×

Multiple authority key derivation

  • US 10,044,503 B1
  • Filed: 11/14/2014
  • Issued: 08/07/2018
  • Est. Priority Date: 03/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving a root key from a key authority;

    generating, based at least in part on the root key and using a cryptographic hash function that includes an operand associated with usage restrictions on at least some generated keys, a plurality of keys that corresponds to a plurality of levels hierarchically subordinate to the key authority;

    generating a key hierarchy comprising the root key and the plurality of keys arranged according to the plurality of levels;

    associating, based at least in part on the cryptographic hash function, a subset of the usage restrictions to an individual level of the key hierarchy;

    receiving encrypted data having been encrypted using a particular key in the key hierarchy, the encrypted data being decryptable using any key in the key hierarchy at a level equal to or higher than that of the particular key but undecryptable by any key lower in the key hierarchy than the level;

    decrypting the encrypted data using a key from the key hierarchy; and

    providing access to the decrypted data.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×