Great research starts with great data.

Learn More
More >
Patent Analysis of

Cryptographic key loader embedded in removable data cartridge

Updated Time 12 June 2019

Patent Registration Data

Publication Number

US10002257

Application Number

US14/817485

Application Date

04 August 2015

Publication Date

19 June 2018

Current Assignee

GE AVIATION SYSTEMS LLC

Original Assignee (Applicant)

GE AVIATION SYSTEMS LLC

International Classification

G06F21/00,G06F21/60,G06F21/62,H04L9/08,G06F21/72

Cooperative Classification

G06F21/602,G06F21/34,G06F21/62,G06F21/72,H04L9/0827

Inventor

ANTHONY, DEVEN J.,CREECH, JOHN JARED

Patent Images

This patent contains figures and images illustrating the invention and its embodiment.

US10002257 Cryptographic key loader embedded 1 US10002257 Cryptographic key loader embedded 2 US10002257 Cryptographic key loader embedded 3
See all images <>

Abstract

Systems and methods using a cryptographic key loader embedded in a removable data storage device are provided. In one embodiment, the removable data storage device can include a dedicated key memory storing one or more cryptographic keys for cryptographic processing of data by a host system. The removable data storage device can further include a dedicated data memory storing data subject to cryptographic processing by the host system. When the removable data cartridge is interfaced with the host system, the cryptographic key(s) and the data subject to cryptographic processing can become accessible to host system.

Read more

Claims

1. A removable data storage device, comprising: a key memory disposed within a housing, the key memory storing one or more cryptographic keys for use by a host system in cryptographic processing of data; a data memory disposed within the housing, the data memory storing data subject to cryptographic processing by the host system; at least one connector configured to be removably engaged with the host system; a key memory interface in communication with the key memory and configured to communicate the one or more cryptographic keys to the host system via the at least one connector according to a first protocol; a data memory interface in communication with the data memory and configured to communicate data for cryptographic processing by the host system via the at least one connector according to a second protocol; a cryptographic key configuration (CKC) database, the cryptographic key configuration (CKC) database comprising a load script for loading the one or more cryptographic keys to the host system; and a key loader, the key loader configured to load the one or more cryptographic keys for use by the host system in response to a request from the host system, wherein the first protocol comprises a DS-101 or DS-102 protocol.

2. The removable data storage device of claim 1 further comprising; a terminal, the terminal comprising a user account database, a cryptographic ignition key (CIK) identifier database, a cryptographic key database, and a cryptographic unit identifier database; and one or more removable data cartridges for interfacing with the terminal, wherein the one or more cryptographic keys are configured for encrypting or decrypting data by the host system.

3. The removable data storage device of claim 2, wherein the data subject to cryptographic processing by the host system is not accessible via the at least one connector at the same time as the one or more cryptographic keys.

4. The removable data storage device of claim 2, wherein the at least one connector comprises one or more first pins and one or more second pins, the one or more cryptographic keys stored in the key memory accessible via the one or more first pins, the data subject to cryptographic processing stored in the data memory accessible via the one or more second pins.

5. The removable data storage device of claim 1, wherein key loader, when implemented by one or more processors, causes the removable data storage device to load the one or more cryptographic keys to the host system via the key memory interface, and wherein the terminal includes one or more processors and one or more memory devices storing computer-readable instructions.

6. The removable data storage device of claim 1, wherein the second protocol comprises a USB protocol.

7. The removable data storage device of claim 1, further comprising a cryptographic ignition key device configured to authenticate a user of the host system.

8. The removable data storage system of claim 7, wherein the host system comprises an avionic data transfer system associated with an aircraft, the avionic data transfer system having one or more cryptographic units, wherein the one or more cryptographic keys are automatically transferred to the host system when the removable data storage device is engaged with the host system, and wherein the host system automatically distributes the one or more cryptographic keys to the one or more cryptographic units based on header data associated with the one or more cryptographic keys.

9. A method of transferring data to a data transfer system, the method comprising: engaging a removable data storage device with a host system via at least one connector associated with the removable data storage device, the removable data storage device comprising a key memory storing one or more cryptographic keys for use in cryptographic processing by the host system, the removable data storage device further comprising a data memory storing data subject to cryptographic processing by the host system; transferring, by the removable data storage device, the one or more cryptographic keys to the host system from the key memory via a key memory interface according to a first protocol; and transferring, by the removable data storage device, the data subject to cryptographic processing to the host system from the data memory via a data memory interface according to a second protocol, wherein the first protocol comprises a DS-101 or DS-102 protocol, wherein the one or more cryptographic keys are automatically transferred to the host system when the removable data storage device is engaged with the host system, and wherein the key loader is configured to load the one or more cryptographic keys for use by the host system in response to a request from the host system.

10. The method of claim 9, wherein the method further comprises: loading data subject to cryptographic processing by a host system to the data memory associated with the removable data storage device; and loading one or more cryptographic keys for cryptographic processing to the key memory associated with the removable data storage device.

11. The method of claim 9, wherein the method further comprises encrypting or decrypting the data subject to cryptographic processing at the host system based at least in part on the one or more cryptographic keys.

12. The method of claim 9, wherein the one or more cryptographic keys are transferred to the host system via the at least one connector separately from the data subject to cryptographic processing.

13. The method of claim 9, wherein the one or more cryptographic keys are transferred to the host system via one or more first pins of the at least one connector and the data subject to cryptographic processing is transferred to the host system via one or more second pins of the at least one connector.

14. The method of claim 9, wherein the one or more cryptographic keys are automatically transferred to the host system when the removable data storage device is engaged with the host system.

15. A cryptographic system for an aircraft, comprising a removable data storage device, the removable data storage device comprising at least one connector and a key memory storing one or more cryptographic keys, the removable data storage device further comprising a data memory storing data subject to cryptographic processing; an avionic data transfer system having one or more cryptographic units, the avionic data transfer system configured to be engaged with the at least one connector of the removable data storage device; a cryptographic ignition key device configured to authenticate a user of the host system; and a cryptographic key configuration (CKC) database, the cryptographic key configuration (CKC) database comprising a load script for loading the one or more cryptographic keys to the host system, wherein when the removable data storage device is engaged with the avionic data transfer system, the removable data storage device is configured to transfer the one or more cryptographic keys to a host system of the avionic data transfer system for use by the one or more cryptographic units in cryptographic processing of data via a key memory interface according to a first protocol, the removable data storage device further configured to transfer the data subject to cryptographic processing to a host system of the avionic data transfer system for cryptographic processing by the one or more cryptographic units using the one or more cryptographic keys via a data memory interface according to a second protocol, and wherein the first protocol comprises a DS-101 or DS-102 protocol.

