Systems and methods for decryption as a service via a hardware security module
First Claim
Patent Images
1. A system for decryption of one or more payloads, the system comprising:
- a hardware security module implemented by at least one processor for decrypting encrypted elements of received payloads, the hardware security module operatively connected to at least one decryption server;
the at least one decryption server, wherein the at least one decryption server is configured totransmit the particular payload to the hardware security module for decryption of at least one encrypted element;
at least one read-only database, the at least one read-only database configured to store authentication data for decrypting encrypted elements of the received payloads;
a frontend server operatively connected to the at least one read-only database, the frontend server configured to;
1) retrieve authentication data associated with a particular received payload; and
2) compare the authentication data to the particular received payload to authenticate the particular received payload before the particular received payload is transmitted to the hardware security module; and
a master read-only database operatively connected to the at least one read-only database, the master read-only database configured for refreshing the authentication data stored at the at least one read-only database.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands of transactions per second. Further, in particular embodiments, the systems and methods herein are scalable, such that many thousands of transactions can be processed per second upon replicating particular architectural components.
-
Citations
20 Claims
-
1. A system for decryption of one or more payloads, the system comprising:
-
a hardware security module implemented by at least one processor for decrypting encrypted elements of received payloads, the hardware security module operatively connected to at least one decryption server; the at least one decryption server, wherein the at least one decryption server is configured to transmit the particular payload to the hardware security module for decryption of at least one encrypted element; at least one read-only database, the at least one read-only database configured to store authentication data for decrypting encrypted elements of the received payloads; a frontend server operatively connected to the at least one read-only database, the frontend server configured to;
1) retrieve authentication data associated with a particular received payload; and
2) compare the authentication data to the particular received payload to authenticate the particular received payload before the particular received payload is transmitted to the hardware security module; anda master read-only database operatively connected to the at least one read-only database, the master read-only database configured for refreshing the authentication data stored at the at least one read-only database. - View Dependent Claims (2, 3, 6, 7, 8, 9, 10, 11, 12)
-
-
4. A computer-implemented method for decryption of one or more payloads, the method comprising:
-
providing a hardware security module implemented by at least one processor for decrypting encrypted elements of received payloads, the hardware security module operatively connected to at least one decryption server; providing at least one read-only database, the at least one read-only database configured to store authentication data for decrypting encrypted elements of the received payloads; providing a frontend server operatively connected to the at least one read-only database, the frontend server configured to;
1) retrieve authentication data associated with a particular received payload; and
2) compare the authentication data to the particular received payload to authenticate the particular received payload before the particular received payload is transmitted to the hardware security module; andproviding a master read-only database operatively connected to the at least one read-only database, the master read-only database configured for refreshing the authentication data stored at the at least one read-only database providing the at least one decryption server; transmitting the particular payload to the hardware security module for decryption of at least one encrypted element. - View Dependent Claims (5, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification