System and Method for a Variable Key Ladder
First Claim
Patent Images
1. A method, comprising:
- receiving, by a receiver, a data message;
storing configuration data in a memory;
selecting between a first device key and a second device key depending upon the configuration data; and
decrypting, by a decryption apparatus, at least a portion of the data message using a key ladder that includes the selected first or second device key.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus is described that may receive a data message and storing configuration data. The method and apparatus may also select between a first device key and a second device key depending upon the configuration data and decrypt at least a portion of the data message using a key ladder that includes the selected first or second device key.
61 Citations
20 Claims
-
1. A method, comprising:
-
receiving, by a receiver, a data message; storing configuration data in a memory; selecting between a first device key and a second device key depending upon the configuration data; and decrypting, by a decryption apparatus, at least a portion of the data message using a key ladder that includes the selected first or second device key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A decryption apparatus, comprising:
-
a memory configured to store configuration data and a first device key; a receiver configured to receive a data message from a network; a key decryption operator configured to generate a second device key based on a data message; a switch configured to select between the first device key and the second device key depending upon the configuration data; and a decryption engine configured to decrypt at least a portion of the data message using a key ladder that includes the selected first or second device key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method, comprising:
-
storing, in a memory, a first key and a second key; selecting between the first key and a third key depending upon configuration data; determining a key ladder tier of the second key based on the configuration data; and decrypting at least a portion of a data message using a key ladder that includes the selected one of the first and third keys as a device key and that includes the second key at the determined key ladder tier. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification