×

Cryptographic token with leak-resistant key derivation

  • US 9,852,572 B2
  • Filed: 09/26/2011
  • Issued: 12/26/2017
  • Est. Priority Date: 07/02/1998
  • Status: Expired due to Fees
First Claim
Patent Images

1. A portable cryptographic hardware token for deriving cryptographic authentication codes for securing transactions, said token operable to limit the number of times secret keys are used, thereby providing protection against external monitoring attacks, comprising:

  • (a) a memory configured to store a value for each of a plurality of keys, each of said plurality of keys associated with a different one of a plurality of levels, said plurality of keys comprising a top-level key, a plurality of intermediate-level keys, and a lowest-level key, said plurality of intermediate-level keys comprising at leasta second-to-lowest level key,a third-to-lowest level key, anda fourth-to-lowest level key;

    (b) a processor configured to perform a key update operation, wherein said key update operation comprisescommunicating with said memory,receiving as an input from said memory a stored value of one of said keys at a particular one of said plurality of levels, andoperating on said received key value using a block cipher to generate a value for a key one level below said particular level; and

    (c) a timer;

    wherein said processor is further configured to use said key update operation and said timer to periodically derive new key values comprising;

    (i) at least one new value for said lowest-level key, where said stored value of said second-to-lowest level key is an input to said key update operation;

    (ii) at least one new value for said second-to-lowest level key, where said stored value of said third-to-lowest level key is an input to said key update operation, and where said at least one new value for said second-to-lowest level key is derived after deriving said at least one new value for said lowest-level key; and

    (iii) at least one new value for said third-to-lowest level key, where said stored value of said fourth-to-lowest level key is an input to said key update operation, and where said at least one new value for said third-to-lowest level key is derived after deriving said at least one new value for said second-to-lowest level key;

    and wherein said token is operable to secure a transaction with a server based on a value derived from said at least one new value for said lowest-level key.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×