Storing of data in a device
First Claim
1. A method for storing data in the memory of an electronic device comprising encrypting the data to be stored with an encryption key (Ks);
- providing the electronic device with an identification card equipped with a cryptographic algorithm;
generating at least one seed value in the electronic device;
transmitting said at least one seed value to the identification card;
performing said cryptographic algorithm in the identification card with said seed value as an input;
forming at least one derived value in the cryptographic algorithm;
transmitting said at least one derived value to the electronic device; and
using said at least one derived value for producing said encryption key in said electronic device.
10 Assignments
0 Petitions
Accused Products
Abstract
Method for storing data in the memory (1.2) of an electronic device (1), wherein the data to be stored is encrypted with an encryption key (Ks). The electronic device (1) is provided with an identification card (2) equipped with a cryptographic algorithm and an individual identifier (ID). In the electronic device (1), at least one seed value (RAND1, RAND2, RAND3) is generated, and the at least one seed value is transmitted to the identification card (2). The cryptographic algorithm is performed on the identification card (2), with the seed value (RAND1, RAND2, RAND3) being used as the input, wherein at least one derived value (Kc1, Kc2, Kc3) is produced in the algorithm. The at least one derived value (Kc1, Kc2, Kc3) is transmitted to the electronic device (1), wherein the at least one derived value (Kc1, Kc2, Kc3) is used in the formation of the encryption key (Ks). The invention also relates to an electronic device (1), module, and computer software product.
21 Citations
21 Claims
-
1. A method for storing data in the memory of an electronic device comprising encrypting the data to be stored with an encryption key (Ks);
-
providing the electronic device with an identification card equipped with a cryptographic algorithm;
generating at least one seed value in the electronic device;
transmitting said at least one seed value to the identification card;
performing said cryptographic algorithm in the identification card with said seed value as an input;
forming at least one derived value in the cryptographic algorithm;
transmitting said at least one derived value to the electronic device; and
using said at least one derived value for producing said encryption key in said electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
- 10. An electronic device comprising a memory and an identification card connection and provided with an identification card equipped with a cryptographic algorithm, wherein the electronic device comprises means for generating at least one seed value, means for transmitting said at least one seed value to the identification card equipped with means for performing said cryptographic algorithm, said seed value arranged to being used as an input, wherein in the cryptographic algorithm, at least one derived value is arranged to be formed, and the electronic device comprises means for receiving said at least one derived value and means for using said at least one derived value in the formation of said encryption key.
-
18. A module to be used in connection with an electronic device, which electronic device comprises a memory and an identification card connection and is provided with an identification card equipped with a cryptographic algorithm, wherein the module comprises means for generating at least one seed value, means for transmitting said at least one seed value to the identification card equipped with means for performing said cryptographic algorithm, said seed value arranged to being used as the input, wherein in the cryptographic algorithm, at least one derived value is arranged to be formed, and the module comprises means for receiving said at least one derived value and means for using said at least one derived value in the formation of said encryption key.
-
19. A computer software product which comprises machine-executable program commands stored on a readable medium for execution by a processor, the machine-executable program commands:
-
for storing data in the memory of an electronic device, and for encrypting the data to be stored with an encryption key, and which electronic device is provided with an identification card equipped with a cryptographic algorithm, wherein the computer software product comprises machine executable program commands;
for generating at least one seed value, for searching the data of the data group for information about said at least one seed value used at the encryption stage, for transmitting said at least one seed value to the identification card in which said cryptographic algorithm is arranged to be used, said seed value being arranged to be used as the input, wherein at least one derived value is arranged to be formed in the algorithm, wherein the computer software product comprises machine-executable program commands;
for receiving said at least one derived value from the identification card, and for using said at least one derived value in the formation of said decryption key. - View Dependent Claims (20, 21)
-
Specification