METHOD AND SYSTEM FOR SECURELY STORING AND USING PRIVATE CRYPTOGRAPHIC KEYS
First Claim
1. A computer-implemented method for securely storing and using private cryptographic keys utilizing a cryptographic system comprising an online computer, an offline computer, a first communication device, a second communication device, an inner Faraday cage housing the offline computer and the second communication device, and an outer Faraday cage housing the online computer, the first communication device, and the inner Faraday cage, the method comprising the steps of:
- (a) transmitting a cryptographic operation request requiring a private key in an electrical signal from the online computer to the first communication device;
(b) converting, by the first communication device, the electrical signal received from the online computer into an optical signal, and transmitting the optical signal from the first communication device outside the inner Faraday cage to the second communication device inside the inner Faraday cage;
(c) converting, by the second communication device, the optical signal received from the first communication device into an electrical signal, and transmitting the electrical signal to the offline computer;
(d) performing, by the offline computer, the cryptographic operation request, and transmitting a result of the cryptographic operation request to the second communication device in an electrical signal;
(e) converting, by the second communication device, the electrical signal received from the offline computer into an optical signal, and transmitting the optical signal to the first communication device; and
(f) converting, by the first communication device, the optical signal received from the second communication device into an electrical signal, and transmitting the electrical signal to the online computer; and
(g) processing, by the online computer, the electrical signal received from the first communication device.
1 Assignment
0 Petitions
Accused Products
Abstract
A cryptographic system includes an online computer, an offline computer and custom hardware and software by which the two computers can securely communicate to facilitate the creation, secure use, and maintenance of private cryptographic keys. The system securely stores private cryptographic keys while still enabling the keys to be quickly and easily accessed as needed in a variety of applications including, but not limited to, electronic financial transactions, cryptographic transaction processing, medical record access, email encryption, or any other cryptographic authentication process.
11 Citations
17 Claims
-
1. A computer-implemented method for securely storing and using private cryptographic keys utilizing a cryptographic system comprising an online computer, an offline computer, a first communication device, a second communication device, an inner Faraday cage housing the offline computer and the second communication device, and an outer Faraday cage housing the online computer, the first communication device, and the inner Faraday cage, the method comprising the steps of:
-
(a) transmitting a cryptographic operation request requiring a private key in an electrical signal from the online computer to the first communication device; (b) converting, by the first communication device, the electrical signal received from the online computer into an optical signal, and transmitting the optical signal from the first communication device outside the inner Faraday cage to the second communication device inside the inner Faraday cage; (c) converting, by the second communication device, the optical signal received from the first communication device into an electrical signal, and transmitting the electrical signal to the offline computer; (d) performing, by the offline computer, the cryptographic operation request, and transmitting a result of the cryptographic operation request to the second communication device in an electrical signal; (e) converting, by the second communication device, the electrical signal received from the offline computer into an optical signal, and transmitting the optical signal to the first communication device; and (f) converting, by the first communication device, the optical signal received from the second communication device into an electrical signal, and transmitting the electrical signal to the online computer; and (g) processing, by the online computer, the electrical signal received from the first communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A cryptographic system for securely storing and using private cryptographic keys, comprising:
-
an online computer for receiving or originating a cryptographic operation request requiring a private key; a first communication device connected to the online computer for transmission of electrical signals therebetween; a second communication device connected to the first communication device for transmission of optical signals therebetween; an offline computer for performing the cryptographic operation to generate a result, said offline computer connected to the second communication device for transmission of electrical signals therebetween; an inner Faraday cage housing the offline computer and the second communication device; and an outer Faraday cage housing the online computer, the first communication device, and the inner Faraday cage in a nested arrangement; wherein the online computer transmits the cryptographic operation request to the offline computer and the offline computer transmits the result of the cryptographic operation to the online computer only across the first communication device and the second communication device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification