Techniques for generating a private portion of a split private key of an asymmetric key pair are provided. Multiple factors upon which the private portion of the split private key is based are received. Each of these multiple factors is under control of a user associated with the asymmetric key pair. Multiple cryptographic operations are then performed using the received multiple factors to generate the private portion.

 
Web www.patentalert.com

< Secure audio stream scramble system

> Forgery-proof packaging material with a security feature

> Method for protecting electronic device, and electronic device

~ 00564