Method of implementing a key recovery system

Cryptography – Communication system using cryptography – Symmetric key cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S286000, C380S044000, C713S176000

Reexamination Certificate

active

06654465

ABSTRACT:

COPYRIGHT NOTICE
A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to a method of encryption key recovery on an integrated circuit, and more particularly relates to a method of establishing a trusted key relationship with an authorized party which allows a user to recover an encryption key in a secure manner.
2. Description of the Prior Art
Key recovery is typically used to retrieve a copy of a private key when the key is lost, or is unknown to an employer, or when a court order has granted a government agency the right to monitor communication traffic. A lost key results in lost data because without the key, the encrypted data cannot be decrypted. A disk holding the key may be lost or a hardware failure may result in a lost key. A user needs to have the ability to recover a lost key. An employer may need to recover private keys generated by former or disgruntled employees to retrieve corporate information. A government authority may need a private key to observe an encrypted data transmission when there is a suspicion of criminal activity. The typical method of key recovery includes sending a wrapped copy of the private key with each transmission. Then under the appropriate circumstances, this key may be unwrapped with a recovery key.
OBJECTS AND SUMMARY OF THE INVENTION
It is an object of the present invention to provide a method of creating a recovery key encryption key (RKEK) in a secure manner so that only an authorized party can own the RKEK.
It is another object of the present invention to create an RKEK for wrapping keys used in an encryption process, and for recovering the encryption key and decrypting data at a later date.
In accordance with one form of the present invention, a method of generating a recovery key encryption key (RKEK) in a secure manner by an integrated circuit (IC) and a key recovery escrow agent includes the steps of generating by the IC a first number having a private component and a public component, and generating by the escrow agent a second number having a private component and a public component. The method further includes the steps of providing the public component of the first number to the escrow agent, and providing the public component of the second number to the IC.
Then, a Diffie-Hellman modulo-exponentiation mathematical operation is performed by the IC using the private component of the first number, and the public component of the second number to create the RKEK. Also, the escrow agent performs a similar operation, that is, a Diffie-Hellman modulo-exponentiation mathematical operation using the private component of the second number, and the public component of the first number to create the RKEK at its end.
These and other objects, features and advantages of the present invention will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawing.


REFERENCES:
patent: 4987595 (1991-01-01), Marino, Jr. et al.
patent: 5448045 (1995-09-01), Clark
patent: 5539828 (1996-07-01), Davis
patent: 5557346 (1996-09-01), Lipner et al.
patent: 5623545 (1997-04-01), Childs et al.
patent: 5631960 (1997-05-01), Likens et al.
patent: 5721777 (1998-02-01), Blaze
patent: 5857022 (1999-01-01), Sudia
patent: 6278782 (2001-08-01), Ober et al.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of implementing a key recovery system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of implementing a key recovery system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of implementing a key recovery system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3120801

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.