×

Key rotation techniques

  • US 10,313,312 B2
  • Filed: 03/17/2017
  • Issued: 06/04/2019
  • Est. Priority Date: 06/13/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • for a set of data objects encrypted with a first key that is accessible to a plurality of devices, terminating access to a first subset of the set of data objects by;

    transmitting a second key to the plurality of devices, the second key usable for reencrypting a second subset of the set of data objects; and

    causing, until the plurality of devices complete reencryption of the second subset of the set of data objects, the first key to be usable to perform a first cryptographic operation on individual data objects of the set of data objects and to be unusable to perform a second cryptographic operation on the individual data objects; and

    at a time after the second subset becomes accessible by using the second key;

    verifying that each of the plurality of devices has access to the second key; and

    causing the plurality of devices to lose access to the first key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×