Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication and splitting system and method for replacing encryption keys

A key and key pair technology, applied in the field of keys in replacement encryption systems

Active Publication Date: 2016-06-01
QUALCOMM INC
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This approach suffers from the drawback of requiring the owner to have both the old token (old private and public key pair) and the new token (new private and public key pair), and if the device is stolen or damaged it cannot be used. then it is not possible to have both the old token and the new token

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and splitting system and method for replacing encryption keys
  • Authentication and splitting system and method for replacing encryption keys
  • Authentication and splitting system and method for replacing encryption keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Now refer to the drawings to describe various examples and configurations. In the following description, for the purpose of explanation, a large number of specific details are set forth in order to provide a comprehensive understanding of one or more aspects. However, it is obvious that such a configuration can be practiced without these specific details. In other examples, well-known structures and devices are shown in block diagram form to help describe these configurations.

[0034] As used in this application, the terms "component", "system" and the like are intended to refer to computer-related entities, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a component may be (but is not limited to) a process, a processor, an object, an executable program (executable), a thread of execution, a program, and / or a computer running on the processor. By way of illustration, both the application program running on the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a feature that facilitates secure generation and / or replacement of encryption keys. A first key pair including a first private key and a first public key is generated. A second (backup) key pair is generated comprising a second private key and a second public key. The second key pair is associated with the first private key. The second key pair is divided into shares and distributed to at least two share holders. When the first key pair is to be replaced, the second key pair is regenerated and at least a portion of the allocated shares is used to verify the second key pair. A trust level is associated with the second key pair corresponding to the trust level of the first key pair. The first key pair may be invalidated immediately after the second key pair is verified. Further configuration provides for the generation of additional spare key pairs.

Description

[0001] Claim priority under 35U.S.C.§119 [0002] This patent application claims the priority of the U.S. Provisional Application No. 60 / 749,718 filed on December 12, 2005, entitled “Certify and Split System and Method for Replacing Cryptographic Keys”, and said The US provisional application is assigned to the assignee of this application and is specifically incorporated herein by reference. Technical field [0003] The following description relates generally to data protection, and more specifically, to the replacement of keys in an encryption system. Background technique [0004] People who want to deliberately change the data and / or use the data for their own purposes can intercept digitally transmitted information. As a result, digitally transmitted information is often encrypted and verified to ensure that the sent information reaches its destination in a form substantially similar to the form in which it was sent, and also to verify and / or identify the originator. [0005] Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G06F21/31G06F21/33G06F21/60G06F21/62
CPCH04L9/085H04L9/3268G06F21/34G06F21/602G06F21/77H04L9/0891H04L9/32H04L9/30H04L9/08
Inventor 亚历山大·甘特曼格雷戈里·戈登·罗斯
Owner QUALCOMM INC