Method and system for generation and management of secret key of public key cryptosystem
First Claim
1. A method for generating and managing a secret key of a public key cryptosystem, comprising the steps of:
- (a) generating a secret key inside a tamper resistant device; and
(b) storing the secret key generated at the step (a) into a storage region in a personal portable device from which the secret key cannot be read outside of the personal portable device, while the personal portable device is inside the tamper resistant device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and a system for generating and managing a secret key of a public key cryptosystem, in which the secret key is generated inside a tamper resistant device, and stored into a storage region in a personal portable device from which the secret key cannot be read out of the personal portable device, while the personal portable device is inside the tamper resistant device. Here, the secret key can be reproduced by collecting the partial secret keys from those arbitrators who judge that the secret key reproduction is appropriate. Also, the secret key is generated inside a tamper resistant personal portable device, and stored into a storage region in the tamper resistant personal portable device from which the secret key cannot be read out of the tamper resistant personal portable device. Here, the secret key can be reproduced by using the partial secret keys for constituting the secret key from all entities sharing interests with a user of the tamper resistant personal portable device.
-
Citations
79 Claims
-
1. A method for generating and managing a secret key of a public key cryptosystem, comprising the steps of:
-
(a) generating a secret key inside a tamper resistant device; and (b) storing the secret key generated at the step (a) into a storage region in a personal portable device from which the secret key cannot be read outside of the personal portable device, while the personal portable device is inside the tamper resistant device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A tamper resistant system for generating and managing a secret key of a public key cryptosystem, comprising:
-
first means for generating the secret key inside the tamper resistant system; and second means for storing the secret key generated by the first means into a storage region in a personal portable device from which the secret key cannot be read outside of the personal portable device, while the personal portable device is inside the tamper resistant system. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for generating and managing a secret key of a public key cryptosystem, comprising the steps of:
-
(a) generating a public key and a secret key inside a first tamper resistant device; (b) storing the secret key generated at the step (a) into a first storage region in a personal portable device from which the secret key cannot be read outside of the personal portable device, while the personal portable device is inside the first tamper resistant device; (c) producing a certification inside a second tamper resistant device from a user'"'"'s personal data and the public key generated at the step (a); and (d) storing the certification produced at the step (c) into a second storage region in the personal portable device from which the certification can be read outside of the personal portable device, while the personal portable device is inside the first tamper resistant device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system for generating and managing a secret key of a public key cryptosystem, comprising:
-
a first tamper resistant device having; first means for generating a public key and the secret key inside the first tamper resistant device; second means for storing the secret key generated by the first means into a first storage region in a personal portable device from which the secret key cannot be read outside of the personal portable device, while the personal portable device is inside the first tamper resistant device; and third means for storing the certification into a second storage region in the personal portable device from which the certification can be read outside of the personal portable device, while the personal portable device is inside the first tamper resistant device; and a second tamper resistant device having; fourth means for producing the certification inside the second tamper resistant device from a user'"'"'s personal data and the public key generated by the first means, such that the third means stores the certification produced by the fourth means. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. A method for reproducing a secret key of a public key cryptosystem, comprising the steps of:
-
(a) designating a plurality of arbitrators for separately judging an appropriateness of a secret key reproduction; (b) distributing partial secret keys dividing an information necessary in reproducing the secret key among the arbitrators; (c) collecting the partial secret keys from those arbitrators who judge that the secret key reproduction is appropriate when the secret key reproduction is requested; and (d) reproducing the secret key from the partial secret keys collected at the step (c) when the partial secret keys collected at the step (c) satisfy a prescribed secret key reproduction necessary condition. - View Dependent Claims (36, 37, 38, 39, 40, 41)
-
-
42. A system for reproducing a secret key of a public key cryptosystem, comprising:
-
distributing means for distributing partial secret keys which divide an information necessary in reproducing the secret key among a plurality of arbitrators for separately judging an appropriateness of a secret key reproduction; collecting means for collecting the partial secret keys from those arbitrators who judge that the secret key reproduction is appropriate when the secret key reproduction is requested; and reproducing means for reproducing the secret key from the partial secret keys collected by the collecting means when the partial secret keys collected by the collecting means satisfy a prescribed secret key reproduction necessary condition. - View Dependent Claims (43, 44, 45, 46, 47, 48)
-
-
49. A method for generating and managing a secret key of a public key cryptosystem, comprising the steps of:
-
(a) generating a secret key inside a tamper resistant personal portable device; and (b) storing the secret key generated at the step (a) into a storage region in the tamper resistant personal portable device from which the secret key cannot be read outside of the tamper resistant personal portable device. - View Dependent Claims (50, 51, 52, 53)
-
-
54. A tamper resistant personal portable device for generating and managing a secret key of a public key cryptosystem, comprising:
-
first means for generating a secret key inside the tamper resistant personal portable device; and second means for storing the secret key generated by the first means into a storage region from which the secret key cannot be read outside of the tamper resistant personal portable device. - View Dependent Claims (55, 56, 57, 58)
-
-
59. A method for generating and managing a secret key of a public key cryptosystem, comprising the steps of:
-
(a) separately entering each one of partial secret keys for constituting the secret key from all entities sharing interests with a user of a tamper resistant personal portable device, into the tamper resistant personal portable device, each partial secret key being secretly managed by each entity; (b) generating a secret key inside the tamper resistant personal portable device from the partial secret keys entered at the step (a); and (c) storing the secret key generated at the step (a) into a storage region in the tamper resistant personal portable device from which the secret key cannot be read outside of the tamper resistant personal portable device. - View Dependent Claims (60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70)
-
-
71. A tamper resistant personal portable device for generating and managing a secret key of a public key cryptosystem, comprising:
-
first means for separately entering each one of partial secret keys for constituting the secret key from all entities sharing interests with a user of the tamper resistant personal portable device, into the tamper resistant personal portable device, each partial secret key being secretly managed by each entity; second means for generating a secret key inside the tamper resistant personal portable device from the partial secret keys entered by the first means; and third means for storing the secret key generated by the second means into a storage region from which the secret key cannot be read outside of the tamper resistant personal portable device. - View Dependent Claims (72, 73, 74, 75, 76, 77, 78)
-
-
79. A method for handling digital data using public key cryptosystems, comprising the steps of:
-
(a) generating at a user'"'"'s side a public key and a secret key of a first public key cryptosystem for signing; (b) registering the public key of the first public key cryptosystem at a certification issuing center; and (c) signing the public key of the first public key cryptosystem by using a secret key of the certification issuing center, and disclosing the signed public key as a user'"'"'s certification; (d) generating at a copyright owner'"'"'s side a public key and a secret key of a second public key cryptosystem for deciphering digital data, and storing the secret key of the second public key cryptosystem into a storage region in a tamper resistant personal portable device from which the secret key of the second public key cryptosystem cannot be read outside of the tamper resistant personal portable device; (e) providing the tamper resistant personal portable device and the public key of the second public key cryptosystem to the user'"'"'s side, such that the user'"'"'s side can utilize the digital data provided by the copyright owner'"'"'s side by carrying out deciphering processing using the secret key of the second public key cryptosystem and signing processing using the secret key of the first public key cryptosystem within the tamper resistant personal portable device.
-
Specification