×

Encrypted data recovery method using split storage key and system thereof

  • US 6,118,874 A
  • Filed: 03/30/1998
  • Issued: 09/12/2000
  • Est. Priority Date: 03/31/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. An encrypted data recovery method in a system including a user security apparatus for encrypting a message by means of a data key, preparing enveloped data for encrypting said data key by means of a public key and splitting a secret key paired with said public key, a plurality of key storage apparatuses each keeping each of said split secret keys in custody, a key registration apparatus for managing key storage apparatus certificates and key storage information, and a key recovery apparatus for decrypting said data key by means of said split secret keys and said enveloped data, said system connected to said user security apparatus, said key registration apparatus, said key storage apparatus and said key recovery apparatus through a network, comprising:

  • a key registration request step of encrypting said split secret keys by means of said public key of said key storage apparatus and requesting registration;

    a key registration response step of registering said requested split secret keys, wherein said key registration response step includes a step of preparing a first identifier by means of a random number, a step of sending said first identifier to said user security apparatus, and a key storage request step that includes a step of preparing a second identifier by means of said first identifier and an identifier of said key storage apparatus;

    a key storage response step of keeping each of said registered split secret keys in each of said key storage apparatuses in custody in relation to said second identifier;

    a data key recovery request step of combining a plurality of partial recovery data keys prepared for each of said key storage apparatuses to decrypt said data key, wherein said data key recovery request step includes a step of calculating said second identifier by means of said first identifier sent to said user security apparatus and said identifier of said key storage apparatus; and

    a data key recovery response step of partially decrypting said data key encrypted by said public key of a user and contained in said enveloped data by means of said split secret keys of said key storage apparatuses, wherein said data recovery response step includes a step of using said calculated second identifier to search for said split secret key kept in said key storage apparatus in custody.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×