International Business Machines Corporation
Generating a protected key for selective use

Last updated:

Abstract:

A protected key to be used by a select processor on behalf of an entity unauthorized to use the protected key is created. The creating includes obtaining a system mask and a system key. A clear key is wrapped with the system key to provide a wrapped key. The system mask is applied to the wrapped key to create the protected key.

Status:
Grant
Type:

Utility

Filling date:

26 Mar 2019

Issue date:

14 Dec 2021