16. The cryptographic system of claim 15 further comprising; a terminal comprising one or more processors and one or more memory devices storing computer-readable instructions; and one or more removable data cartridges for interfacing with the terminal, wherein the at least one connector comprises one or more first pins and one or more second pins, the one or more cryptographic keys stored in the key memory accessible via the one or more first pins, the data subject to cryptographic processing by the host system stored in the data memory being accessible via the one or more second pins.

17. The cryptographic system of claim 15, wherein the removable data storage device comprises a key loader that when implemented by one or more processors causes the removable data storage device to load the one or more cryptographic keys to the host system via the key memory interface.

18. The cryptographic system of claim 17, wherein the data subject to cryptographic processing comprises aviation data.

Read more

Claim Tree

  • 1
    1. A removable data storage device, comprising:
    • a key memory disposed within a housing, the key memory storing one or more cryptographic keys for use by a host system in cryptographic processing of data
    • a data memory disposed within the housing, the data memory storing data subject to cryptographic processing by the host system
    • at least one connector configured to be removably engaged with the host system
    • a key memory interface in communication with the key memory and configured to communicate the one or more cryptographic keys to the host system via the at least one connector according to a first protocol
    • a data memory interface in communication with the data memory and configured to communicate data for cryptographic processing by the host system via the at least one connector according to a second protocol
    • a cryptographic key configuration (CKC) database, the cryptographic key configuration (CKC) database comprising a load script for loading the one or more cryptographic keys to the host system
    • and a key loader, the key loader configured to load the one or more cryptographic keys for use by the host system in response to a request from the host system, wherein the first protocol comprises a DS-101 or DS-102 protocol.
    • 2. The removable data storage device of claim 1 further comprising;
      • a terminal, the terminal comprising a user account database, a cryptographic ignition key (CIK) identifier database, a cryptographic key database, and a cryptographic unit identifier database
      • and one or more removable data cartridges for interfacing with the terminal, wherein the one or more cryptographic keys are configured for encrypting or decrypting data by the host system.
    • 5. The removable data storage device of claim 1, wherein
      • key loader, when implemented by one or more processors, causes the removable data storage device to load the one or more cryptographic keys to the host system via the key memory interface, and wherein
    • 6. The removable data storage device of claim 1, wherein
      • the second protocol comprises
    • 7. The removable data storage device of claim 1, further comprising
      • a cryptographic ignition key device configured to authenticate a user of the host system.
  • 9
    9. A method of transferring data to a data transfer system, the method comprising:
    • engaging a removable data storage device with a host system via at least one connector associated with the removable data storage device, the removable data storage device comprising a key memory storing one or more cryptographic keys for use in cryptographic processing by the host system, the removable data storage device further comprising a data memory storing data subject to cryptographic processing by the host system
    • transferring, by the removable data storage device, the one or more cryptographic keys to the host system from the key memory via a key memory interface according to a first protocol
    • and transferring, by the removable data storage device, the data subject to cryptographic processing to the host system from the data memory via a data memory interface according to a second protocol, wherein the first protocol comprises a DS-101 or DS-102 protocol, wherein the one or more cryptographic keys are automatically transferred to the host system when the removable data storage device is engaged with the host system, and wherein the key loader is configured to load the one or more cryptographic keys for use by the host system in response to a request from the host system.
    • 10. The method of claim 9, wherein
      • the method further comprises:
    • 11. The method of claim 9, wherein
      • the method further comprises
    • 12. The method of claim 9, wherein
      • the one or more cryptographic keys are transferred to the host system via the at least one connector separately from the data subject to cryptographic processing.
    • 13. The method of claim 9, wherein
      • the one or more cryptographic keys are transferred to the host system via one or more first pins of the at least one connector and the data subject to cryptographic processing is transferred to the host system via one or more second pins of the at least one connector.
    • 14. The method of claim 9, wherein
      • the one or more cryptographic keys are automatically transferred to the host system when the removable data storage device is engaged with the host system.
  • 15
    15. A cryptographic system for an aircraft, comprising
    • a removable data storage device, the removable data storage device comprising at least one connector and a key memory storing one or more cryptographic keys, the removable data storage device further comprising a data memory storing data subject to cryptographic processing
    • an avionic data transfer system having one or more cryptographic units, the avionic data transfer system configured to be engaged with the at least one connector of the removable data storage device
    • a cryptographic ignition key device configured to authenticate a user of the host system
    • and a cryptographic key configuration (CKC) database, the cryptographic key configuration (CKC) database comprising a load script for loading the one or more cryptographic keys to the host system, wherein when the removable data storage device is engaged with the avionic data transfer system, the removable data storage device is configured to transfer the one or more cryptographic keys to a host system of the avionic data transfer system for use by the one or more cryptographic units in cryptographic processing of data via a key memory interface according to a first protocol, the removable data storage device further configured to transfer the data subject to cryptographic processing to a host system of the avionic data transfer system for cryptographic processing by the one or more cryptographic units using the one or more cryptographic keys via a data memory interface according to a second protocol, and wherein the first protocol comprises a DS-101 or DS-102 protocol.
    • 16. The cryptographic system of claim 15 further comprising;
      • a terminal comprising one or more processors and one or more memory devices storing computer-readable instructions
      • and one or more removable data cartridges for interfacing with the terminal, wherein the at least one connector comprises one or more first pins and one or more second pins, the one or more cryptographic keys stored in the key memory accessible via the one or more first pins, the data subject to cryptographic processing by the host system stored in the data memory being accessible via the one or more second pins.
    • 17. The cryptographic system of claim 15, wherein
      • the removable data storage device comprises
See all independent claims <>

Description

FIELD OF THE INVENTION

The present subject matter relates generally to cryptographic processing of data.

BACKGROUND OF THE INVENTION

Cryptographic systems can include cryptographic equipment used for the processing and transfer of secure data. For instance, data transfer systems, such as avionic data transfer systems used in aviation systems for aircraft, can include cryptographic equipment used to receive and transfer secure data among various devices. Cryptographic systems typically require one or more cryptographic keys and/or other cryptographic variables to be loaded into the system to allow the cryptographic processing of data. In addition, cryptographic equipment can require the presence of a cryptographic ignition key (CIK) for user authentication.

Cryptographic processing of data can require loading one or more cryptographic keys into cryptographic equipment using a dedicated key loading interface, such as a DS-101 keyfill interface. For instance, a dedicated key loading device can be loaded with key material for cryptographic processing at a remote terminal or other system. The dedicated key loading device can be transported to the data transfer system and interfaced with the cryptographic equipment via the dedicated key loading interface to load the keys into the cryptographic equipment. Data to be processed for the data transfer system, such as aviation data, may have to be separately loaded to the data transfer system using a removable data storage device or other transfer mechanism. As a result, both the key loader device and the storage device may both have to be separately interfaced with the cryptographic system for cryptographic processing of data.

