Cryptographic key split binder for use with tagged data elements
First Claim
1. A cryptographic key split combiner that creates a cryptographic key to secure one or more respectively tagged data elements, comprising:
- a plurality of key split generators for generating cryptographic key splits based on seed data; and
a key split binder for binding the cryptographic key splits together to produce the cryptographic key;
wherein at least one of the cryptographic key splits is based on at least one of the one or more respective tags.
1 Assignment
0 Petitions
Accused Products
Abstract
A cryptographic key split binder includes key split generators that generate cryptographic key splits from seed data and a key split randomizer for randomizing cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Key split generators can include a random split generator for generating a random key split based on reference data, a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data or a biometric split generator for generating a biometric key split based on biometric data. Any key split can further be based on static data, which can be updated. Label data can be read from a storage medium, and can include user authorization data. A cryptographic key can be, for example, a stream of symbols, at least one symbol block, or a key matrix.
-
Citations
21 Claims
-
1. A cryptographic key split combiner that creates a cryptographic key to secure one or more respectively tagged data elements, comprising:
-
a plurality of key split generators for generating cryptographic key splits based on seed data; and
a key split binder for binding the cryptographic key splits together to produce the cryptographic key;
wherein at least one of the cryptographic key splits is based on at least one of the one or more respective tags. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A process of creating a cryptographic key to secure one or more respectively tagged data elements, comprising:
-
generating a plurality of cryptographic key splits from seed data; and
binding the cryptographic key splits together to produce the cryptographic key;
wherein at least one of the cryptographic key splits is based on at least one of the one or more respective tags.
-
-
11. A process of cryptographically securing one or more respectively tagged data elements, comprising:
-
generating a plurality of cryptographic key splits from seed data;
binding the cryptographic key splits together to produce a cryptographic key; and
encrypting the one or more respectively tagged data elements with the cryptographic key;
wherein at least one of the cryptographic key splits is based on at least one of the one or more respective tags.
-
-
12. A process of transporting keying data corresponding to a cryptographic key used to decipher one or more respectively tagged, cryptographically secured, data elements, comprising:
-
selecting the keying data corresponding to the cryptographic key; and
sending the selected keying data to an intended recipient. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of providing multi-level cryptographic security of respectively tagged data elements, comprising:
-
accessing a constructive key manager;
selecting at least one respectively tagged data element from a data instance;
for each selected data element, generating a cryptographic key based on the respective tag of the selected data element, encrypting the selected data element based on the cryptographic key, labeling the encrypted data element with the respective tag, and storing the respectively tagged encrypted data element;
reading the respective tag of the at least one encrypted data element;
determining access authorization based on the respective tag; and
decrypting the data element if access authorization is granted. - View Dependent Claims (21)
-
Specification