×

Data security using request-supplied keys

  • US 10,037,428 B2
  • Filed: 04/04/2016
  • Issued: 07/31/2018
  • Est. Priority Date: 09/25/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving a request over a network, the request specifying data and including an encrypted cryptographic key, wherein the data is not included in the request;

    causing the encrypted cryptographic key to be decrypted by at least transmitting the encrypted cryptographic key to another entity for decryption, thereby resulting in a decrypted cryptographic key;

    performing one or more cryptographic operations on the specified data using the decrypted cryptographic key to encrypt the specified data to fulfill the request; and

    providing a result of performing the one or more cryptographic operations.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×