KEY PROVISIONING
First Claim
Patent Images
1. A device comprising executable instructions that when executed cause the device to perform operations comprising:
- receiving, by a device, a first data item;
storing, by the device, the first data item in nonvolatile memory;
receiving, by the device, a second data item, the second data item generated by performing a splitting operation on a cryptographic key using the first data item;
generating, by the device, the cryptographic key by performing a combining operation on the first data item and the second data item;
storing, by the device, the cryptographic key in volatile memory; and
performing one or more of encryption or decryption of data, by the device, using the cryptographic key.
1 Assignment
0 Petitions
Accused Products
Abstract
A device receives a first data item. The device stores the first data item in non-volatile memory. The device subsequently receives a second data item, where the second data item was previously generated from the first data item and a cryptographic key. The device performs a function such as, for example, an exclusive-or operation on the first data item and the second data item to generate the cryptographic key. The device uses the generated cryptographic key to encrypt data which may be transmitted over a wireless interface.
-
Citations
20 Claims
-
1. A device comprising executable instructions that when executed cause the device to perform operations comprising:
-
receiving, by a device, a first data item; storing, by the device, the first data item in nonvolatile memory; receiving, by the device, a second data item, the second data item generated by performing a splitting operation on a cryptographic key using the first data item; generating, by the device, the cryptographic key by performing a combining operation on the first data item and the second data item; storing, by the device, the cryptographic key in volatile memory; and performing one or more of encryption or decryption of data, by the device, using the cryptographic key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 20)
-
-
11. A device comprising executable instruction that when executed cause the device to perform operations comprising:
-
receiving, by the device, a first data item; receiving, by the device, a second data item; generating, by the device, a cryptographic key from the first data item and the second data item, the cryptographic key being generated by the device without being received by the device over an interface. - View Dependent Claims (12)
-
-
13. A system comprising executable instructions that when executed cause the system to perform operations comprising:
-
determining, by a system, a first data item associated with a device; determining, by the system, a cryptographic key; generating, by the system, a second data item by performing a splitting operation on the cryptographic key using the first data item; and transmitting, by the system, the second data item to the device. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method, comprising:
-
determining, by a system, a first data item associated with a device; determining, by the system, a cryptographic key; generating, by the system, a second data item by performing an exclusive or operation on the first data item and the cryptographic key; and transmitting, by the system, the second data item to the first device.
-
Specification