×

Public key cryptosystem key management based on control vectors

  • US 5,200,999 A
  • Filed: 09/27/1991
  • Issued: 04/06/1993
  • Est. Priority Date: 09/27/1991
  • Status: Expired due to Term
First Claim
Patent Images

1. In a data processing system, a method for managing a public key cryptographic system, comprising the steps of:

  • generating a first public key and a first private key as a first pair in said data processing system, for use with a first public key algorithm;

    generating a second public key and a second private key as a second pair in said data processing system, for use with a second public key algorithm;

    assigning a private control vector for said first private key and said second private key in said data processing system, for defining permitted uses for said first and second private keys;

    forming a private key record which includes said first private key and said second private key in said data processing system, and encrypting said private key record under a first master key expression which is a function of said private control vector;

    forming a private key token which includes said private control vector and said private key record, and storing said private key token in said data processing system;

    receiving a first key use request in said data processing system, reguiring said first public key algorithm;

    accessing said private key token in said data processing system and checking said private control vector to determine if said private key record contains a key having permitted uses which will satisfy said first request;

    decrypting said private key record under said first master key expression in said data processing system and extracting said first private key from said private key record;

    selecting said first public key algorithm in said data processing system for said first key use request;

    selecting said first public key algorithm in said data processing system using said first private key to perform a cryptographic operation to satisfy said first key use request.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×