METHOD AND APPARATUS FOR GENERATING AND UPDATING SECURITY CODES
First Claim
1. A system for creating a target cryptographic key comprising:
- a first cryptographic module comprising;
a first cryptographic key; and
a loader comprisinga second cryptographic key; and
a communications port for the first cryptographic module,wherein when the first cryptographic module is connected with the communications port of the loader, the first cryptographic module loads the second cryptographic key and creates the target cryptographic key in response to the first cryptographic key and the second cryptographic key.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for creating a target cryptographic key. In one embodiment the system includes a first cryptographic module including a first cryptographic key, and a loader including a second cryptographic key, a communications port for the first cryptographic module; and a communication link for transmitting the target cryptographic key. When the first cryptographic module is connected with the communications port of the loader, the first cryptographic module loads the second cryptographic key and creates the target cryptographic key in response to the first cryptographic key and the second cryptographic key. In one embodiment the method of creating a cryptographic key, includes the steps of: loading a second cryptographic key into a first cryptographic module; calculating, by the first cryptographic module, a target cryptographic key in response to a first cryptographic key and a second cryptographic key; and loading the target cryptographic key to a loader.
-
Citations
30 Claims
-
1. A system for creating a target cryptographic key comprising:
-
a first cryptographic module comprising; a first cryptographic key; and a loader comprising a second cryptographic key; and a communications port for the first cryptographic module, wherein when the first cryptographic module is connected with the communications port of the loader, the first cryptographic module loads the second cryptographic key and creates the target cryptographic key in response to the first cryptographic key and the second cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of updating a cryptographic key in a system having a smart card comprising a first cryptographic key and a loader having a second cryptographic key, the method comprising the steps of:
-
loading the second cryptographic key into the first cryptographic module from the loader; creating, by the first cryptographic module, a target cryptographic key in response to the first cryptographic key and the second cryptographic key; and loading the target cryptographic key to the loader. - View Dependent Claims (9, 10, 11)
-
-
12. A system for creating an updated cryptographic key comprising:
-
a first cryptographic module; and a loader comprising; an internal cryptographic module, the internal cryptographic module comprising an internal cryptographic module memory comprising a first cryptographic key; and a communications port for the first cryptographic module, wherein the first cryptographic module comprises a second cryptographic key and when the first cryptographic module is connected with the first cryptographic module communications port of the loader, the first cryptographic module transmits the second cryptographic key to the loader and the loader creates a target cryptographic key in response to the first cryptographic key and the second cryptographic key. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A method of creating a cryptographic key in a system comprising a loader comprising an internal cryptographic module having a first cryptographic key, and a first cryptographic module having a second cryptographic key, the method comprising the steps of:
-
loading the second cryptographic key from the first cryptographic module to the loader; and creating, by the loader, a target cryptographic key in response to the first cryptographic key and the second cryptographic key. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A system for creating a target cryptographic key comprising:
-
a first cryptographic module comprising; a first cryptographic key and a second cryptographic key; and a key recipient comprising a communications port for the first cryptographic module, wherein when the first cryptographic module is connected with the communications port of the key recipient, the first cryptographic module creates the target cryptographic key in response to the first cryptographic key and the second cryptographic key and loads it into the key recipient. - View Dependent Claims (25, 26, 27)
-
-
28. A method of target cryptographic key in a system having a first cryptographic module comprising a first cryptographic key and second cryptographic key, and a key recipient, the method comprising the steps of:
-
creating, by the first cryptographic module, a target cryptographic key in response to the first cryptographic key and the second cryptographic key; and loading the target cryptographic key to the key recipient. - View Dependent Claims (29, 30)
-
Specification