International Business Machines Corporation
Generating a protected key for selective use
Last updated:
Abstract:
A protected key to be used by a select processor on behalf of an entity unauthorized to use the protected key is created. The creating includes obtaining a system mask and a system key. A clear key is wrapped with the system key to provide a wrapped key. The system mask is applied to the wrapped key to create the protected key.
Status:
Grant
Type:
Utility
Filling date:
26 Mar 2019
Issue date:
14 Dec 2021