Claims
- 1. A method of managing the use of keys in a cryptographic co-processor, which comprises the steps of:
selecting a key from one of a symmetrical key type and an asymmetrical key type; selecting a bit length from the selected key; generating the key; and representing the key in one of an external form and an internal form.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application is based on Provisional Patent Application Serial Nos. 60/059,082 and 60/059,839, each of which was filed on Sep. 16, 1997, and relates to U.S. patent application entitled “Cryptographic Co-Processor” filed concurrently herewith, the disclosures of which are incorporated herein by reference.
Provisional Applications (2)
|
Number |
Date |
Country |
|
60059082 |
Sep 1997 |
US |
|
60059839 |
Sep 1997 |
US |
Continuations (1)
|
Number |
Date |
Country |
Parent |
09154133 |
Sep 1998 |
US |
Child |
09897666 |
Jul 2001 |
US |