BRIEF DESCRIPTION OF THE INVENTION

Aspects and advantages of embodiments of the present disclosure will be set forth in part in the following description, or may be learned from the description, or may be learned through practice of the embodiments.

One example aspect of the present disclosure is directed to a removable data storage device. The removable data storage device includes a key memory disposed within a housing. The key memory stores one or more cryptographic keys for use by a host system in cryptographic processing data. The removable data storage device further includes a data memory disposed within the housing. The data memory stores data subject to cryptographic processing by the host system. The removable data storage device further includes at least one connector configured to be removably engaged with the host system. The removable data storage device includes a key memory interface in communication with the key memory and configured to communicate one or more cryptographic keys to the host system via the at least one connector according to a first protocol. The removable data storage device further includes a data memory interface in communication with the data memory and configured to communicate data for cryptographic processing by the host system via the at least one connector according to a second protocol.

Another example aspect of the present disclosure is directed to a method of transferring data to a data transfer system. The method includes engaging a removable data storage device with a host system via at least one connector associated with the removable data storage device. The removable data storage device includes a key memory storing one or more cryptographic keys for use in cryptographic processing by the host system. The removable data storage device further includes a data memory storing data subject to cryptographic processing by the host device. The method further includes transferring, by the data storage device, the one or more cryptographic keys to the host system from the key memory via the key memory interface according to a first protocol and transferring, by the data storage device, the data subject to cryptographic processing to the host system from the data memory via a data memory interface according to a second protocol.

Yet another example aspect of the present disclosure is directed to a cryptographic system for an aircraft. The system includes a removable data storage device. The removable data storage device includes at least one connector and a key memory storing one or more cryptographic keys. The removable data storage device further includes a data memory storing data subject to cryptographic processing. The system further includes an avionic data transfer system having one or more cryptographic units. The avionic data transfer system is configured to be engaged with the at least one connector of the removable data storage device. When the removable data cartridge is engaged with the avionic data transfer system, the removable data cartridge is configured to transfer the one or more cryptographic keys for use by the one or more cryptographic units in cryptographic processing of data via a key memory interface according to a first protocol. The removable data cartridge can be further configured to transfer the data subject to cryptographic processing to the host system for cryptographic processing by the one or more cryptographic units using the one or more cryptographic keys via a data memory interface according to a second protocol.

Variations and modifications can be made to these example aspects of the present disclosure.

These and other features, aspects and advantages of various embodiments will become better understood with reference to the following description and appended claims. The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the present disclosure and, together with the description, serve to explain the related principles.

BRIEF DESCRIPTION OF THE DRAWINGS

Detailed discussion of embodiments directed to one of ordinary skill in the art are set forth in the specification, which makes reference to the appended figures, in which:

FIG. 1 depicts an example cryptographic system according to example embodiments of the present disclosure;

FIG. 2 depicts an example removable data cartridge according to example embodiments of the present disclosure;

FIG. 3 depicts an example removable data cartridge according to example embodiments of the present disclosure;

FIG. 4 depicts the example interfacing of a removable data cartridge having an embedded cryptographic ignition key (CIK) device according to example embodiments of the present disclosure;

FIG. 5 depicts an example removable data cartridge having an embedded CIK device according to example embodiments of the present disclosure;

FIG. 6 depicts an example removable data cartridge having a key memory and an embedded CIK device according to example embodiments of the present disclosure;

FIG. 7 depicts an example avionic data transfer system according to example embodiments of the present disclosure;

FIG. 8 depicts a representation of an example cryptographic key configuration (CKC) according to example embodiments of the present disclosure;

FIG. 9 depicts an example terminal for generating a CKC according to example embodiments of the present disclosure; and

FIG. 10 depicts a flow diagram of an example method according to example embodiments of the present disclosure.

DETAILED DESCRIPTION OF THE INVENTION

Reference now will be made in detail to embodiments of the invention, one or more examples of which are illustrated in the drawings. Each example is provided by way of explanation of the invention, not limitation of the invention. In fact, it will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the scope or spirit of the invention. For instance, features illustrated or described as part of one embodiment can be used with another embodiment to yield a still further embodiment. Thus, it is intended that the present invention covers such modifications and variations as come within the scope of the appended claims and their equivalents.

Example aspects of the present disclosure are directed to a cryptographic key loader embedded in a removable data storage device. In one embodiment, one or more cryptographic keys for cryptographic processing of data and the method by which one or more cryptographic keys are made accessible to cryptographic equipment are embedded inside a removable data cartridge. When the removable data cartridge is interfaced with a host system, the cryptographic key(s) can become accessible to cryptographic equipment connected to the host system via an electrical interface (e.g., SPI, I2C, or USB). The removable data storage device can further store data subject to cryptographic processing (e.g., aviation data) for transfer to the host system.

In this way, example aspects of the present disclosure can simplify the cryptographic processing of data by allowing both the cryptographic key(s) and the data subject to cryptographic processing to be loaded onto a removable data storage device at a single location. The removable data storage device can be then interfaced with a host system, for instance, by engaging the removable data storage device with the host system (e.g., inserting the removable data storage device into a suitable receptacle, slot, or connection at the host system). The cryptographic key(s) can be loaded into the host system either through user interaction with a user interface or automatically by the host system. The data subject to cryptographic processing can then be transferred to the host system for cryptographic processing by the cryptographic equipment.

As an example, one or more cryptographic key(s) and aviation data can be loaded into a removable data cartridge at a terminal associated with an administrator. The removable data cartridge can be transported to an aircraft and inserted into an appropriate receptacle of an avionic data transfer system located on an aircraft. The data transfer system can include one or more cryptographic units. The one or more cryptographic key(s) can be loaded to the data transfer system for use by the cryptographic units. The aviation data can then be transferred to the data transfer system from the removable data cartridge for cryptographic processing by the cryptographic equipment. As used herein, aviation data can include any data for use by aircraft systems during aviation, such as mission or flight data.

A technical effect of example aspects of the present disclosure is that a host system with cryptographic processing capability does not need a discrete dedicated key fill interface for receiving cryptographic keys, reducing overall size and weight of the device. In addition, the key loading process can be combined with the process of data cartridge loading, and the key loading process can be automated with the insertion of a single removable data cartridge. This can greatly simplify the cryptographic processing of data in a host system, such as an avionic data transfer system associated with an aircraft.

