Cryptographic key management method
First Claim
1. A cryptographic key management method comprising steps of:
- generating and storing a management cryptographic key;
generating a transaction cryptographic key;
encrypting the transaction cryptographic key with the management cryptographic key; and
storing the encrypted transaction cryptographic key in a key management server.
1 Assignment
0 Petitions
Accused Products
Abstract
A network system has: an application server for providing service; a client for using the service; and a key server. The client acquires and stores a management cryptographic key, acquires a transaction cryptographic key to be used for a transaction with the application server, encrypts the transaction cryptographic key with the management cryptographic key, sends the encrypted transaction cryptographic key to the key server, requests the key server to send back the encrypted transaction cryptographic key for a transaction, and decrypts the encrypted transaction cryptographic key with the management cryptographic key to acquire the transaction cryptographic key. The key server stores the sent, encrypted transaction cryptographic key and sends the encrypted transaction cryptographic key to the client in response to a request from the client.
-
Citations
12 Claims
-
1. A cryptographic key management method comprising steps of:
-
generating and storing a management cryptographic key;
generating a transaction cryptographic key;
encrypting the transaction cryptographic key with the management cryptographic key; and
storing the encrypted transaction cryptographic key in a key management server. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A network system comprising:
-
an application server for providing services;
a client for using the services; and
a key server, wherein;
said client acquires and stores a management cryptographic key, acquires a transaction cryptographic key to be used for a transaction with said application server, encrypts the transaction cryptographic key with the management cryptographic key, sends the encrypted transaction cryptographic key to said key server, requests the key server to send back the encrypted transaction cryptographic key for the transaction, and decrypts the encrypted transaction cryptographic key with the management cryptographic key to acquire the transaction cryptographic key; and
said key server stores the sent, encrypted transaction cryptographic key and sends the encrypted transaction cryptographic key to said client in response to a request from the client. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification