Certify and split system and method for replacing cryptographic keys
First Claim
1. A method operational on a token device for replacing asymmetric cryptographic keys, comprising:
- generating at the token device a pseudorandom first key pair that comprises a first private key and a corresponding first public key;
storing the first private key in a storage device of the token device;
generating at the token device a pseudorandom spare second key pair that comprises a second private key and a second public key,signing the second public key with the first private key stored in the storage device to obtain a signed certificate adapted to authenticate the second public key when the first public key is replaced with the second public key;
dividing the second key pair and signed certificate into n shares, where n is an integer; and
distributing the n shares to at least two shareholders for safekeeping.
1 Assignment
0 Petitions
Accused Products
Abstract
A feature is provided that facilitates securely creating and/or replacing cryptographic keys. A first key pair is created comprising first private key and first public key. A second (spare) key pair is created comprising second private key and second public key. The second key pair is associated with the first private key. The second key pair is divided into shares and distributed to at least two shareholders. When the first key pair is to be replace, the second key pair is recreated and authenticated with at least a portion of the distributed shares. A trust level is associated with the second key pair corresponding to a trust level of the first key pair. The first key pair may be invalidated upon authentication of the second key pair. Further configurations provide for the creation of additional spare key pairs.
22 Citations
30 Claims
-
1. A method operational on a token device for replacing asymmetric cryptographic keys, comprising:
-
generating at the token device a pseudorandom first key pair that comprises a first private key and a corresponding first public key; storing the first private key in a storage device of the token device; generating at the token device a pseudorandom spare second key pair that comprises a second private key and a second public key, signing the second public key with the first private key stored in the storage device to obtain a signed certificate adapted to authenticate the second public key when the first public key is replaced with the second public key; dividing the second key pair and signed certificate into n shares, where n is an integer; and distributing the n shares to at least two shareholders for safekeeping. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A token device that facilitates replacing cryptographic keys, comprising:
-
a processor; and a memory;
wherein the memory stores computer executable instructions that when executed by the processor, causes the processor to;generate a pseudorandom first key pair that comprises a first private key and a corresponding first public key, and generate a pseudorandom spare second key pair that comprises a second private key and a second public key; sign the second public key with the first private key to obtain a signed certificate adapted to authenticate the second public key when replacing the first public key with the second public key; divide the second key pair and signed certificate into n shares, where n is an integer; and distribute the n shares to at least two shareholders for safekeeping. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A token device that facilitates replacing cryptographic keys, comprising:
-
a processor; and a memory;
wherein the memory stores computer executable instructions that when executed by the processor, causes the processor to;generate a pseudorandom first key pair that comprises a first private key and a corresponding first public key, generate a pseudorandom spare second key pair that comprises a second private key and a second public key, sign the second public key with the first private key to obtain a signed certificate adapted to authenticate the second public key when the first public key is replaced with the second public key; divide the second key pair and signed certificate into n shares, where n is an integer; and transmit the n shares to at least two shareholders for safekeeping. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. A non-transitory machine-readable medium having one or more instructions for replacing cryptographic keys, which when executed by a processor causes the processor to:
-
generate a pseudorandom first key pair that comprises a first private key and a corresponding first public key; generate a pseudorandom spare second key pair that comprises a second private key and a second public key; sign the second public key with the first private key to obtain a signed certificate adapted to authenticate the second public key when the first public key is replaced with the second public key; divide the second key pair and signed certificate into n shares, where n is an integer; and distribute the n shares to at least two shareholders for safekeeping. - View Dependent Claims (26, 27, 28, 29, 30)
-
Specification