A key management scheme for managing encryption keys in a cryptographic co-processor includes the first step of selecting a key from one of a symmetrical key type and an asymmetrical key type. Then, the key bit length is selected. The key is then generated and, lastly, the key is represented in either an external form or an internal form.

 
Web www.patentalert.com

< Secure user identification based on ring homomorphisms

< Secure document design with machine readable, variable message encoded in a visible registration pattern

> Method of judging digital watermark information

> Method and apparatus for transmitting encryption-resultant information and decrypting information

~ 00216