System and method for securely copying a cryptographic key
First Claim
1. A method of securely copying a cryptographic key from one smart device to another smart device, comprising:
- mutually authenticating a smart source device and a host with respect to each other;
mutually authenticating a smart destination device and the host with respect to each other;
authenticating the destination device through the host by the source device; and
sending a cryptographic key stored in the source device to the destination device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided in which a cryptographic key stored in a secure token such as a smart card can be copied to another smart card with high security and assurance with no intermediary being able to see what is being transferred. According to the invention, a host assisting in the transfer and a source smart card mutually authenticate themselves with each other. The host and a destination smart card also mutually authenticate themselves with each other. Then, the source card authenticates the destination card to ensure that the destination card is permitted to receive the cryptographic key of the source card. The source card then sends the cryptographic key to the destination card in a secure manner.
88 Citations
18 Claims
-
1. A method of securely copying a cryptographic key from one smart device to another smart device, comprising:
-
mutually authenticating a smart source device and a host with respect to each other;
mutually authenticating a smart destination device and the host with respect to each other;
authenticating the destination device through the host by the source device; and
sending a cryptographic key stored in the source device to the destination device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 13, 14, 15, 16, 18)
-
-
12. A method of securely copying a cryptographic key from one secure token to another secure token, the cryptographic key being self-generated by the one secure token, comprising:
-
mutually authenticating a secure source token and a host with respect to each other;
mutually authenticating a secure destination token and the host with respect to each other;
authenticating the destination token through the host by the source token using a symmetric key that is common to and stored in the source and destination tokens; and
sending a cryptographic key stored in the source token to the destination token.
-
-
17. A system for securely copying a cryptographic key from one smart device to another smart device, comprising:
-
a host having host software stored therein;
a smart source device connected to and operable to communicate with the host, the source device storing source software;
a smart destination device connected to and operable to communicate with the host, the destination device storing destination software; and
wherein the host software, source software and destination software interact with each other to;
mutually authenticate the source device and the host with respect to each other;
mutually authenticate the destination device and the host with respect to each other;
authenticate the destination device by the source device; and
send a cryptographic key stored in the source device to the destination device.
-
Specification