×

Key export techniques

  • US 10,469,477 B2
  • Filed: 03/31/2015
  • Issued: 11/05/2019
  • Est. Priority Date: 03/31/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • selecting a first cryptographic key with an expiration that matches a lifetime specified in a request;

    providing, in response to the request, an encrypted second cryptographic key generated by encrypting a second cryptographic key using the first cryptographic key; and

    after providing the encrypted second cryptographic key, performing one or more operations to lose information to prevent an ability to obtain the second cryptographic key until another request that includes the encrypted second cryptographic key is later obtained.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×