Cipher method and system for verifying a decryption of an encrypted user data key
First Claim
1. A cipher system, comprising:
- a processor; and
a memory storing instructions operable with the processor for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key, the instructions being executed for;
intermixing eight bytes of random text with eight bytes of text comprising alphanumeric characters “
DFSMSDSS”
to create an intermixed text;
encrypting the intermixed text with the user data key to create a verification text;
decrypting the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the decryption key;
decrypting the verification text with the user data key as decrypted with the decryption key;
validating a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched comparison of the verification text as decrypted with the user data key and the intermixed text; and
invalidating the use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a mismatched comparison of the verification text as decrypted with the user data key and the intermixed text.
1 Assignment
0 Petitions
Accused Products
Abstract
A cipher method for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key. The cipher method involves a decryption of the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key, a decryption of the verification text with the user data key as decrypted with the decryption key, and a validation/invalidation of a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched/unmatched comparison of the verification text as decrypted with the user data key and an intermixing of a known text and a random text.
-
Citations
15 Claims
-
1. A cipher system, comprising:
- a processor; and
a memory storing instructions operable with the processor for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key, the instructions being executed for;intermixing eight bytes of random text with eight bytes of text comprising alphanumeric characters “
DFSMSDSS”
to create an intermixed text;encrypting the intermixed text with the user data key to create a verification text; decrypting the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the decryption key; decrypting the verification text with the user data key as decrypted with the decryption key; validating a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched comparison of the verification text as decrypted with the user data key and the intermixed text; and invalidating the use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a mismatched comparison of the verification text as decrypted with the user data key and the intermixed text. - View Dependent Claims (2, 3, 4, 5, 6)
- a processor; and
-
7. A cipher method for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key, the cipher method comprising:
-
intermixing eight bytes of random text with eight bytes of text comprising alphanumeric characters “
DFSMSDSS”
to create an intermixed text;encrypting the intermixed text with the user data key to create a verification text; decrypting the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key; decrypting the verification text with the user data key as decrypted with the decryption key; validating a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched comparison of the verification text as decrypted with the user data key and the intermixed text; and invalidating the use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a mismatched comparison of the verification text as decrypted with the user data key and the intermixed text. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A method for ensuring correct and secure decryption on an encrypted user data key comprising:
-
intermixing eight bytes of random text with eight bytes of text comprising alphanumeric characters “
DFSMSDSS”
to create an intermixed text;encrypting the intermixed text with the user data key to create a verification text; initiating a decryption of an encrypted user data using the encrypted user data key; decrypting the encrypted user data key based on the initiation using a decryption key; decrypting the verification text with the user data key as decrypted with the decryption key; comparing the decrypted verification text with the intermixed text; validating a use of the user key based on the comparison; and ensuring correct and secure decryption of the encrypted user data with the decrypted user data key based on the validated use. - View Dependent Claims (14, 15)
-
Specification