摘要 |
<p>The method involves executing permissibility testing of a data object key by test conditions that include usability of the data object key to generate another data object key from the former key using an asymmetric cryptographic key generation process. The latter data object key is computed from the former key, when the test conditions are satisfied, where the former and latter keys form an asymmetric cryptographic key pair. A new data object key is recomputed with a random value, when the test conditions are not satisfied. Independent claims are also included for the following: (1) a method for application of an asymmetric cryptographic key pair (2) a computer program product having instructions to perform a method for user identification-based generating an asymmetric cryptographic key pair (3) a data processing system for generating an asymmetric cryptographic key pair.</p> |