Example aspects of the present disclosure are discussed with reference to avionic data transfer systems associated with an aircraft for purposes of illustration and discussion. Those of ordinary skill in the art, using the disclosures provided herein, will understand that the subject matter described herein can be used with other cryptographic systems without deviating from the scope of the present disclosure.

FIG. 1 depicts an example cryptographic system 100 according to example embodiments of the present disclosure. As shown the cryptographic system 100 includes a host system 110, a terminal 120, and one or more removable data cartridges 130 used to transfer information to the host system 110. The host system 110 can be a data transfer system associated with one or more cryptographic units 115. Each cryptographic unit 115 can include one or more processors configured to cryptographically process (e.g., encrypt/decrypt) data using various encryption algorithms and/or perform other cryptographic functions. In some embodiments, the host system 115 can be a data transfer system associated with an avionic data transfer system associated with an aircraft. In some embodiments, the host system 110 can include a plurality of cryptographic units 115 in communications with each other over a network, such as an aircraft communication bus (e.g., ARINC-429 or MIL-STD-1553) or other network connection (e.g., Ethernet).

Each cryptographic unit 115 can require one or more cryptographic keys or other cryptographic variables (e.g., frequency hopping tables) to enable the cryptographic processing of data. In addition, each cryptographic unit 115 can require the presence of a cryptographic ignition key (CIK) for authorized user authentication. The cryptographic unit 115 can require a CIK to be interfaced with the cryptographic unit 115 before undertaking the cryptographic processing of data.

The system 100 includes one or more removable data cartridges 130. Each removable data cartridge 130 can be a removable data storage device. The one or more removable data cartridges 130 can be used to transfer data subject to cryptographic processing to the host system 110. In one embodiment, secure aviation data for an aviation system can be transferred from the terminal 120 to one or more cryptographic units 115 of the host system 110 using the removable data cartridges 130.

For example, the one or more removable data cartridges 130 can be interfaced with terminal 120 located at site A. Information, including aviation data and/or cryptographic key configuration (CKC) data, can be transferred to the removable data cartridge(s) 130 at the terminal. The data transferred to the removable data cartridge(s) 130 can include both encrypted (“black”) data as well as unencrypted (“red”) data.

The removable data cartridge(s) 130 can be transported to site B to the location of the host system 110. For instance, in one embodiment, the removable data cartridge(s) 130 can be transported to the location of an aircraft. The removable data cartridge(s) 130 can be interfaced with the host system 110. According to example aspects of the present disclosure, the removable data cartridge(s) 130 can transfer data subject to cryptographic processing (e.g., the secure aviation data) to the host system 110. In some embodiments, the removable data cartridge(s) 130 can transfer one or more cryptographic keys (e.g., as a key fill device) to the host system 110. In some embodiments, the removable data cartridge(s) 130 can include an embedded CIK for user authentication.

FIG. 2 depicts an example removable data cartridge 130 according to example embodiments of the present disclosure. The removable data cartridge 130 can include a housing 205 to house and protect various internal components of the removable data cartridge 130. As shown in FIG. 2, the removable data cartridge 130 includes a dedicated key memory 210 and a dedicated data memory 220 that is separate from the key memory 210 within the housing 205. The key memory 210 can store one or more cryptographic keys 215 for use by a host system (e.g., host system 110 of FIG. 1) in cryptographic processing of data. The data memory 220 can store data subject to cryptographic processing 225 (e.g., secure aviation data). The data memory 220 can include both encrypted and decrypted data. In some embodiment, the data memory 220 does not store data (e.g., one or more cryptographic keys) that is used in cryptographic processing of the data by one or more cryptographic units associated with a host system.

As shown, the removable data cartridge 130 includes at least one connector 230. The connector 230 can be interfaced with an external device (e.g., a terminal or host system) by engaging the connector 230 with a suitable slot, socket, receptacle, or connection located on the external device to provide a mechanical and electrical connection with the external device. In the example embodiment shown in FIG. 2, the connector 230 can include first pins 232 and second pins 234. The first pins 232 and second pins 234 can be part of the same connector or separate connectors. In one embodiment, the first pins 232 can be a U-229 6-pin connector type used to transfer information using one or more serial protocols. The second pins 234 can include one or more pins arranged for a USB (universal serial bus) plug connection or similar connection.

The removable data cartridge 130 of FIG. 2 includes a key memory interface 212. The key memory interface 212 can communicate one or more cryptographic keys 215 stored in the key memory 210 using the first pins 232 of the connector(s) 230 according to a first protocol. The first protocol can be a serial protocol suitable for the transfer of cryptographic keys, such as a serial protocol used by key fill devices. As an example, the first protocol can be a DS-101 or DS-102 protocol used for the transfer of key material. Other suitable protocols can be used as the first protocol without deviating from the scope of the present disclosure, such as a USB protocol, I2C protocol, SPI protocol, or other suitable protocol.

The removable data cartridge 130 of FIG. 2 further includes a data memory interface 222 that is separate from the key memory interface 212. The data memory interface 222 can communicate data subject to cryptographic processing 225 stored in the data memory 220 using second pins 234 of the connector(s) 230 using a second protocol. In some embodiments, the second protocol can be different from the first protocol. The second protocol can be, for instance, a serial protocol suitable for the transfer of data subject to cryptographic processing 225, such as a USB protocol, I2C protocol, SPI protocol, or other suitable protocol.

In some embodiments, the removable data cartridge 130 can include a key loader 218. The key loader 218 can include computer-readable instructions that when executed by one or more processors (e.g., processors associated with the removable data cartridge or an external device) cause the one or more processors to perform operations. The operations can include loading the one or more cryptographic keys 215 stored in the key memory 210 to the host system via the key memory interface 212 according to the first protocol (e.g., a DS-101 or DS-102 protocol). In some embodiments, the key loader 218 can automatically load the one or more cryptographic keys 215 to the host system when the removable data cartridge 130 is interfaced with the host system. In other embodiments, the key loader 218 can transfer the one or more cryptographic keys 215 in response to a request (e.g., as a result of a user input via a user interface) to transfer the one or more cryptographic keys 215.

FIG. 3 depicts a removable data cartridge 130 according to another example embodiment of the present disclosure. The removable data cartridge 130 of FIG. 3 is similar to the removable data cartridge 130 of FIG. 2 except that the removable data cartridge 130 of FIG. 3 includes a connector 240 having one set of pins 242 for communicating both the one or more cryptographic keys 215 and the data subject to cryptographic processing 225. The pins 242 can have any suitable configuration, such as a U-229 6-pin connector configuration, a USB (universal serial bus) plug configuration, or other suitable configuration.

