×

Secure repository with layers of tamper resistance and system and method for providing same

  • US 7,958,373 B2
  • Filed: 05/14/2009
  • Issued: 06/07/2011
  • Est. Priority Date: 06/27/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method implemented at least in part by a computing device of securely decrypting data with a cryptographic key, said method comprising:

  • identifying attributes of said cryptographic key corresponding to a set of actions;

    performing a first set of actions functionally equivalent to the actions corresponding to said cryptographic key using said attributes but without access to, storing in memory, or exposing a whole or segment of said cryptographic key; and

    performing a diversionary second set of actions different from said first set of actions;

    wherein said first and said second sets of actions are implemented by way of a set of computer-executable instructions executable on a computing device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×