Cryptographic key split binder for use with tagged data elements
First Claim
1. A process of creating cryptographic keys to secure a data object including a tagged data element, comprising:
- selecting a tagged data element, from among a plurality of tagged data elements, based on an associated data tag;
generating a plurality of cryptographic key splits from seed data;
binding the cryptographic key splits together to produce a first cryptographic key; and
generating a second cryptographic key based on security requirements of the data object;
wherein at least one of the cryptographic key splits is based on the associated data tag.
1 Assignment
0 Petitions
Accused Products
Abstract
A process of cryptographically securing a data object including one or more respectively tagged data elements includes selecting a tagged data element from among a plurality of tagged data elements, based on an associated data tag. A plurality of cryptographic key splits is generated from seed data. The cryptographic key splits are bound together to produce a first cryptographic key. A second cryptographic key is generated based on security requirements of the data object. The tagged data element is encrypted using the first cryptographic key. The data object encrypting using the second cryptographic key. At least one of the cryptographic key splits is based on the associated data tag.
-
Citations
20 Claims
-
1. A process of creating cryptographic keys to secure a data object including a tagged data element, comprising:
-
selecting a tagged data element, from among a plurality of tagged data elements, based on an associated data tag; generating a plurality of cryptographic key splits from seed data; binding the cryptographic key splits together to produce a first cryptographic key; and generating a second cryptographic key based on security requirements of the data object; wherein at least one of the cryptographic key splits is based on the associated data tag. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 19)
-
-
11. A process of cryptographically securing a data object including one or more respectively tagged data elements, comprising:
-
selecting a tagged data element, from among a plurality of tagged data elements, based on an associated data tag; generating a plurality of cryptographic key splits from seed data; binding the cryptographic key splits together to produce a first cryptographic key; generating a second cryptographic key based on security requirements of the data object; encrypting the tagged data element with the first cryptographic key; and encrypting the data object with the second cryptographic key; wherein at least one of the cryptographic key splits is based on the associated data tag. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 20)
-
Specification