The key memory 210 can be separately accessible via the pins 242 of the connector 240 relative to the data memory 220. More particularly, the one or more cryptographic keys 215 stored in the key memory 210 may not be accessible by the one or more pins 242 of the connector 240 at the same time as the data subject to cryptographic processing 225 stored in the data memory 220. In one embodiment, the one or more cryptographic keys 215 stored in the key memory 210 can be first transferred via the key memory interface 212 according to a first protocol. Subsequent to the transfer of the one or more cryptographic keys 215, the data subject to cryptographic processing 225 can be transferred via the data memory interface 222 via a second protocol. In other embodiments, the data subject to cryptographic processing 225 can be transferred prior to the transfer of the one or more cryptographic keys 215.

According to another example aspect of the present disclosure, the removable data cartridge(s) can include an embedded CIK device for user authentication during the cryptographic processing of data. In these example embodiments, a user desiring to perform cryptographic processing of data by one or more cryptographic units of a host system can interface the removable data cartridge(s) with the host system. A CIK device embedded in the removable data cartridge can communicate a CIK to the host system for user authentication. Once a user has been authenticated, data can be processed by the host system. For instance, data transferred to the host system can be encrypted and/or decrypted using one or more cryptographic keys.

For instance, FIG. 4 depicts an example removable data cartridge 130 with an embedded CIK device 250 according to example embodiments of the present disclosure. When the removable data cartridge 130 is engaged with or otherwise interfaced with the host system 110, the CIK device 250 embedded in the removable data cartridge can communicate a CIK to the host system 110 over a suitable CIK interface. In addition, the removable data cartridge 130 can transfer data subject to cryptographic processing (e.g., planning data) to the host system 110. The CIK can be communicated by the removable data cartridge 120 over the same interface or a different interface as the data subject to cryptographic processing.

For instance, in one embodiment, the data subject to cryptographic processing and the CIK can be communicated via at least one connector on the removable data cartridge 130 that is engaged with the host system 110. In one embodiment, the data subject to cryptographic processing can be communicated via the at least one connector on the removable data cartridge 130 that is engaged with the host system 110 and the CIK can be communicated over a separate interface, such as a dedicate CIK connector or a wireless interface.

FIG. 5 depicts an example removable data cartridge 130 having an embedded CIK device according to example aspects of the present disclosure. The removable data cartridge 130 includes a housing 205 to house and protect various internal components of the removable data cartridge 130. As shown in FIG. 5, the removable data cartridge 130 includes a data memory 220. The data memory 220 can store data subject to cryptographic processing 225 (e.g., secure aviation data). The data memory 220 can include both encrypted and decrypted data. In some embodiments, the data memory 220 does not store data (e.g., one or more cryptographic keys) that is used in cryptographic processing of the data by one or more cryptographic units associated with a host system.

According to example aspects of the present disclosure, the removable data cartridge 130 includes an embedded CIK device 250. The embedded CIK device 250 can include circuitry configured to provide a CIK 255 to external devices for user authentication. For instance, a user can be associated with a particular CIK. An external device may need to receive the CIK associated with an authorized user prior to processing or communicating data. In one embodiment, the CIK device 250 can include a memory storing the CIK 255. In one embodiment, the CIK device 250 can include circuitry (e.g., a memory and transmitter) configured to wireless transmit a CIK for detection at an external device.

The removable data cartridge 130 of FIG. 5 includes at least one connector 260. The connector 260 can be interfaced with an external device (e.g., a terminal or host system) by engaging the connector with a suitable slot, receptacle, or connection located on the external device to provide a mechanical and electrical connection with the external device. In the example embodiment shown in FIG. 5, the connector 260 can include first pins 262 and second pins 264. The first pins 262 and second pins 264 can be part of the same connector or separate connectors.

The removable data cartridge 130 of FIG. 5 includes a CIK interface 252. The CIK interface 252 can communicate one or more CIKs 255 associated with the CIK device 250 using the first pins 262 of the connector(s) 260. The removable data cartridge 130 of FIG. 5 further includes a data memory interface 222 that is separate from the CIK interface 252. The data memory interface 222 can communicate data subject to cryptographic processing 225 stored in the data memory 220 using second pins 234 of the connector(s) 260.

In other embodiments, the CIK interface 252 can communicate one or more CIKs and the data memory interface 222 can communicate data subject to cryptographic processing over the same pins of connector connector(s) 260. For instance, one or more CIKs 255 can be first communicated via connector(s) 260 to an external device for user authentication. Data subject to cryptographic processing 225 can then be communicated via connector(s) 260 to the external device for cryptographic processing.

FIG. 6 depicts an example removable data cartridge 130 according to another example embodiment of the present disclosure. The removable data cartridge 130 of FIG. 6 can be a combination key fill device, data transfer device, and CIK device for use with a cryptographic system. More particularly, the removable data cartridge includes a key memory 210, a data memory 220, and a CIK device 250 all stored within the same housing 205. The key memory 210 can store one or more cryptographic keys 215 for use by a host system in cryptographic processing of data. The data memory 220 can store data subject to cryptographic processing 225 (e.g., secure aviation data). The data memory 220 can include both encrypted and decrypted data. In some embodiment, the data memory 220 does not store data (e.g., one or more cryptographic keys) that is used in cryptographic processing of the data by one or more cryptographic units associated with a host system.

The CIK device 250 can include circuitry configured to provide a CIK 255 to external devices for user authentication. In one embodiment, the CIK device 250 can include a memory storing the CIK 255. In one embodiment, the CIK device 250 can include circuitry (e.g., a memory and transmitter) configured to wireless transmit a CIK for detection at an external device.

The removable data cartridge 130 of FIG. 6 includes one or more connectors 270. The connector(s) 270 can be interfaced with an external device (e.g., a terminal or host system) by engaging the connector(s) with a suitable slot, receptacle, or connection located on the external device to provide a mechanical and electrical connection with the external device.

The removable data cartridge 130 of FIG. 6 includes a key memory interface 212. The key memory interface 212 can communicate one or more cryptographic keys 215 stored in the key memory 210 via the connector(s) 270 according to a first protocol. The first protocol can be a serial protocol suitable for the transfer of cryptographic keys, such as a serial protocol used by key fill devices. As an example, the first protocol can be a DS-101 or DS-102 protocol used for the transfer of key material. Other suitable protocols can be used as the first protocol without deviating from the scope of the present disclosure, such as a USB protocol, I2C protocol, SPI protocol, or other suitable protocol.

