Negotiating a session with a cryptographic domain
First Claim
Patent Images
1. A computer-implemented method, comprising:
- under control of one or more computer systems configured with executable instructions,at a first security module device of a plurality of security module devices;
receiving, from an operator device, a first request for a session key;
in response to the first request, producing an encrypted one or more session keys using a domain key to encrypt one or more session keys with information usable to identify the operator device, the encrypted one or more session keys not decryptable by the operator device, the domain key common to all of the plurality of security module devices, the domain key not common to the operator device;
providing the one or more session keys using an encrypted channel such that the operator device can obtain the one or more session keys in plaintext; and
providing the encrypted one or more session keys to the operator device; and
at a second security module device of the plurality of security module devices;
receiving, from the operator device, a second request to perform a cryptographic operation, the second request including an encrypted session key from the encrypted one or more session keys and a digital signature generated based at least in part on a session key of the one or more session keys;
using the domain key to decrypt the encrypted session key to produce a decrypted session key and decrypted information usable to identify the operator device;
verifying an identity of the operator device using the decrypted information usable to identify the operator device;
verifying the digital signature using the decrypted session key; and
as a result of verifying the operator device and verifying the digital signature;
performing the cryptographic operation;
using the decrypted session key, encrypt a result of performing the cryptographic operation to produce an encrypted result;
electronically shredding the decrypted session key; and
providing the encrypted result to the operator device.
1 Assignment
0 Petitions
Accused Products
Abstract
A plurality of devices are each operable to provide information that is usable for to prove authorization with any of the other devices. The devices may have common access to a cryptographic key. A device may use the cryptographic key to encrypt a session key and provide both the session key and the encrypted session key. Requests to any of the devices can include the encrypted session key and a digital signature generated using the session key. In this manner, a device that receives the request can decrypt the session key and use the decrypted session key to verify the digital signature.
-
Citations
23 Claims
-
1. A computer-implemented method, comprising:
-
under control of one or more computer systems configured with executable instructions, at a first security module device of a plurality of security module devices; receiving, from an operator device, a first request for a session key; in response to the first request, producing an encrypted one or more session keys using a domain key to encrypt one or more session keys with information usable to identify the operator device, the encrypted one or more session keys not decryptable by the operator device, the domain key common to all of the plurality of security module devices, the domain key not common to the operator device; providing the one or more session keys using an encrypted channel such that the operator device can obtain the one or more session keys in plaintext; and providing the encrypted one or more session keys to the operator device; and at a second security module device of the plurality of security module devices; receiving, from the operator device, a second request to perform a cryptographic operation, the second request including an encrypted session key from the encrypted one or more session keys and a digital signature generated based at least in part on a session key of the one or more session keys; using the domain key to decrypt the encrypted session key to produce a decrypted session key and decrypted information usable to identify the operator device; verifying an identity of the operator device using the decrypted information usable to identify the operator device; verifying the digital signature using the decrypted session key; and as a result of verifying the operator device and verifying the digital signature; performing the cryptographic operation; using the decrypted session key, encrypt a result of performing the cryptographic operation to produce an encrypted result; electronically shredding the decrypted session key; and providing the encrypted result to the operator device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer-implemented method, comprising:
-
under control of one or more computer systems configured with executable instructions, at a first device, receiving a request to perform a cryptographic operation, the request including; a first key encrypted based at least in part on a second key that is common to all of a plurality of devices that includes the first device; information generated based at least in part on the first key in plaintext form; and authentication information generated based at least in part on the first key; and at the first device, in response to the request to perform the cryptographic operation; using the second key to decrypt the encrypted first key to produce a decrypted first key; using the decrypted first key to verify the authentication information; determining, based at least in part on the decrypted first key, the information, and the authentication information, whether to perform the cryptographic operation; performing the cryptographic operation if the determining results in a determination to perform the cryptographic operation; and using the decrypted first key to encrypt a result of performing the cryptographic operation. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system, comprising:
a plurality of devices, each device of the plurality of devices configured with; one or more processors; and memory including instructions, the plurality of devices comprising; a first device of the plurality of devices including instructions that, when executed by one or more processors of the first device, cause the first device to; receive, from an operator device, a request for a session key; generate, based at least in part on a first key, information that is usable, by a second device of the plurality of devices, for causing the second device of the plurality of devices to provide a result of performance of one or more requested cryptographic operations, the first key common to each of a set of devices of the plurality of the devices, the set of devices including the first device, the operator device not in the set of devices, the information at least including;
an encrypted session key generated based at least in part on the first key; and
authentication information generated based at least in part on the session key, the authentication information including a digital signature verifying an identity of the operator device;provide the authentication information and the session key to the operator device, the session key provided using an encrypted channel such that the operator device obtains the session key in plain text form; a second device of the plurality of devices including instructions that, when executed by one or more processors of the second device, cause the second device to; receive, from the operator device, a request to perform the one or more requested cryptographic operations, the request including the information; decrypt the encrypted session key based at least in part on the first key to generate a decrypted session key; verify the authentication information using the decrypted-session key; perform the one or more requested cryptographic operations as a result of verifying the authentication information, the one or more requested cryptographic operations performed based at least in part on the decrypted session key; electronically shred the decrypted session key; and provide a result of the one or more requested cryptographic operations, the result encrypted using the decrypted session key. - View Dependent Claims (14, 15, 16, 17, 18)
-
19. One or more non-transitory computer-readable storage media having stored thereon instructions that, when executed by one or more processors of a computer system, cause the computer system to:
-
obtain, from a first device, information, generated in response to a request from an operator device to perform a cryptographic operation, at least including; a first version of a first key in plaintext provided over a secure channel; a second version of the first key generated by at least encrypting the first key with a second key that is common to each device of a plurality of devices that includes the first device; and authentication information generated based at least in part on the second version of the first key, the authentication information including a digital signature associated with the operator device; select, from the plurality of devices, a second device for performing the cryptographic operation, each device of the plurality of devices capable of performing the cryptographic operation; receive a request to perform the cryptographic operation, the request including the second version of the first key and the authentication information; generate the first version of the first key by at least decrypting the second version of the first key; prove authorization by at least using the first version of the first key to verify the authentication information including at least the digital signature; and as a result of proving authorization, cause the second device to perform the cryptographic operation; and encrypt a result of the cryptographic operation, the result encrypted based at least in part on the first version of the first key. - View Dependent Claims (20, 21, 22, 23)
-
Specification