Systems and methods for generating and using multiple pre-signed cryptographic responses
First Claim
Patent Images
1. A computer-implemented method, comprising:
- generating multiple cryptographic datasets corresponding to a single encryption key, each cryptographic dataset having a different validity period;
upon a user request, identifying one or more cryptographic datasets that are still valid among the multiple cryptographic datasets;
identifying a cryptographic dataset having a shortest validity period among the one or more cryptographic datasets that are still valid; and
providing the identified cryptographic dataset to the user in response to identifying the cryptographic dataset having the shortest validity period.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for generating and using multiple pre-signed cryptographic responses. In one implementation, the method includes generating multiple cryptographic datasets. Each cryptographic dataset has a different validity period. The method further includes upon a user request, identifying one or more cryptographic datasets that are still valid among the multiple cryptographic datasets. The method further includes identifying a cryptographic dataset having the shortest validity period among the one or more cryptographic datasets that are still valid. The method also includes providing the identified cryptographic dataset to the user.
-
Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
generating multiple cryptographic datasets corresponding to a single encryption key, each cryptographic dataset having a different validity period; upon a user request, identifying one or more cryptographic datasets that are still valid among the multiple cryptographic datasets; identifying a cryptographic dataset having a shortest validity period among the one or more cryptographic datasets that are still valid; and providing the identified cryptographic dataset to the user in response to identifying the cryptographic dataset having the shortest validity period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system, comprising:
-
a generator configured to generate multiple cryptographic datasets corresponding to a single encryption key, each cryptographic dataset having a different validity period; and a server configured to; upon a user request, identify one or more cryptographic datasets that are still valid among the multiple cryptographic datasets; identify a cryptographic dataset having a shortest validity period among the one or more cryptographic datasets that are still valid; and provide the identified cryptographic dataset to the user in response to identifying the cryptographic dataset having the shortest validity period. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable medium having stored thereon instructions that, when executed by a processor, performs a method comprising:
-
generating multiple cryptographic datasets corresponding to a single encryption key, each cryptographic dataset having a different validity period; upon a user request, identifying one or more cryptographic datasets that are still valid among the multiple cryptographic datasets; identifying a cryptographic dataset having a shortest validity period among the one or more cryptographic datasets that are still valid; and providing the identified cryptographic dataset to the user in response to identifying the cryptographic dataset having the shortest validity period. - View Dependent Claims (17, 18, 19, 20)
-
Specification