ephemeral decryption key by the third-party mapping node;
returning the key index from the third-party mapping node to the user equipment;
transmitting the key index from the user equipment to the network application serving device; and
requesting the third-party mapping node to retrieve the key index from the network application serving device based on the key index,
wherein the key index refers to a strictly smaller portion that sufficient to extract the at least one ephemeral decryption key.