Cryptographic key split binding process and apparatus
First Claim
1. A cryptographic key split combiner, comprising:
- a plurality of key split generators that each receive seed data and generate respective cryptographic key splits based on the seed data; and
a key split randomizer that randomizes the cryptographic key splits to produce a cryptographic key;
wherein said plurality of key split generators includes a location split generator that receives location seed data and generates a location key split based on the location seed data.
1 Assignment
0 Petitions
Accused Products
Abstract
A cryptographic key split combiner includes a number of key split generators for generating cryptographic key splits from seed data, and a key split randomizer for randomizing the key splits to produce a cryptographic key. The key split generators can include a random split generator for generating random key splits, a token split generator for generating token key splits based on label data, a console split generator for generating console key splits based on maintenance data, a biometric split generator for generating biometric key splits based on biometric data, and a location split generator for generating location key splits based on location data. Label data can be read from storage, and can include user authorization data. A process for forming cryptographic keys includes randomizing or otherwise binding the splits to form the key.
-
Citations
69 Claims
-
1. A cryptographic key split combiner, comprising:
-
a plurality of key split generators that each receive seed data and generate respective cryptographic key splits based on the seed data; and a key split randomizer that randomizes the cryptographic key splits to produce a cryptographic key; wherein said plurality of key split generators includes a location split generator that receives location seed data and generates a location key split based on the location seed data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A process for forming cryptographic keys, comprising:
-
generating a plurality of cryptographic key splits, each based on seed data; and randomizing the cryptographic key splits to produce a cryptographic key; wherein generating a plurality of cryptographic key splits includes generating a location key split based on location seed data. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. A storage medium comprising instructions for causing a data processor to generate a cryptographic key, wherein the instructions include:
-
generate a plurality of cryptographic key splits, each based on seed data; and randomize the cryptographic key splits to produce a cryptographic key; wherein generate a plurality of cryptographic key splits includes generate a location key split based on location seed data. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69)
-
Specification