The removable data cartridge 130 of FIG. 6 further includes a data memory interface 222 that is separate from the key memory interface 212. The data memory interface 222 can communicate data subject to cryptographic processing 225 stored in the data memory 220 via connector(s) 270 using a second protocol. In some embodiments, the second protocol can be different from the first protocol. The second protocol can be, for instance, a serial protocol suitable for the transfer of data subject to cryptographic processing 225, such as a USB protocol, I2C protocol, SPI protocol, or other suitable protocol. The removable data cartridge 130 of FIG. 6 includes a CIK interface 252. The CIK interface 252 can communicate one or more CIKs 255 associated with the CIK device 250 using connector(s) 270. The one or more CIKs 255 can be used by the host system for user authentication.

One example host system according to example embodiments of the present disclosure can be an avionic data transfer system having a plurality of cryptographic units. According to example aspects of the present disclosure, a host device (e.g., a cryptographic unit or other device) of the avionic data transfer system can act as a key server distributing one or more cryptographic keys loaded to the host device using a removable data cartridge to the one or more cryptographic units of the avionic data transfer system

FIG. 7 depicts an example host system 110 according to example embodiments of the present disclosure. The host system 110 can be an avionic data transfer system associated with an aircraft. The host system 110 can include a plurality of cryptographic units 115. In FIG. 7, the host system 110 includes four cryptographic units 115.1, 115.2, 115.3, and 115.4. Those of ordinary skill in the art, using the disclosures provided herein, will understand that more or fewer cryptographic units 115 can be included in the host system 110 without deviating from the scope of the present disclosure.

The host system 110 includes a host device 112. The host device 112 can be a cryptographic unit configured for cryptographically processing of data. In addition and/or in the alternative, the host device 112 can be a dedicated device for interfacing with a key fill device or other external device for receiving one or more cryptographic keys. The host device 112 can include a slot, socket, receptacle, or connection to interface with an external device for loading one or more cryptographic keys to the host device 112.

In one embodiment, the host device 112 can be interfaced with a removable data cartridge 130. The removable data cartridge 130 can be any removable data cartridge according to example embodiments of the present disclosure. In one embodiment, the removable data cartridge 130 includes both a key memory storing one or more cryptographic keys and a data memory storing data subject to cryptographic processing. In this way, the removable data cartridge 130 can act as both a key fill device and a data transfer device. In some embodiments, the removable data cartridge 130 can include an embedded CIK device.

The host device 112 can be in communication with the cryptographic units 115.1, 115.2, 115.3, and 115.4 over a data bus 118. For instance, the host device 112 can be in communication with the cryptographic units 115.1, 115.2, 115.3, and 115.4 via an aircraft data bus, such as an MIL-STD-1554, ARINC-429, or other suitable data bus. In other embodiments, the host device 112 can be in communication with the cryptographic units 115.1, 115.2, 115.3, and 115.4 over an Ethernet connection or other data bus.

The host device 112 can act as a key server for the avionic data transfer system. More particularly, the host device 112 can receive one or more cryptographic keys from the removable data cartridge 130 according to example aspects of the present disclosure. The one or more cryptographic keys can include encrypted keys (“black keys”) or decrypted keys (“red keys”). The host device 112 can also receive data subject to cryptographic processing (e.g., secure aviation data) from the removable data cartridge 130. The host device 112 can use the red keys and/or can decrypt the black keys for cryptographic processing of the data received from the removable data cartridge 130. In addition, the host device 130 can distribute one or more of the red keys and/or black keys to various of the cryptographic units 115.1, 115.2, 115.3, and 115.4 for cryptographic processing of data at the cryptographic units 115.1, 115.2, 115.3, and 115.4.

In one embodiment, the host device 112 can include a user interface (e.g., a graphical user interface presented on a display associated with the host device) that allows a user to interact with the host device 112 to distribute the one or more cryptographic keys among the various cryptographic units 115.1, 115.2, 115.3, and 115.4. For example, a user can interact with the user interface to specify that a particularly cryptographic key is to be distributed to cryptographic unit 115.2. The host device 112 can then distribute the cryptographic key to the cryptographic unit 115.2 for cryptographic processing.

In one embodiment, the host device 112 can automatically distribute the one or more cryptographic keys to the cryptographic units 115.1, 115.2, 115.3, and 115.4 based on header data associated with the one or more cryptographic keys received from the removable data cartridge 130. The header data for a cryptographic key can specify a particular destination cryptographic unit for the cryptographic key. For instance, the host device 112 can receive a cryptographic key having header data specifying that the cryptographic key is for use with cryptographic unit 115.1. The host device 112 can automatically distribute the cryptographic key to cryptographic unit 115.1 for cryptographic processing of data. The header data can be associated with the cryptographic key, for instance, at a terminal used for aviation planning.

According to example embodiments of the present disclosure, a cryptographic key configuration (CKC) can be generated at a terminal for configuration of various aspects of a cryptographic system. The CKC can be stored on a removable data cartridge at the terminal and transported to a host system, such as an avionic data transfer system associated with an aircraft. The CKC can be loaded into the avionic data transfer system and used to configure various aspects of the avionic data transfer system, such as mapping of authorized users and CIKs, mapping of cryptographic keys to various cryptographic units, etc.

FIG. 8 depicts a representation of an example cryptographic key configuration (CKC) 300 according to example embodiments of the present disclosure. The CKC can include one or more of the authorized user account data 302, data 304 mapping authorized user accounts to CIKs, cryptographic key data 306, data 308 mapping cryptographic keys to one or more channels, slots, and/or cryptographic units, and/or a load script 310 for loading cryptographic keys and other information to an avionic data transfer system. In some embodiments, the CKC 300 can be a platform CKC (PCKC) that further includes data 312 indicative of cryptographic unit identifiers as well as a mapping of information to cryptographic units of an avionic data transfer system.

The authorized user account data 302 can include data identifying authorized users of the avionic data transfer system, such as individuals authorized to load and process secure aviation data into the avionic data transfer system. The data 304 can include one or more CIKs and data mapping CIKs to authorized users. The data 304 can be used by the avionic data transfer system in requiring the presence of a CIK from a CIK device (e.g., a removable data cartridge with an embedded CIK device) to authenticate an authorized user of the avionic data transfer system.

The one or more cryptographic keys 306 can be used by the host system for cryptographic processing of data (e.g., encrypting and/or decrypting data using various encryption algorithms). For instance, in one example embodiment, the one or more cryptographic keys 306 can be used to cryptographically process secure aviation data. The cryptographic keys 306 and data subject to cryptographic processing can be stored on the same removable storage device, such as a removable data cartridge having a dedicated key memory and a dedicated data memory according to example embodiments of the present disclosure.

