SYSTEMS AND METHODS FOR DATA ENCRYPTION, DECRYPTION, AND AUTHENTICATION
A computer-implemented method for generating a proof of identify may include (1) generating a unique single user profile (USUP) based on data derived from the computing device; (2) encrypting the USUP, which may include retrieving at least one encryption value set, generating at least one character...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A computer-implemented method for generating a proof of identify may include (1) generating a unique single user profile (USUP) based on data derived from the computing device; (2) encrypting the USUP, which may include retrieving at least one encryption value set, generating at least one character matrix based on the USUP, and executing at least one transformation operation on the at least one character matrix; (3) storing the encrypted USUP as a binary fingerprint; and (4) transmitting the binary fingerprint to a computing device. A computer-implemented method for self-authenticating may include (1) generating a first USUP based on data derived from the computing device; (2) obtaining a first binary fingerprint; (3) deriving a second USUP from the first binary fingerprint; (4) obtaining a second binary fingerprint; (5) deriving a third USUP from the second binary fingerprint; and (6) stopping decryption when the three USUPs do not match. |
---|