Please download the dossier by clicking on the dossier button x
×

Data security operations with expectations

  • US 10,560,441 B2
  • Filed: 12/17/2014
  • Issued: 02/11/2020
  • Est. Priority Date: 12/17/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • receiving, from a requestor associated with a customer of a service provider, a web service request whose fulfillment includes performance of a cryptographic operation;

    selecting, based at least in part on information in the web service request, a cryptographic key from a plurality of cryptographic keys managed by the service provider for a plurality of customers of the service provider;

    determining a set of security expectations applicable to the web service request, the set of security expectations defining a set of conditions applicable to the selected cryptographic key that, when fulfilled and regardless of whether the selected cryptographic key is usable to perform the cryptographic operation, indicate that a result of the cryptographic operation is trusted;

    evaluating the set of security expectations against the selected cryptographic key;

    generating a response to the web service requests based at least in part on evaluation of the set of security expectations; and

    providing the generated response.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×