Method and apparatus for the secure transfer of objects between

Cryptography – Key management – Having particular key generator

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 47, 380257, 705 53, 705 54, H04K 900

Patent

active

061447447

ABSTRACT:
Objects such as master keys or object protection keys that are kept in a protected environment of a crypto module are securely transferred between modules by means of transport keys. The transport keys are generated by public key procedures and are inaccessible outside the modules. Master keys are encrypted under the transport key within the protected environment of the source module, transmitted in encrypted form to the target module, and decrypted with the transport key within the protected environment of the target module. Object protection keys that are encrypted under a first master key kept in the protected environment of the source module are decrypted with the first master within the protected environment of the source module before being encrypted under the transport key. The object protection keys are encrypted under a second master key within the protected environment of the target module after being decrypted with the transport key. The procedure is secure since the transport key, the master keys and the object protection keys are never made available outside the protected environments of the crypto modules.

REFERENCES:
patent: 4405829 (1983-09-01), Rivest et al.
patent: 4755940 (1988-07-01), Brachtl et al.
patent: 5313521 (1994-05-01), Torii et al.
patent: 5572590 (1996-11-01), Chess
patent: 5796830 (1998-08-01), Johnson et al.
patent: 5850444 (1998-12-01), Rune
"Applied Cryptography" Second Edition, Protocols, Algorithms and Source Code in C, by B. Schneier, 1996, pp. 466-471.
"Efficient Methods for Two Party Entity Authentication and Key Exchange in a High Speed Environment" by E. Basturk et al., IBM Technical Disclosure Bulletin, vol. 38, No. 03, Mar. 1995.
"Message Replay Prevention Using a Previously Transmitted Random Number To Sequence The Messages" by W. C. Martin, IBM Technical Disclosure Bulletin, vol. 27, No. 3, Aug. 1984.
"Personal Verification and Message Authentication Using Personal Keys" by R. E. Lennon et al., IBM Technical Disclosure Bulletin, vol. 24, No. 12, May 1982.
"SNA Bind Security Enhancement" by R. E. Lennon et al., IBM Technical Disclosure Bulletin, vol. 26, No. 10A, Mar. 1984.
"Transaction Incrementing Message Authentication Key" by W. D. Hopkins, IBM Technical Disclosure Bulletin, vol. 26, No. 1, Jun. 1983.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for the secure transfer of objects between does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for the secure transfer of objects between , we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for the secure transfer of objects between will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1649311

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.