Key management
First Claim
1. A method of managing cryptographic keys, the method comprising:
- accessing at a server a server key;
accessing at the server a client key;
accessing at the server an encrypted private key provided by a client;
encrypting the encrypted private key with the server key to generate a twice encrypted private key; and
encrypting the twice encrypted private key with the client key to generate a thrice encrypted private key.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are methods, processor programs, and cryptography products for managing cryptographic keys. The methods, processor programs, and cryptography products disclosed herein can protect keys stored in a database against a wide variety of malicious attacks. The methods, processor programs, and products disclosed herein may include a variety of mechanisms that wrap a key in several layers of protection. According to one exemplary embodiment disclosed herein, a method of managing cryptographic keys includes accessing at a server a server key, accessing at the server a client key, accessing at the server an encrypted private key provided by a client, encrypting the encrypted private key with the server key to generate a twice encrypted private key, and encrypting the twice encrypted private key with the client key to generate a thrice encrypted private key.
-
Citations
44 Claims
-
1. A method of managing cryptographic keys, the method comprising:
-
accessing at a server a server key;
accessing at the server a client key;
accessing at the server an encrypted private key provided by a client;
encrypting the encrypted private key with the server key to generate a twice encrypted private key; and
encrypting the twice encrypted private key with the client key to generate a thrice encrypted private key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of managing cryptographic keys, the method comprising:
-
accessing at a server a server key;
accessing at the server an encrypted private key provided by a client; and
encrypting the encrypted private key with the server key to generate a twice encrypted private key. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32)
-
-
33. A method of managing cryptographic keys, the method comprising:
-
accessing at a server a server key;
accessing at the server a first client key;
accessing at the server a first package encrypted with the first client key, the first package including at least an encrypted private key provided by a client and a second client key;
decrypting the first package with the first client key;
extracting at least the second client key and the encrypted private key from the first package;
encrypting the encrypted private key with the server key to generate a twice encrypted private key; and
encrypting the twice encrypted private key with the second client key to generate a thrice encrypted private key. - View Dependent Claims (34, 35, 36, 37, 38, 39)
-
-
40. A processor program for managing cryptographic keys, the processor program being tangibly stored on a processor-readable medium and comprising instructions operable to cause a processor to:
-
access at a server a server key;
access at the server an encrypted private key provided by a client; and
encrypt the encrypted private key with the server key to generate a twice encrypted private key. - View Dependent Claims (41)
-
-
42. A product for managing cryptographic keys, the product comprising:
multiple twice encrypted private keys, at least some of the multiple twice encrypted private keys including an encrypted private key provided by a client, the encrypted private key being further encrypted by a server key generated at a server. - View Dependent Claims (43)
-
44. A product for managing cryptographic keys, the product comprising:
multiple thrice encrypted private keys, at least some of the multiple thrice encrypted private keys including an encrypted private key being further encrypted by two independent layers of encryption.
Specification