Data processing apparatus and method
First Claim
1. A system for providing a cryptographic key using an external key, the system comprising:
- a first data store for storing an authorization key;
a second data store, separate from the first data store, for storing a secure key and a public key, wherein the secure key comprises one of the cryptographic key and a number required to generate the cryptographic key, and wherein the public key is associated with an associated private key by an asymmetric encryption algorithm;
an access controller operable to allow access to the secure key stored in the second data store only to an access request accompanied by a digital signature generated using the private key corresponding to the stored public key;
a key generator operable to receive an external key and to generate the private key using the received external key and the stored authorization key using a mapping function; and
an access request signal generator operable to generate a digital signature using the private key and to transmit an access request, including the generated digital signature, to the access controller in order to retrieve the secure key.
1 Assignment
0 Petitions
Accused Products
Abstract
Generating a cryptographic key, for example using a received external key. A system to generate a cryptographic key may include a first data store which may store an authorization key. A system may include a second data store which may store a secure key and/or a public key. A system may include an access controller, which may allow access to a secure key, for example to an access request which may be accompanied by a digital signature. A system may include a key generator, which may generate a private key, for example using a received external key, a stored authorization key and/or a mapping function. A system may include an access request signal generator which may generate a digital signature and/or which may transmit an access request, for example including a generated digital signature, to an access controller to retrieve a secure key.
-
Citations
13 Claims
-
1. A system for providing a cryptographic key using an external key, the system comprising:
-
a first data store for storing an authorization key; a second data store, separate from the first data store, for storing a secure key and a public key, wherein the secure key comprises one of the cryptographic key and a number required to generate the cryptographic key, and wherein the public key is associated with an associated private key by an asymmetric encryption algorithm; an access controller operable to allow access to the secure key stored in the second data store only to an access request accompanied by a digital signature generated using the private key corresponding to the stored public key; a key generator operable to receive an external key and to generate the private key using the received external key and the stored authorization key using a mapping function; and an access request signal generator operable to generate a digital signature using the private key and to transmit an access request, including the generated digital signature, to the access controller in order to retrieve the secure key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for providing a cryptographic key using an external key, the system comprising:
-
a first server having a first data store for storing an authorization key; a second server having; a second data store for storing a secure key wherein the secure key comprises a number required to generate the cryptographic key; and an access controller operable to allow access to the secure key stored in the second data store only to an access request accompanied by a digital signature generated using a private key corresponding to the stored secure key; and a network device having; a key generator operable to generate an external key and to generate the private key using the generated external key and the authorization key using a mapping function; and an access request signal generator operable to generate a digital signature using the private key and to transmit an access request, including the generated digital signature, to the access controller in order to retrieve the secure key, and a cryptographic key generator operable to generate the cryptographic key using the external key and the secure key. - View Dependent Claims (12, 13)
-
Specification