Cipher method and system for verifying a decryption of an encrypted user data key
First Claim
1. A signal bearing medium tangibly embodying a program of machine-readable instructions executable by a processor to perform operations for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key, the operations comprising:
- decrypting the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key;
decrypting a verification text with the user data key as decrypted with the decryption key;
validating a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched comparison of the verification text as decrypted with the user data key and an intermixing of a known text and a random text; and
invalidating the use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a mismatched comparison of the verification text as decrypted with the user data key and the intermixing of the known text and the random text.
1 Assignment
0 Petitions
Accused Products
Abstract
A cipher method for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key. The cipher method involves a decryption of the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key, a decryption of the verification text with the user data key as decrypted with the decryption key, and a validation/invalidation of a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched/unmatched comparison of the verification text as decrypted with the user data key and an intermixing of a known text and a random text.
64 Citations
21 Claims
-
1. A signal bearing medium tangibly embodying a program of machine-readable instructions executable by a processor to perform operations for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key, the operations comprising:
-
decrypting the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key;
decrypting a verification text with the user data key as decrypted with the decryption key;
validating a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched comparison of the verification text as decrypted with the user data key and an intermixing of a known text and a random text; and
invalidating the use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a mismatched comparison of the verification text as decrypted with the user data key and the intermixing of the known text and the random text. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A cipher system, comprising:
-
a processor; and
a memory storing instructions operable with the processor for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key, the instructions being executed for;
decrypting the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key;
decrypting a verification text with the user data key as decrypted with the decryption key;
validating a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched comparison of the verification text as decrypted with the user data key and an intermixing of a known text and a random text; and
invalidating the use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a mismatched comparison of the verification text as decrypted with the user data key and the intermixing of the known text and the random text. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A cipher method for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key, the cipher method comprising:
-
decrypting the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key;
decrypting a verification text with the user data key as decrypted with the decryption key;
validating a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched comparison of the verification text as decrypted with the user data key and an intermixing of a known text and a random text; and
invalidating the use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a mismatched comparison of the verification text as decrypted with the user data key and the intermixing of the known text and the random text. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification