Please download the dossier by clicking on the dossier button x
×

Resilient cryptographic scheme

  • US 8,233,617 B2
  • Filed: 07/20/2010
  • Issued: 07/31/2012
  • Est. Priority Date: 01/20/1999
  • Status: Expired due to Term
First Claim
Patent Images

1. A method of enabling a symmetric key to be derived, the method comprising:

  • a processor obtaining a plurality of key parts, wherein the plurality of key parts when combined equal the symmetric key;

    the processor encrypting a first of the key parts using a first cryptographic algorithm to generate a first encrypted value;

    the processor encrypting one or more remaining key parts of the plurality of key parts using respective cryptographic algorithms to generate one or more additional encrypted values, wherein each key part encrypted is encrypted using a different cryptographic algorithm; and

    the processor providing the first encrypted value and the one or more additional encrypted values to an other entity to enable the other entity to derive the symmetric key.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×