Cryptographic key construct
First Claim
1. A computer program product residing on a computer-readable storage medium and comprising computer-readable instructions configured to cause a computer to:
- use a first one-way, forward-recursive function to produce a first sequence of forward cryptographic base values;
use a second one-way, backward-recursive function to produce a second sequence of backward cryptographic base values; and
combine corresponding forward and backward cryptographic base values to produce a third sequence of cryptographic keys.
3 Assignments
0 Petitions
Accused Products
Abstract
A computer program product, for producing a cryptographic key label for use in exchanging information between first and second organizations of members, resides on a computer-readable medium includes computer-readable instructions configured to cause a computer to: produce a read-write cryptographic key using at least one base value; produce a write-only cryptographic key using the read-write cryptographic key; combine a first identifier, uniquely associated with the first organization, and a second identifier, uniquely associated with the key label to be produced, using a one-way function to produce a pedigree; and associate the pedigree with the read-write key and the write-only key to form the cryptographic key label.
-
Citations
12 Claims
-
1. A computer program product residing on a computer-readable storage medium and comprising computer-readable instructions configured to cause a computer to:
-
use a first one-way, forward-recursive function to produce a first sequence of forward cryptographic base values; use a second one-way, backward-recursive function to produce a second sequence of backward cryptographic base values; and combine corresponding forward and backward cryptographic base values to produce a third sequence of cryptographic keys. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented cryptographic method comprising:
-
generating a first sequence of forward cryptographic base values using a one-way, forward-recursive function; generating a second sequence of backward cryptographic base values using a one-way, backward-recursive function; and combining corresponding forward and backward cryptographic base values to produce a third sequence of cryptographic keys. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification