A first processor generates a private crypto-key and a public crypto-key. The first processor divides the private crypto-key into two portions, a first private key portion, based upon a user's password, and a second private key portion. The private crypto-key and the first private key portion are then destroyed. The remaining portion, second private key portion, and the public crypto-key are stored in a memory. A second processor generates the first private key portion based upon the user's password and responsive to receiving the user's password. The second processor then destroys the generated first private key portion with out storing the generated first private key portion.

 
Web www.patentalert.com

< Protecting content from illicit reproduction by proof of existence of a complete data set using security identifiers

< System, method, and apparatus for securely providing content viewable on a secure device

> System for fast scrambling and descrambling of data

> Data multiplexing device, program distribution system, program transmission system, pay broadcast system, program transmission method, conditional access system, and data reception device

~ 00223