The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 10, 2015

Filed:

Mar. 07, 2014
Applicant:

Cryptography Research, Inc., San Francisco, CA (US);

Inventors:

Paul C. Kocher, San Francisco, CA (US);

Pankaj Rohatgi, Los Altos, CA (US);

Joshua M. Jaffe, San Francisco, CA (US);

Assignee:

Cryptography Research, Inc., San Francisco, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/32 (2006.01); H04L 9/00 (2006.01); H04L 9/08 (2006.01); G06F 21/60 (2013.01); G06F 12/14 (2006.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
H04L 9/0894 (2013.01); G06F 21/602 (2013.01); H04L 9/003 (2013.01); H04L 9/085 (2013.01); H04L 9/088 (2013.01); H04L 9/3236 (2013.01); H04L 9/3247 (2013.01); G06F 12/1408 (2013.01); G06F 2221/2107 (2013.01); H04L 63/0428 (2013.01); H04L 63/0869 (2013.01); H04L 2463/061 (2013.01); H04L 2209/38 (2013.01); H04L 2209/56 (2013.01);
Abstract

Techniques usable by devices to encrypt and decrypt sensitive data to in a manner that provides security from external monitoring attacks. The encrypting device has access to a base secret cryptographic value (key) that is also known to the decrypting device. The sensitive data are decomposed into segments, and each segment is encrypted with a separate encryption key derived from the base key and a message identifier to create a set of encrypted segments. The encrypting device uses the base secret cryptographic value to create validators that prove that the encrypted segments for this message identifier were created by a device with access to the base key. The decrypting device, upon receiving an encrypted segments and validator(s), uses the validator to verify the message identifier and that the encrypted segment are unmodified, then uses a cryptographic key derived from the base key and message identifier to decrypt the segments.


Find Patent Forward Citations

Loading…