SYSTEM AND METHOD FOR SECURING DATA
First Claim
1. A method for securing data, comprising:
- generating a first public encryption key by a cryptographic processor associated with a first computer subsystem;
sending the first public encryption key to a second computer subsystem;
receiving first encrypted data at the first computer subsystem, the first encrypted data having been encrypted by the second computer subsystem using the first public encryption key;
generating a first private encryption key by the cryptographic processor;
decrypting the first encrypted data using the first private encryption key generated by the cryptographic processor to obtain first decrypted data; and
storing the first decrypted data in a memory associated with the cryptographic processor.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided for securing data. The method includes generating a first public encryption key by a cryptographic processor associated with a first computer subsystem; sending the first public encryption key to a second computer subsystem; and receiving first encrypted data at the first computer subsystem, the first encrypted data having been encrypted by the second computer subsystem using the first public encryption key. The method further includes generating a first private encryption key by the cryptographic processor; decrypting the first encrypted data using the first private encryption key generated by the cryptographic processor to obtain a first decrypted data; and storing the first decrypted data in a memory associated with the cryptographic processor.
-
Citations
47 Claims
-
1. A method for securing data, comprising:
-
generating a first public encryption key by a cryptographic processor associated with a first computer subsystem; sending the first public encryption key to a second computer subsystem; receiving first encrypted data at the first computer subsystem, the first encrypted data having been encrypted by the second computer subsystem using the first public encryption key; generating a first private encryption key by the cryptographic processor; decrypting the first encrypted data using the first private encryption key generated by the cryptographic processor to obtain first decrypted data; and storing the first decrypted data in a memory associated with the cryptographic processor. - View Dependent Claims (2, 3, 4, 5)
-
-
6-23. -23. (canceled)
-
24. A computer system for securing data, comprising:
-
a cryptographic processor configured to generate a first public encryption key and a first private encryption key; and a first computer subsystem in communication with the cryptographic processor, the computer subsystem being configured to; receive first encrypted data having been encrypted using the first public encryption key generated by the cryptographic processor; and transmit the first encrypted data to the cryptographic processor, wherein the cryptographic processor is configured to decrypt the first encrypted data using the first private encryption key to obtain a first decrypted data. - View Dependent Claims (25, 26, 27, 28, 29, 33, 34, 41, 42, 43, 44, 45, 46, 47)
-
-
30-32. -32. (canceled)
-
35-40. -40. (canceled)
Specification