Cryptography – Key management
Reexamination Certificate
2011-07-12
2011-07-12
Chai, Longbit (Department: 2431)
Cryptography
Key management
C380S278000, C380S279000, C380S280000, C380S281000, C380S282000, C713S169000, C713S170000, C713S171000, C713S172000, C713S173000, C726S027000, C726S028000, C726S029000, C726S030000
Reexamination Certificate
active
07978856
ABSTRACT:
Methods of managing a key cache are provided. One method may include determining whether a given key has previously been loaded to a trusted platform module (TPM), loading the given key to the TPM and generating a key cache object corresponding to the given key if the determining step determines the given key has not previously been loaded to the TPM and restoring the given key to the TPM based on the key cache object corresponding to the given key if the given key has previously been loaded. Another method may include extracting a key from a TPM if the TPM does not have sufficient memory to load a new key, the extracted key corresponding to a least frequently used key cache object within the TPM. Another method may include restoring a key to a TPM, the restored key having been previously loaded to and extracted from the TPM.
REFERENCES:
patent: 2002/0059286 (2002-05-01), Challener
patent: 2005/0235141 (2005-10-01), Ibrahim et al.
patent: 2007/0168048 (2007-07-01), Allen et al.
patent: 2007/0192592 (2007-08-01), Goettfert et al.
patent: 1020050063669 (2005-06-01), None
Cho Kyung-min
Park Jong-il
Chai Longbit
Harness Dickey & Pierce
Samsung Electronics Co,. Ltd.
LandOfFree
Methods of managing a key cache does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Methods of managing a key cache, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods of managing a key cache will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2740830