The data 308 can be used to map cryptographic keys to various channels, slots, or cryptographic units in the host system. For instance, the data 308 can include header data associated with each of the one or more cryptographic keys. The header data for each cryptographic key can be indicative of the channel, slot, and/or cryptographic unit the cryptographic key is to be used for the cryptographic processing of data.

The load script 310 can be used to load the information from the CKC to the avionic data transfer system. In one embodiment, the load script can implement a key loader for loading keys to a data transfer system from a removable data cartridge according to example aspects of the present disclosure. For instance, the load script can cause one or more cryptographic keys to be loaded to a host device of the avionic data transfer system when the removable data cartridge is interfaced with the host device.

In some embodiments, the CKC can be a PCKC and can include additional data 312 indicative of cryptographic unit identifiers as well as a mapping of information to cryptographic units of an avionic data transfer system. The PCKC can be used to configure an avionic data transfer system having a plurality of cryptographic units. Cryptographic keys can be distributed to the plurality of cryptographic units, using for instance, a host device acting as a key server and in communication with the plurality of cryptographic units over, for instance, a data bus.

According to example embodiments of the present disclosure, the CKC can be generated at a terminal remote from the avionic data transfer system. For instance, FIG. 9 depicts a terminal 120 that can be used to generate a CKC according to example embodiments of the present disclosure. The terminal 120 can be used to generate the CKC and transfer the CKC to a removable data cartridge 130. The removable data cartridge 130 can then be interfaced with the avionic data transfer system to configure the cryptographic elements of the avionic data transfer system.

As shown the terminal 120 can access various databases to generate the CKC according to example embodiments of the present disclosure. For instance, the terminal 120 can access one or more of a user account database 312, a CIK identifier database 314, a cryptographic key database 316, a CKC database 318, and cryptographic unit identifier database 320. The user account database 312 can store data associated with authorized users of one or more cryptographic systems. The CIK identifier database 314 can store data associated with CIKs used for user authentication. Cryptographic key database 316 can store cryptographic keys for cryptographic processing of data by one or more cryptographic systems. CKC database 318 can store CKCs generated by the terminal 120, and cryptographic unit identifier database 320 can store data associated with various cryptographic units in one or more cryptographic systems.

The terminal 120 can access data stored in one or more of the databases 312, 314, 316, 318, and 320 and use the data to generate a CKC. The terminal 120 can include one or more processors and one or more memory devices storing computer-readable instructions that when executed by the one or more processors cause the one or more processors to implement a user interface 125. The user interface 125 allows an administrator to interact with the terminal to perform one or more CKC actions to generate a CKC. The CKC actions can include one or more of the following actions: (1) Retrieve user account data from a repository of user account data. (2) Create/modify/delete user account data in a repository of user account data. (3) Authorize user accounts for cryptographic processing. (4) Retrieve CIK identifier from a repository of CIK identifiers. (5) Create/modify/delete CIK identifiers in a repository of CIK identifiers. (6) Create/modify/delete links between CIK identifiers and User Account Data. (7) Retrieve cryptographic keys from a repository of cryptographic keys. (8) Create/modify/delete links between cryptographic unit channel slots and cryptographic keys. (10) Create/modify/delete CKCs in a repository of CKCs. (11) Create/modify/delete CKC files on a medium for transport to a host system, such as a removable data cartridge.

In embodiments where PCKCs are created, the user interface can allow the administrator to additionally perform one or more of the following CKC actions: (1) Create/modify/delete links between cryptographic equipment identifiers and user account data and CIKs and keys, and platforms. (2) Create/modify/delete scripts to automate the loading of PCKCs into cryptographic equipment on a platform. (3) Create/modify/delete PCKCs in a repository of PCKCs. (4) Create/modify/delete PCKC files on a medium for transport to a platform, such as a removable data cartridge.

Once the CKC has been generated at the terminal, the CKC can be stored on the removable data cartridge 130. The removable data cartridge 130 can then be interfaced with an avionic data transfer system to configure the avionic data transfer system for cryptographic processing of data according to example embodiments of the present disclosure.

FIG. 10 depicts a flow diagram of an example method (400) according to example embodiments of the present disclosure. The method can be implemented using a cryptographic system, such as any of the cryptographic systems discussed herein. In addition, FIG. 10 depicts steps performed in a particular order for purposes of illustration and discussion. Those of ordinary skill in the art, using the disclosures provided herein, will understand that the steps of any of the methods described herein can be modified, expanded, omitted, adapted, or rearranged without deviating from the scope of the present disclosure.

At (402), the method includes engaging a removable data cartridge with a terminal. For instance, a removable data cartridge 130 having a dedicated key memory and a dedicated data memory 220 can be engaged with a terminal 120. At (404), the method can include loading data subject to cryptographic processing to the data memory from the terminal. The data subject to cryptographic processing can be, for instance, aviation data. At (406), the method can include loading one or more cryptographic keys to the key memory of the removable data cartridge from the terminal.

At (408), the removable data cartridge is engaged with a host system via at least one connector associated with the removable data cartridge. For example, the removable data cartridge can be inserted into a suitable receptacle, slot, or connection at the host system.

At (410), the method includes transferring, by the removable data cartridge, the one or more cryptographic keys to the host system. For instance, the one or more cryptographic keys can be transferred to the host system from the key memory of the removable data cartridge via a key memory interface according to a first protocol. The first protocol can be a serial protocol suitable for the transfer of cryptographic keys, such as a serial protocol used by key fill devices. As an example, the first protocol can be a DS-101 or DS-102 protocol used for the transfer of key material. Other suitable protocols can be used as the first protocol without deviating from the scope of the present disclosure, such as a USB protocol, I2C protocol, SPI protocol, or other suitable protocol.

At (412), the method includes transferring, by the removable data cartridge, the data subject to cryptographic processing to the host system. For instance, the data subject to cryptographic processing can be transferred to the host system from the data memory of the removable data cartridge via a data memory interface according to a second protocol. In some embodiments, the second protocol can be different from the first protocol. The second protocol can be, for instance, a serial protocol suitable for the transfer of data subject to cryptographic processing 225, such as a USB protocol, I2C protocol, SPI protocol, or other suitable protocol.

In one embodiment, the one or more cryptographic keys can be transferred to the host system via the at least one connector separately from the data subject to cryptographic processing. For instance, the one or more cryptographic keys can be first transferred via the key memory interface according to a first protocol. Subsequent to the transfer of the one or more cryptographic keys, the data subject to cryptographic processing can be transferred via the data memory interface via a second protocol. In other embodiments, the data subject to cryptographic processing can be transferred prior to the transfer of the one or more cryptographic keys. In one embodiment, the one or more cryptographic keys can be transferred to the host system via one first pins of the at least one connector. The data subject to cryptographic processing can be transferred to the host system via one or more second pins of the at least one connector.

