Saving and retrieving data based on public key encryption
First Claim
Patent Images
1. A method of implementing a BoundSign operation, the method comprising:
- receiving, as an input, both data to be signed and a bound key blob, wherein the bound key blob is bound to one or more processors;
recovering, from the bound key blob, a private key of a public/private key pair associated with the bound key blob;
generating a digital signature over the data using the private key; and
outputting the digital signature.
1 Assignment
0 Petitions
Accused Products
Abstract
In accordance with certain aspects, bound key operations on ciphertext and/or data are implemented. A bound key operation can receive both data to be signed and a bound key blob that is bound to one or more processors, recover a private key from the bound key blob, and generate a digital signature over the data using the private key. A bound key operation can alternatively receive both ciphertext and a bound key or bound key structure bound to one or more processors, recover or reconstruct a private key based on the bound key or bound key structure, and use the private key to generate plaintext corresponding to the ciphertext.
-
Citations
20 Claims
-
1. A method of implementing a BoundSign operation, the method comprising:
-
receiving, as an input, both data to be signed and a bound key blob, wherein the bound key blob is bound to one or more processors; recovering, from the bound key blob, a private key of a public/private key pair associated with the bound key blob; generating a digital signature over the data using the private key; and outputting the digital signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of implementing a BoundDecrypt operation, the method comprising:
-
receiving, as an input, both ciphertext and a bound key structure, wherein the bound key structure is bound to one or more processors; recovering, from the bound key structure, a private key of a public/private key pair associated with the bound key structure; decrypting the ciphertext using the private key to generate plaintext corresponding to the ciphertext; and outputting the plaintext. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method of implementing a BoundPkUnseal operation, the method comprising:
-
receiving, as an input, both ciphertext and a bound key structure, wherein the bound key structure is bound to one or more processors; recovering, from the bound key structure, a private key of a public/private key pair associated with the bound key structure; decrypting the ciphertext using the private key to generate plaintext corresponding to the ciphertext; and outputting the plaintext. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification