Generating a protected key for selective use
Abstract:
A protected key to be used by a select processor on behalf of an entity unauthorized to use the protected key is created. The creating includes obtaining a system mask and a system key. A clear key is wrapped with the system key to provide a wrapped key. The system mask is applied to the wrapped key to create the protected key.
Public/Granted literature
Information query
Patent Agency Ranking
0/0