Automatic generation of a new encryption key
First Claim
1. A method of generating a new encryption keypair within a device that is connected to a network and which performs secure operations using an existing encryption keypair maintained within the device, comprising the steps of:
- receiving a request from another device on the network to provide an encryption key of the existing encryption keypair to the another device;
in response to the request, determining whether an encryption key of the existing encryption keypair within the device is valid; and
in a case where the determining step determines that the encryption key of the existing encryption keypair is invalid, the device automatically performing the steps of;
deleting each key of the existing encryption keypair from the device;
generating a new encryption keypair within the device and storing the new encryption keypair in the device; and
providing a new encryption key corresponding to the requested encryption key of the new encryption keypair to another device.
1 Assignment
0 Petitions
Accused Products
Abstract
A device (such as a printer or a network device that may be connected to the printer) that is connected to a network and which performs secure operations using an existing encryption keypair maintained within the device, generates a new encryption keypair within the device by receiving a request from another device on the network to provide an encryption key of the existing encryption keypair to the another device. In response to the request, the device determines whether an encryption key of the existing encryption keypair within the device is valid. In a case where it is determined that the encryption key of the existing encryption keypair is invalid, the device automatically deletes each key of the existing encryption keypair from the device, generates a new encryption keypair within the device and stores the new encryption keypair in the device. The device then provides a new encryption key corresponding to the requested encryption key of the new encryption keypair to another device.
75 Citations
78 Claims
-
1. A method of generating a new encryption keypair within a device that is connected to a network and which performs secure operations using an existing encryption keypair maintained within the device, comprising the steps of:
-
receiving a request from another device on the network to provide an encryption key of the existing encryption keypair to the another device;
in response to the request, determining whether an encryption key of the existing encryption keypair within the device is valid; and
in a case where the determining step determines that the encryption key of the existing encryption keypair is invalid, the device automatically performing the steps of;
deleting each key of the existing encryption keypair from the device;
generating a new encryption keypair within the device and storing the new encryption keypair in the device; and
providing a new encryption key corresponding to the requested encryption key of the new encryption keypair to another device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 75)
-
-
14. A network device connected to a network which provides encryption functionality to a printer, comprising:
-
a secure storage medium storing an existing encryption keypair for the network device;
a network interface for receiving and transmitting information via the network;
an entropy collection and storage mechanism for collecting random data within the device that can be used as a source of entropy for encryption key generation and for storing the collected random data;
an encryption key generator for generating encryption keys;
a processor for executing computer-executable process steps; and
a memory storing computer-executable process steps to be executed by the processor, the computer-executable process steps comprising;
(a) receiving a request from another device on the network for the network device to provide the another device with an encryption key of the existing encryption keypair stored in the secure storage medium, (b) in response to the request, determining whether the requested encryption key of the existing encryption keypair stored in the secure storage medium is valid, and (c) in a case where the determining step determines that the requested encryption key of the existing encryption keypair is invalid, automatically performing the steps of;
(d) deleting each key of the existing encryption keypair from the secure storage medium, (e) generating a new encryption keypair by the encryption key generator, (f) storing the new encryption keypair in the secure storage medium, and (g) providing a new encryption key corresponding to the requested encryption key of the new encryption keypair to the another device. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 76)
-
-
28. Computer-executable process steps for generating a new encryption keypair within a device that is connected to a network and which performs secure operations using an existing encryption keypair maintained within the device, the executable process steps comprising the steps of:
-
receiving a request from another device on the network to provide an encryption key of the existing encryption keypair to the another device;
in response to the request, determining whether an encryption key of the existing encryption keypair within the device is valid; and
in a case where the determining step determines that the encryption key of the existing encryption keypair is invalid, the device automatically performing the steps of;
deleting each key of the existing encryption keypair from the device;
generating a new encryption keypair within the device and storing the new encryption keypair in the device; and
