Claims
- 1. A method of accessing encrypted data, wherein the encrypted data is stored on a first secured system and a key usable for decrypting the encrypted data is stored on a second secured system and wherein the first secured system maintains a private key of a first secured system key pair, the method comprising:
obtaining a one-time key pair at the first secured system; generating a request for the key including at least a public key of the one-time key pair; signing the request with a private key of the first secured system; sending the request to the second secured system; responding to the request with a response, wherein the response includes at least the key requested by the first secured system, encrypted using the one-time public key provided in the request; decrypting at least a part of the response using the one-time private key, so as to obtain the key; and using at least the key provided as part of the response to decrypt the encrypted data.
- 2. The method of claim 1, wherein the first secured system is a key server client and second secured system is a key server.
- 3. The method of claim 1, wherein the second secured system is a key server serving a plurality of first secured systems.
- 4. The method of claim 1, wherein obtaining the one-time key pair at the first secured system comprises generating one-time key pair at the first secured system.
- 5. The method of claim 1, wherein the encrypted data comprises a plurality of private keys.
- 6. A secured system on which encrypted data is maintained and decryptable using a key stored on a remote system, the secured system comprising:
storage for a private key of a secured system key pair; logic for generating or obtaining a one-time key pair; logic for generating a request for the key including at least a public key of the one-time key pair; logic for signing the request with the private key of the secured system key pair; logic for processing a response from the remote system to the request, including logic to obtain the key from the request using the private key of the one-time key pair; and a decryptor that decrypts the encrypted data using key provided by the remote system, whereby the remote system is authenticated based on whether the key provided by the remote system results in a correct decryption of the encrypted data.
- 7. A secured key server, wherein keys for a plurality of key clients are maintained, the secured key server comprising:
a database of keys, wherein each key is associated with a key client; a communications module for receiving key requests that include one-time public keys and that are signed by a key client; logic for authenticating the key client based on a public key of the key client; logic for encrypting a response that includes the requested key and that is encrypted using the one-time public key; and logic for sending the response to the requesting key client.
CROSS-REFERENCES TO RELATED APPLICATIONS
[0001] The present application claims priority from and is a non-provisional application of U.S. Provisional Application No. 60/274,457, entitled “METHOD AND APPARATUS FOR CRYPTOGRAPHIC KEY STORAGE USING A VERIFIER AND ACCOMMODATING KEY USERS THAT OPERATE INDEPENDENTLY OF THE VERIFIER” filed Mar. 9, 2001, the entire contents of which are herein incorporated by reference for all purposes.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60274457 |
Mar 2001 |
US |