×

Leak-Resistant Cryptographic Token

  • US 20110113248A1
  • Filed: 01/20/2011
  • Published: 05/12/2011
  • Est. Priority Date: 07/02/1998
  • Status: Abandoned Application
First Claim
Patent Images

1. A portable cryptographic token for deriving cryptographic authentication codes for securing transactions between a user of said token and a server, and which limits the number of times secret keys are used so as to provide protection against external monitoring attacks, compromising:

  • (a) a key cache configured to include a top-level key, a plurality of intermediate-level keys, and a lowest-level key;

    (b) at least one key updater configured to receive as an input a key value for a particular level, and to operate on that key using a block cipher to generate a value for a key one level below said input key'"'"'s level;

    (c) a timer;

    (d) said token being configured to use said at least one key updater and said timer to derive periodically;

    (i) a new lowest-level key value, where said value of a second-to-lowest level key from said cache is an input to said key updater;

    (ii) after a plurality of updates to said lowest-level key value, a new second-to-lowest level key value, where said value of a third-to-lowest-level key from said cache is an input to said key updater;

    (iii) after a plurality of updates to said second-lowest-level key, a new third-to-lowest level key value, where said value of a fourth-to-lowest-level key from said cache is an input to said key updater;

    said token being usable in securing operations with a server, based on values derived from said lowest-level key values.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×