×

Distributed cryptographic methods and arrangements

  • US 7,269,736 B2
  • Filed: 02/28/2001
  • Issued: 09/11/2007
  • Est. Priority Date: 02/28/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method comprising:

  • causing a first computing device to provide data to a physically distinct, portable computing device; and

    causing the portable computing device to cryptographically modify the data and provide the resulting cryptographically modified data to the first computing device, wherein the first computing device does not cryptographically modify the data and wherein the portable computing system comprises encryption logic that is configured to encrypt the data using at least one cryptographic key and to maintain the cryptographic key in an obfuscated form, said maintaining comprising;

    generating a first hash value using a random value and a portable computing system identifier;

    using the first hash to identify a first key seed in a registry file, wherein the registry file contains one or more decoy values; and

    generating a second hash value using the first key seed and a second key seed, wherein the second hash value corresponds to the cryptographic key.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×