SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION

A computer-implemented method for generating a proof of identify may include (1) generating a unique single user profile (USUP) based on data derived from the computing device; (2) encrypting the USUP, which may include retrieving at least one encryption value set, generating at least one character...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Poe, IV, Martin Thomas, White, Thurman Richard, Poe, III, Martin Thomas
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A computer-implemented method for generating a proof of identify may include (1) generating a unique single user profile (USUP) based on data derived from the computing device; (2) encrypting the USUP, which may include retrieving at least one encryption value set, generating at least one character matrix based on the USUP, and executing at least one transformation operation on the at least one character matrix; (3) storing the encrypted USUP as a binary fingerprint; and (4) transmitting the binary fingerprint to a computing device. A computer-implemented method for self-authenticating may include (1) generating a first USUP based on data derived from the computing device; (2) obtaining a first binary fingerprint; (3) deriving a second USUP from the first binary fingerprint; (4) obtaining a second binary fingerprint; (5) deriving a third USUP from the second binary fingerprint; and (6) stopping decryption when the three USUPs do not match.