Methods and systems for providing high-security cryptographic keys to mobile radios
First Claim
1. A method carried out by a key-management infrastructure, the method comprising:
- receiving first and second disassembly products of a high-security cryptographic key; and
providing the first and second disassembly products to a mobile radio for reassembly of the high-security cryptographic key,wherein providing the first disassembly product to the mobile radio comprises providing the first disassembly product to the mobile radio over a local connection via a restricted-access key variable loader, andwherein providing the second disassembly product to the mobile radio comprises;
generating a medium-security-encrypted second disassembly product at least in part by encrypting the second disassembly product based on at least one medium-security cryptographic key; and
providing the medium-security-encrypted second disassembly product to the mobile radio over an air interface.
1 Assignment
0 Petitions
Accused Products
Abstract
At least one embodiment takes the form of a process carried out by a key-management infrastructure (KMI). The KMI receives first and second disassembly products of a high-security cryptographic key and provides the first and second disassembly products to a mobile radio for reassembly of the high-security cryptographic key. Providing the first disassembly product to the mobile radio includes providing the first disassembly product to the mobile radio over a local connection via a restricted-access key variable loader. Providing the second disassembly product to the mobile radio includes (i) generating a medium-security-encrypted second disassembly product at least in part by encrypting the second disassembly product based on at least one medium-security cryptographic key, and (ii) providing the medium-security-encrypted second disassembly product to the mobile radio over an air interface.
-
Citations
20 Claims
-
1. A method carried out by a key-management infrastructure, the method comprising:
-
receiving first and second disassembly products of a high-security cryptographic key; and providing the first and second disassembly products to a mobile radio for reassembly of the high-security cryptographic key, wherein providing the first disassembly product to the mobile radio comprises providing the first disassembly product to the mobile radio over a local connection via a restricted-access key variable loader, and wherein providing the second disassembly product to the mobile radio comprises; generating a medium-security-encrypted second disassembly product at least in part by encrypting the second disassembly product based on at least one medium-security cryptographic key; and providing the medium-security-encrypted second disassembly product to the mobile radio over an air interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A key-management infrastructure comprising:
-
a communication interface; a processor; and a non-transitory data storage medium containing instructions executable by the processor for causing the key-management infrastructure to carry out a set of functions, the set of functions including; receiving first and second disassembly products of a high-security cryptographic key; and providing the first and second disassembly products to a mobile radio for reassembly of the high-security cryptographic key, wherein providing the first disassembly product to the mobile radio comprises providing the first disassembly product to the mobile radio over a local connection via a restricted-access key variable loader, wherein providing the second disassembly product to the mobile radio comprises; generating a medium-security-encrypted second disassembly product at least in part by encrypting the second disassembly product based on at least one medium-security cryptographic key; and providing the medium-security-encrypted second disassembly product to the mobile radio over an air interface.
-
Specification