At (414), the method includes cryptographically processing the data subject to cryptographic processing using the one or more cryptographic keys at the host system. For example, the method can include encrypting or decrypting the data subject to cryptographic processing at the host system based at least in part on the one or more cryptographic keys.

Although specific features of various embodiments may be shown in some drawings and not in others, this is for convenience only. In accordance with the principles of the present disclosure, any feature of a drawing may be referenced and/or claimed in combination with any feature of any other drawing.

This written description uses examples to disclose the invention, including the best mode, and also to enable any person skilled in the art to practice the invention, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the invention is defined by the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they include structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements with insubstantial differences from the literal languages of the claims.

Read more
PatSnap Solutions

Great research starts with great data.

Use the most comprehensive innovation intelligence platform to maximise ROI on research.

Learn More

Patent Valuation

$

Reveal the value <>

34.2/100 Score

Market Attractiveness

It shows from an IP point of view how many competitors are active and innovations are made in the different technical fields of the company. On a company level, the market attractiveness is often also an indicator of how diversified a company is. Here we look into the commercial relevance of the market.

64.0/100 Score

Market Coverage

It shows the sizes of the market that is covered with the IP and in how many countries the IP guarantees protection. It reflects a market size that is potentially addressable with the invented technology/formulation with a legal protection which also includes a freedom to operate. Here we look into the size of the impacted market.

65.12/100 Score

Technology Quality

It shows the degree of innovation that can be derived from a company’s IP. Here we look into ease of detection, ability to design around and significance of the patented feature to the product/service.

46.0/100 Score

Assignee Score

It takes the R&D behavior of the company itself into account that results in IP. During the invention phase, larger companies are considered to assign a higher R&D budget on a certain technology field, these companies have a better influence on their market, on what is marketable and what might lead to a standard.

21.32/100 Score

Legal Score

It shows the legal strength of IP in terms of its degree of protecting effect. Here we look into claim scope, claim breadth, claim quality, stability and priority.

Citation

Patents Cited in This Cited by
Title Current Assignee Application Date Publication Date
自動データ·ストレージ·ライブラリにおける取り外し可能媒体に格納されたデータの選択的暗号化のための方法、装置、およびコンピュータ·プログラム インターナショナル·ビジネス·マシーンズ·コーポレーション 22 August 2007 11 April 2012
Removable information storage device that includes a master encryption key and encryption keys HEWLETT-PACKARD DEVELOPMENT COMPANY, LP. 20 October 2003 21 April 2005
少なくとも一枚のスマートカードと、スマートカード読取り装置と、ホストとを接続する装置。 エスセーエム シュナイダー ミクロシステム-ミクロシステメ シュナイダー エントヴィックルングス ウント フェアトリーブス ゲーエムベーハー エスアーエールエル デヴロップマン エ ヴァント 30 December 1998 15 January 2002
データ共有装置 PRO SECURE CO LTD 28 December 2005 12 July 2007
Secure key distribution with general purpose mobile device HONEYWELL INTERNATIONAL INC. 17 July 2013 05 February 2014
See full citation <>

More like this

Title Current Assignee Application Date Publication Date
Method for re-keying an encrypted data file NEC EUROPE LTD. 08 December 2015 15 June 2017
Method for protecting the use of a cryptographic key in two different cryptographic environments GEMALTO SA 02 August 2016 06 July 2017
Method and apparatus for duplicated data management in cloud computing NOKIA TECHNOLOGIES OY,NAVTEQ (SHANGHAI) TRADING CO., LTD. 23 December 2014 30 June 2016
Generation of cryptographic key material or of a digital signature for an embedded system SIEMENS AKTIENGESELLSCHAFT 16 May 2017 07 December 2017
Client services for applied key management systems and processes FORNETIX LLC 14 March 2016 03 November 2016
Method and system for distributed cryptographic key provisioning and storage via elliptic curve cryptography MASTERCARD INTERNATIONAL INCORPORATED 06 January 2017 27 July 2017
Mutual authentication of software layers VISA INTERNATIONAL SERVICE ASSOCIATION 11 March 2016 15 September 2016
Encryption of community-based security information based on time-bound cryptographic keys HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP 29 January 2016 03 August 2017
Secure in-band upgrade using key revocation lists and certificate-less asymmetric tertiary key pairs HONEYWELL INTERNATIONAL INC. 07 June 2017 21 December 2017
Secure computer cluster with encryption MASTERCARD INTERNATIONAL INCORPORATED 14 September 2016 30 March 2017
Secure key management in a data storage system MICROSOFT TECHNOLOGY LICENSING, LLC 29 April 2016 10 November 2016
Access control for encrypted data in machine-readable identifiers WONDERHEALTH, LLC. 02 March 2016 09 September 2016
Encryption system, encryption key wallet and method GURULOGIC MICROSYSTEMS OY 27 April 2016 03 November 2016
Systems and methods for secure storage of user information in a user profile FHOOSH, INC. 13 June 2017 21 December 2017
Network system, and methods of encrypting data, decrypting encrypted data in the same AGENCY FOR SCIENCE, TECHNOLOGY AND RESEARCH 06 May 2016 17 November 2016
Method, apparatus, and system for cloud-based encryption machine key injection ALIBABA GROUP HOLDING LIMITED 19 April 2016 09 February 2017
Authorization of use of cryptographic keys ENTIT SOFTWARE LLC 22 April 2016 26 October 2017
Methods and computer program products for encryption key generation and management BICDROID INC. 10 June 2016 15 December 2016
A method for encrypting data and a method for decrypting data OSMERUS INVESTMENTS LTD 22 December 2016 29 June 2017
Method of securing data using threshold cryptography NORD-SYSTEMS SP. Z O.O. 10 February 2015 18 August 2016
See all similar patents <>

More Patents & Intellectual Property

PatSnap Solutions

PatSnap solutions are used by R&D teams, legal and IP professionals, those in business intelligence and strategic planning roles and by research staff at academic institutions globally.

PatSnap Solutions
Search & Analyze
The widest range of IP search tools makes getting the right answers and asking the right questions easier than ever. One click analysis extracts meaningful information on competitors and technology trends from IP data.
Business Intelligence
Gain powerful insights into future technology changes, market shifts and competitor strategies.
Workflow
Manage IP-related processes across multiple teams and departments with integrated collaboration and workflow tools.
Contact Sales
Clsoe
US10002257 Cryptographic key loader embedded 1 US10002257 Cryptographic key loader embedded 2 US10002257 Cryptographic key loader embedded 3