×

Multiple authority data security and access

  • US 10,090,998 B2
  • Filed: 06/10/2016
  • Issued: 10/02/2018
  • Est. Priority Date: 06/20/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of one or more computer systems that execute instructions,receiving, from a customer of a computing resource service provider, a request to perform one or more operations using a managed key that is inaccessible to the customer, the request including information that enables the computing resource service provider to select the managed key from other keys managed on behalf of customers of the computing resource service provider;

    providing to the customer;

    a data key; and

    in addition to the data key, an encrypted data key;

    receiving, from the customer, data encrypted under the data key; and

    storing, in persistent storage, the encrypted data key and the data encrypted under the data key, wherein a customer key and the managed key that is inaccessible to the customer are collectively sufficient, but individually insufficient, to access the data in plaintext form from the persistent storage.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×