×

Automatic key rotation

  • US 10,467,422 B1
  • Filed: 02/12/2013
  • Issued: 11/05/2019
  • Est. Priority Date: 02/12/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, under control of one or more electronic computer systems configured with one or more processors and memory including executable instructions, comprising:

  • tracking use in cryptographic operations of a cryptographic key identified by a key identifier;

    as a result of one or more conditions on the tracked use being fulfilled, at least one of the one or more conditions being that a number of cryptographic operations associated with the cryptographic key exceeds a threshold, and value of the threshold corresponding to the cryptographic key being different from value of threshold corresponding to another cryptographic key;

    obtaining an encrypted object from a security module, the encrypted object encrypted using a symmetric key;

    decrypting the encrypted object using the symmetric key to obtain a new cryptographic key;

    replacing the cryptographic key with the new cryptographic key by associating the new cryptographic key with the key identifier; and

    marking the new cryptographic key as active by updating at least one value stored in the security module; and

    responding to requests specifying the key identifier using the replaced cryptographic key in at least one decryption operation in response to a decryption request specifying the key identifier.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×