×

Cryptographic key management apparatus and methods

  • US 5,555,309 A
  • Filed: 10/17/1994
  • Issued: 09/10/1996
  • Est. Priority Date: 06/22/1992
  • Status: Expired due to Term
First Claim
Patent Images

1. Cryptographic key management apparatus for a communication domain enabling secure communication among a plurality of domain members comprising:

  • a plurality of Keys for use in said apparatus comprising Master Keys and Working Keys;

    said Master Keys comprising a Domain Master Key shared by all domain members and a Member Master Key unique to each said domain member;

    said Working Keys comprising Domain Vector Keys and Member Vector Keys;

    said Domain Vector Keys being public keys for use by said domain members and having control information therein defining said Domain Vector Keys for encryption and verification;

    each said Member Vector Key being a private key for use by an associated domain member and having control information therein defining said Member Vector Key for decryption and message sealing;

    each said Member Vector Key having a cryptographic key value encrypted therein using the associated Member Master Key;

    said Domain Master Key being a public key shared by all domain members and used for protecting said Domain Vector Keys;

    each said Domain Vector Key having a cryptographic key value encrypted therein using the Domain Master Key;

    each said Member Master Key being a private key for use by an associated domain member;

    each said Member Vector Key having a cryptographic key value encrypted therein using the associated Member Master Key;

    a directory accessible by all domain members, with at least one Domain Vector Key and one Member Vector Key being provided for each said domain member to provide a Pair of Vector Keys, with each said Pair of Vector Keys having the same said cryptographic key value therein;

    each said domain member including;

    a vector key processor and a cryptographic processor;

    said vector key processor receiving said Working Keys for controlling said data encryption and data decryption; and

    said cryptographic processor performing said encryption and decryption.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×