METHOD FOR SECURE STORAGE OF PLURAL KEYS IN DEVICE
First Claim
1. A method for securely storing a plurality of keys in a device, the method comprising:
- assigning the device with a random number, the random number being substantially unique to the device;
generating an encryption key for encrypting each of the plurality of keys, the encryption key being generated by applying a one way function to the random number;
encrypting one of the plurality of keys using the generated encryption key;
securing the encrypted key by applying an XOR function to the encrypted key using the generated encryption key;
storing the secured encrypted key in the device; and
repeating the generating, encrypting, and securing steps for each of the remaining plurality of keys.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for securely storing a plurality of keys in a device. The method comprises assigning the device with a random number, the random number being substantially unique to the device; generating an encryption key for encrypting each of the plurality of keys, the encryption key being generated by applying a one way function to the random number; encrypting one of the plurality of keys using the generated encryption key; securing the encrypted key by applying an XOR function to the encrypted key using the generated encryption key; storing the secured encrypted key in the device; and repeating the generating, encrypting, and securing steps for each of the remaining plurality of keys.
27 Citations
5 Claims
-
1. A method for securely storing a plurality of keys in a device, the method comprising:
-
assigning the device with a random number, the random number being substantially unique to the device; generating an encryption key for encrypting each of the plurality of keys, the encryption key being generated by applying a one way function to the random number; encrypting one of the plurality of keys using the generated encryption key; securing the encrypted key by applying an XOR function to the encrypted key using the generated encryption key; storing the secured encrypted key in the device; and repeating the generating, encrypting, and securing steps for each of the remaining plurality of keys. - View Dependent Claims (2, 3, 4, 5)
-
Specification