METHOD FOR TRANSFERRING AN ENCRYPTION KEY
First Claim
1. A method for transferring a replacement encryption key, said method comprising the steps of:
- transmitting a public key from a source device to a target device;
encrypting a traffic key within said target device using said public key thereby forming a requested key;
transmitting said requested key to said source device;
encrypting said replacement encryption key using said traffic key at said source device forming an encrypted replacement key;
transmitting said encrypted replacement key to said target device; and
recovering said replacement encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
Encryption keys are transferred by obtaining a public and private key pair (42, 65) from a source device (21, 61). The public key is transmitted (42, 65) from the source device (43, 66) to a target device (23, 62). The target (23, 62) obtains a traffic key (44, 67) stored within the target device (23, 62). The traffic key is encrypted (45, 68) within the target device using the public key. The encrypted traffic key is transmitted to the source device (46, 69) where it is decrypted (47, 70) using the private key. The replacement encryption key(s) is(are) encrypted using the traffic key by the source device (48, 71) forming an encrypted replacement key message which contains a target slot identification for each of the replacement encryption keys. The encrypted replacement key message is transmitted to the target device (49, 72) where the replacement encryption key(s) is(are) recovered (50, 73). The replacement encryption key(s) is(are) then stored at the target device in an identified target slot (51). The public, private, and traffic keys may then be erased from the source and target devices as appropriate.
-
Citations
20 Claims
-
1. A method for transferring a replacement encryption key, said method comprising the steps of:
-
transmitting a public key from a source device to a target device;
encrypting a traffic key within said target device using said public key thereby forming a requested key;
transmitting said requested key to said source device;
encrypting said replacement encryption key using said traffic key at said source device forming an encrypted replacement key;
transmitting said encrypted replacement key to said target device; and
recovering said replacement encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for transferring a replacement encryption key, said method comprising the steps of:
-
obtaining a public key and a private key from a source device;
transmitting said public key from said source device to a target device;
obtaining a traffic key from within said target device;
encrypting a traffic key within said target device using said public key thereby forming a requested key;
transmitting said requested key to said source device;
decrypting said requested key using said private key at said source device;
encrypting said replacement encryption key using said traffic key at said source device forming an encrypted replacement key;
transmitting said encrypted replacement key to said target device;
recovering said replacement encryption key; and
storing said replacement encryption key at said target device. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A method for transferring a plurality of replacement encryption keys, said method comprising the steps of:
-
obtaining a public key and a private key from a source device;
transmitting said public key from said source device to a target device;
obtaining a traffic key from within said target device;
encrypting a traffic key within said target device using said public key thereby forming a requested key;
transmitting said requested key to said source device;
decrypting said requested key using said private key at said source device;
encrypting said plurality of replacement encryption keys using said traffic key at said source device forming an encrypted replacement key message which further contains a target slot identification for each of said plurality of replacement encryption keys;
transmitting said encrypted replacement key message to said target device;
recovering said plurality of replacement encryption keys from said encrypted replacement key message; and
storing said plurality of replacement encryption keys at said target device in a target slot identified for each of said plurality of replacement encryption keys.
-
Specification