providing a new encryption key corresponding to the requested encryption key of the new encryption keypair to another device. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 77)
-
-
41. A computer-readable medium which stores computer-executable process steps for generating a new encryption keypair within a device that is connected to a network and which performs secure operations using an existing encryption keypair maintained within the device, the executable process steps comprising the steps of:
-
receiving a request from another device on the network to provide an encryption key of the existing encryption keypair to the another device;
in response to the request, determining whether an encryption key of the existing encryption keypair within the device is valid; and
in a case where the determining step determines that the encryption key of the existing encryption keypair is invalid, the device automatically performing the steps of;
deleting each key of the existing encryption keypair from the device;
generating a new encryption keypair within the device and storing the new encryption keypair in the device; and
providing a new encryption key corresponding to the requested encryption key of the new encryption keypair to another device. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 78)
-
-
54. A method of printing a secure print job, comprising the steps of:
-
a host apparatus submitting a request to a network device for the network device to provide the host apparatus with an existing encryption key of a printer;
the network device, in response to receiving the request, determining whether the requested encryption key of the existing encryption keypair of the printer is valid;
in a case where the requested existing encryption key is determined to be invalid, the network device automatically performing the steps of;
deleting the existing encryption keypair from the network device;
generating a new encryption keypair within the network device;
storing the new encryption keypair in the network device; and
transmitting a new encryption key corresponding to the requested encryption key of the new encryption keypair to the host apparatus;
the host apparatus receiving the new encryption key from the network device, and in response thereto, performing an operation to validate the new encryption key;
the host apparatus generating an encrypted print job utilizing the new encryption key and transmitting the encrypted print job to the network device; and
the network device utilizing a corresponding encryption key of the new encryption keypair to decrypt the encrypted print job, and processing the decrypted print job for printout by the printer. - View Dependent Claims (55, 56, 57, 58, 59, 60)
-
-
61. Computer-executable process steps for printing a secure print job, comprising the steps of:
-
a host apparatus submitting a request to a network device for the network device to provide the host apparatus with an existing encryption key of a printer;
the network device, in response to receiving the request, determining whether the requested encryption key of the existing encryption keypair of the printer is valid;
in a case where the requested existing encryption key is determined to be invalid, the network device automatically performing the steps of;
deleting the existing encryption keypair from the network device;
generating a new encryption keypair within the network device;
storing the new encryption keypair in the network device; and
transmitting a new encryption key corresponding to the requested encryption key of the new encryption keypair to the host apparatus;
the host apparatus receiving the new encryption key from the network device, and in response thereto, performing an operation to validate the new encryption key;
the host apparatus generating an encrypted print job utilizing the new encryption key and transmitting the encrypted print job to the network device; and
the network device utilizing a corresponding encryption key of the new encryption keypair to decrypt the encrypted print job, and processing the decrypted print job for printout by the printer. - View Dependent Claims (62, 63, 64, 65, 66, 67)
-
-
68. A computer-readable medium which stores computer-executable process steps for printing a secure print job, the computer-executable process steps comprising the steps of:
-
a host apparatus submitting a request to a network device for the network device to provide the host apparatus with an existing encryption key of a printer;
the network device, in response to receiving the request, determining whether the requested encryption key of the existing encryption keypair of the printer is valid;
in a case where the requested existing encryption key is determined to be invalid, the network device automatically performing the steps of;
deleting the existing encryption keypair from the network device;
generating a new encryption keypair within the network device;
storing the new encryption keypair in the network device; and
transmitting a new encryption key corresponding to the requested encryption key of the new encryption keypair to the host apparatus;
the host apparatus receiving the new encryption key from the network device, and in response thereto, performing an operation to validate the new encryption key;
the host apparatus generating an encrypted print job utilizing the new encryption key and transmitting the encrypted print job to the network device; and
the network device utilizing a corresponding encryption key of the new encryption keypair to decrypt the encrypted print job, and processing the decrypted print job for printout by the printer. - View Dependent Claims (69, 70, 71, 72, 73, 74)
-
Specification