×

Cryptographic key distribution

  • US 10,554,392 B2
  • Filed: 04/20/2017
  • Issued: 02/04/2020
  • Est. Priority Date: 12/03/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method comprising:

  • storing, in a first hardware security module, a fleet key that is replicated across a fleet of hardware security modules, and a domain key that is replicated across a subset of hardware security modules in the fleet of hardware security modules;

    receiving encrypted cryptographic material, the encrypted cryptographic material encrypted with the domain key and then the fleet key;

    decrypting a first portion of the encrypted cryptographic material with at least the fleet key and the domain key;

    distributing updated cryptographic material that is cryptographically protected with the fleet key to the fleet of hardware security modules, the first hardware security module being able to access the updated cryptographic material as a result of being able to access the domain key and at least one other hardware security module not being able to access the updated cryptographic material as a result of not being able to access the domain key and storing the update cryptographic material; and

    distributing the updated cryptographic material that is cryptographically protected with the fleet key to a second hardware security module outside the fleet of hardware security modules, where the second hardware security module maintains the updated cryptographic material as a backup for the fleet of hardware security modules, the second hardware security module unable to access the updated cryptographic material in plaintext form as a result of the second hardware security module lacking access to the domain key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×