×

Controlled use of cryptographic keys via generating station established control values

  • US 4,850,017 A
  • Filed: 05/29/1987
  • Issued: 07/18/1989
  • Est. Priority Date: 05/29/1987
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for controlling the use of a cryptographic key at a using station by a generating station in a network of generating and using stations by transmitting said cryptographic key with a control value specifying the use of said cryptographic key from the generating station which generates the cryptographic key to at least two designated using stations one of which may be the generating station, each of said generating and using stations having a cryptographic facility which securely stores a master key, said method comprising the steps of:

  • storing in a data base at a generating station a plurality of encrypted secret transport keys unique to each of said using stations and indexed by identifications of said using stations, said encrypted secret transport keys being encrypted under a variant of said master key;

    generating a command for the generation and distribution of a cryptographic key with a controlled use to at least two designated using stations in said network; and

    in response to said command, generating a random key in said cryptographic facility of the generating station as said cryptographic key;

    accessing the encrypted secret transport keys for the designated using stations using the identification for the using stations;

    decrypting in said cryptographic facility of the generating station the accessed secret transport keys for the designated using stations using said variant of said master key;

    combining in said cryptographic facility of the generating station the decrypted secret transport keys with the generated cryptographic key to produce a combined function f1 for each designated using station;

    reading a control value for said cryptographic key for each said designated using station;

    combining in said cryptographic facility of the generating station the generated cryptographic key with said control value for each said designated using station to produce a combined function f2 ;

    transmitting said combined functions f1 and f2 for each said designated using station to the corresponding designated using stations;

    storing said encrypted secret transport key at a designated using station indexed by the identification of said using station;

    requesting a cryptographic operation requiring the use of the cryptographic key generated by said generating station in combination with a control value;

    accessing said encrypted secret transport key and temporarily storing in the cryptographic facility of said designated using station said encrypted secret transport key together with said control value and said combined functions f1 and f2 transmitted from said generating station; and

    determining if said requested cryptographic operation at said designated using station is permitted.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×