METHOD FOR FULFILLING A CRYPTOGRAPHIC REQUEST REQUIRING A VALUE OF A PRIVATE KEY
First Claim
Patent Images
1. Method for fulfilling a cryptographic request requiring a value of a private key, comprising:
- providing code portions to a computing unit running a web browser, the code portions being directly executable in the web browser to cause it to perform a cryptographic process including the steps of;
receiving a cryptographic request requiring a value of a private key;
requesting an encrypted value of the private key;
receiving the encrypted value of the private key;
requesting an unlocking entity;
receiving the unlocking entity;
decrypting the encrypted value of the private key with the unlocking entity to obtain the value of the private key; and
fulfilling the cryptographic request using the obtained value of the private key.
1 Assignment
0 Petitions
Accused Products
Abstract
Method for fulfilling a cryptographic request requiring a value of a private key. Code portions are sent from a server to a computing unit running a web browser. The code portions are executed directly in the web browser in such a way that it automatically performs a cryptographic process including the steps of:
- receiving a cryptographic request requiring a value of a private key;
- requesting an encrypted value of the private key;
- receiving the encrypted value of the private key;
- requesting an unlocking entity;
- receiving the unlocking entity;
- decrypting the encrypted value of the private key with the unlocking entity to obtain the value of the private key; and
- fulfilling the cryptographic request using the obtained value of the private key.
139 Citations
16 Claims
-
1. Method for fulfilling a cryptographic request requiring a value of a private key, comprising:
-
providing code portions to a computing unit running a web browser, the code portions being directly executable in the web browser to cause it to perform a cryptographic process including the steps of; receiving a cryptographic request requiring a value of a private key; requesting an encrypted value of the private key; receiving the encrypted value of the private key; requesting an unlocking entity; receiving the unlocking entity; decrypting the encrypted value of the private key with the unlocking entity to obtain the value of the private key; and fulfilling the cryptographic request using the obtained value of the private key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 16)
-
-
10. System for fulfilling a cryptographic request requiring a value of a private key, the system comprising:
-
at least one storage medium containing codes portions that can be downloaded to a computing unit able to run a web browser, the code portions being directly executable in the web browser and comprising; first software code portions configured for receiving a cryptographic request requiring a value of a private key; second software code portions configured for requesting an encrypted value of the private key; third software code portions configured for receiving the encrypted value of the private key; fourth software code portions configured for requesting an unlocking entity; fifth software code portions configured for receiving the unlocking entity; sixth software code portions configured for decrypting the encrypted value of the private key with the unlocking entity to obtain the value of the private key; and seventh software code portions configured for fulfilling the cryptographic request using the obtained value of the private key. - View Dependent Claims (11)
-
-
12. A computer program product for fulfilling a cryptographic request requiring a value of a private key, the computer program product comprising:
-
a computer readable storage medium having a set of code portions the codes portions embodied therewith comprising instructions being directly executable in a web browser by a processor and the set of code portions comprising; first software code portions comprising instructions for execution by a processor that cause the processor to receive a cryptographic request requiring a value of a private key; second software code portions comprising instructions for execution by a processor that cause the processor to request an encrypted value of the private key; third software code portions comprising instructions for execution by a processor that cause the processor to receive the encrypted value of the private key; fourth software code portions comprising instructions for execution by a processor that cause the processor to request an unlocking entity; fifth software code portions comprising instructions for execution by a processor that cause the processor to receive the unlocking entity; sixth software code portions comprising instructions for execution by a processor that cause the processor to decrypt the encrypted value of the private key with the unlocking entity to obtain the value of the private key; and seventh software code portions comprising instructions for execution by a processor that cause the processor to fulfill the cryptographic request using the obtained value of the private key. - View Dependent Claims (13, 14, 15)
-
Specification