×

Data cryptography operations using control vectors

  • US 4,918,728 A
  • Filed: 08/30/1989
  • Issued: 04/17/1990
  • Est. Priority Date: 08/30/1989
  • Status: Expired due to Fees
First Claim
Patent Images

1. In a data processing system which processes cryptographic service requests for performing data cryptography functions on data using cryptographic keys which are associated with control vectors defining the functions which each key is allowed by its originator to perform, an apparatus for validating that the data cryptography functions requested for a cryptographic key have been authorized by the originator of the key, comprising:

  • a cryptographic facility characterized by a secure boundary through which passes an input path for receiving said cryptographic service requests, data, cryptographic keys and their associated control vectors, and an output path for providing responses thereto, there being included within said boundary a cryptographic control means coupled to said input path, a control vector checking means and a cryptographic processing means coupled to said control means, and a master key storage coupled to said processing means, for providing a secure location for executing data cryptography functions in response to said received service requests;

    said cryptographic control means receiving over said input path a cryptographic service request for performing a data cryptography function with a cryptographic key;

    said control vector checking means having an input coupled to said input path for receiving a control vector associated with said cryptographic key and an input coupled to said cryptographic control means, for receiving control signals to initiate checking that said control vector authorizes the data cryptographic function which is requested by said cryptographic service request;

    said control vector checking means having an authorization output coupled to an input of said cryptographic processing means, for signalling that said data cryptography function is authorized, the receipt of which by said cryptographic processing means initiates the performance of the requested data cryptography function with said cryptographic key.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×