Method and apparatus for asymetric key management in a cryptographic system
First Claim
1. A method of asymmetric key management in card-to-card transactions comprising the steps of:
- generating an identifier, KI1, and a derived key, DK1, for a first card;
generating a key, K1, using said KI1 and DK1 ;
installing K1 in said first card;
generating an identifier, KI2 and a derived key, DK2, for a second card;
generating a key, K2, that is different than said K1 using said KI2 and said DK2 ; and
installing said K2 in said second card.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for asymmetrical key management in a cryptographic system is provided. Embodiments of the invention implement varying levels of diversification to manage the encryption keys. In one embodiment, a unique key per device approach is used that minimizes the risks due to unauthorized key access. In yet another embodiment, a unique key per device per transaction is used. The keys generated in embodiments of the invention can be used to authenticate one device with another. An authenticating device generates a current key that is initially unknown to an unauthenticated device. The authenticating device sends information to an unauthenticated device to assist it in determining the value of the current key. The unauthenticated device uses the determined value of the current key to derive the authenticating device'"'"'s authentication value. Each device generates a authentication value that must be correctly determined by an unauthenticated device for successful authentication. Authentication is performed between two devices such that each device is authenticated with the other device. Computing devices of a system can be grouped. In one embodiment devices are grouped such that one group includes devices that have a master key and another group includes devices that have a key that is derived from the master key. Another embodiment includes groups whose devices have the group'"'"'s master key and a key derived from each of the master keys of the other group(s). In this embodiment, a dual authentication process can be used to authenticate two devices from different groups.
90 Citations
51 Claims
-
1. A method of asymmetric key management in card-to-card transactions comprising the steps of:
-
generating an identifier, KI1, and a derived key, DK1, for a first card; generating a key, K1, using said KI1 and DK1 ; installing K1 in said first card; generating an identifier, KI2 and a derived key, DK2, for a second card; generating a key, K2, that is different than said K1 using said KI2 and said DK2 ; and installing said K2 in said second card. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for bilaterally authenticating devices in a cryptographic system comprising the steps of:
-
determining a current key for a first device; said first device generating a first message for a second device; said second device determining a current key value using said first message; said second device determining a first authentication value using said message and said current key value; said second device generating a second message for said first device; said first device extracting said first authentication value from said second message; said first device determining whether said extracted first authentication value is the same as said first authentication value; performing the following when said extracted first authentication value is the same as said first authentication value; said first device determining a second authentication value from said second message; said first device generating a third message for said second device; said second device extracting said second authentication value from said third message; and said second device determining whether said extracted second authentication value is the same as said second authentication value. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A system for bilaterally authenticating devices in a cryptographic system comprising:
-
a first device for generating a current key and a first authentication value, for verifying a derived first authentication value and for deriving a second authentication value, said first device comprising; a first central processing unit (CPU) for generating said first authentication value and deriving a second authentication value; a first memory coupled to said first CPU for storing a plurality of future keys from which said current key is selected; and a first input/output port coupled to said first CPU and said first memory; a second device coupled to said first device, said second device for generating said second authentication value, for verifying a derived second authentication value and for deriving a first authentication value, said second device comprising; a second central processing unit (CPU) for generating said second authentication value; a second memory coupled to said first CPU for storing an initial key for deriving said first authentication value; and a second input/output port coupled to said first CPU and said first memory. - View Dependent Claims (29, 30)
-
-
31. An article of manufacture comprising:
-
a computer usable medium having computer readable program code embodied therein for bilaterally authenticating devices in a cryptographic system comprising; computer readable program code configured to cause a computer to determine a current key and a first authentication value; computer readable program code configured to cause a computer to generate a first message, said first message containing said first authentication value encrypted using said current key; computer readable program code configured to cause a computer to transmit said first message to a second device; computer readable program code configured to cause a computer to receive a second message from said second device; computer readable program code configured to cause a computer to extract a first authentication value from said second message; computer readable program code configured to cause a computer to determine whether said extracted first authentication value is the same as said first authentication value; computer readable program code configured to cause a computer to validate said second device when said extracted first authentication value is the same as said first authentication value; computer readable program code configured to cause a computer to determine a second authentication value from said second message; computer readable program code configured to cause a computer to generate a third message for said second device, said third message containing said second authentication value. - View Dependent Claims (32, 33, 34, 35, 36)
-
-
37. An article of manufacture comprising:
-
a computer usable medium having computer readable program code embodied therein for bilaterally authenticating devices in a cryptographic system comprising; computer readable program code configured to cause a computer to receive a first message from a first device; computer readable program code configured to cause a computer to determine a current key value using said first message, a key calculation algorithm and an initial key; computer readable program code configured to cause a computer to determine a first authentication value using said first message and said current key value; computer readable program code configured to cause a computer to generate a second message for said first device, said second message containing said first authentication value and a second authentication value; computer readable program code configured to cause a computer to transmit said second message to said first device; computer readable program code configured to cause a computer to receive a third message from said first device; computer readable program code configured to cause a computer to extract a second authentication value from said third message; and computer readable program code configured to cause a computer to determine whether said extracted second authentication value is the same as said second authentication value; computer readable program code configured to cause a computer to validate said first device when said extracted second authentication value is the same as said second authentication value. - View Dependent Claims (38, 39, 40, 41)
-
-
42. A method of reducing exposure of keys in the distribution of computing devices in a cryptographic system comprising the steps of:
-
storing a master key in a computing device resident in a secured environment; generating using said master key a unique key for a plurality of distributable computing devices, said unique key being different for each of said plurality of distributable computing devices and different from said master key; and using said unique key in a transaction in said cryptographic system. - View Dependent Claims (43, 44, 45, 46, 47)
-
-
48. A method for asymmetric key management in a system of computing devices comprising the steps of:
-
for a first grouping of computer devices of said system; generating a first master key that is stored in each device in said first grouping; deriving a unique key for each device in said first grouping; for a second grouping of computer devices of said system; generating a second master key that is stored in each device in said second grouping, said second master key is used to derive said unique key for each device in said first grouping; deriving a unique key for each device in said second grouping using said first master key. - View Dependent Claims (49, 50, 51)
-
Specification