×

Key encryption and decryption

  • US 9,747,223 B2
  • Filed: 02/20/2015
  • Issued: 08/29/2017
  • Est. Priority Date: 04/10/2007
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • a microprocessor;

    a host attachment coupled to the microprocessor; and

    circuitry coupled directly to the microprocessor and directly to the host attachment, the circuitry comprising an Application Specific Integrated Circuit (ASIC) for encryption and decryption that includes a first multiplexor, a second multiplexor, a third multiplexor, a fourth multiplexor, a public key decryption block, a decryption block, and an encryption block;

    wherein the first multiplexor selects a session encrypted data key from inputs of a first session encrypted data key from the microprocessor and a second session encrypted data key from the host attachment, and wherein the session encrypted data key is input to the public key decryption block;

    wherein the public key decryption block unwraps the session encrypted data key to obtain a secret key that is input to the second multiplexor;

    wherein the second multiplexor selects a session key from inputs of a first session key, a backup data key, a standard data key, and the secret key, and wherein the session key is input to the decryption block and input to the encryption block;

    wherein the third multiplexor selects clear text from inputs of first clear text from the microprocessor and second clear text from the host attachment, and wherein the clear text is input to the encryption block;

    wherein the encryption block encrypts the clear text with the session key to generate encrypted text, and wherein the encrypted text is input to the fourth multiplexor;

    wherein the fourth multiplexor selects a piece of encrypted data from inputs of the session encrypted data key and the encrypted text from the encryption block, and wherein the piece of encrypted data is input to the decryption block; and

    wherein the decryption block decrypts the piece of encrypted data, wherein the decryption comprises decrypting the session encrypted data key with the session key comprising the first session key when the piece of encrypted data is the session encrypted data key, and wherein the decryption comprises decrypting the encrypted text with the session key comprising one of the backup data key, the standard data key, and the secret key when the piece of encrypted data is the encrypted text.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×