Supporting a fixed transaction rate with a variably-backed logical cryptographic key
First Claim
Patent Images
1. A computer-implemented method, performed by a computer including memory and a processor, comprising:
- receiving a request to perform a cryptographic operation, the request indicating an identifier of a logical key that is shared with a plurality of keys that are capable of being used to perform the cryptographic operation;
selecting, based at least in part on a selection algorithm, from the plurality of keys, a first key to be used in performing the cryptographic operation; and
performing the cryptographic operation using one or more computing resources associated with the first key.
1 Assignment
0 Petitions
Accused Products
Abstract
A request a request to perform a cryptographic operation is received, the request including a first identifier assigned to a key group, the key group comprising a plurality of second identifiers, with the plurality of second identifiers corresponding to a plurality of cryptographic keys. A second identifier is determined, according to a distribution scheme, from the plurality of second identifiers, and the cryptographic operation is performed using a cryptographic key of the plurality of cryptographic keys that corresponds to the second identifier that was determined.
-
Citations
20 Claims
-
1. A computer-implemented method, performed by a computer including memory and a processor, comprising:
-
receiving a request to perform a cryptographic operation, the request indicating an identifier of a logical key that is shared with a plurality of keys that are capable of being used to perform the cryptographic operation; selecting, based at least in part on a selection algorithm, from the plurality of keys, a first key to be used in performing the cryptographic operation; and performing the cryptographic operation using one or more computing resources associated with the first key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
one or more processors; and memory storing instructions that, as a result of execution by the one or more processors, cause the system to; associate a plurality of keys with a logical key, each key in the plurality of keys being capable of being used to perform a first cryptographic operation and a second cryptographic operation; receive a first request to perform the first cryptographic operation, the first request identifying the logical key; select a first key from the plurality of keys; perform the first cryptographic operation using the first key; and provide a response to the first request with a result of the first cryptographic operation and information indicating which of the plurality of keys associated with the logical key was used to perform the cryptographic operation. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing executable instructions stored thereon that, as a result of being executed by one or more processors of a computer system, cause the computer system to at least:
-
receive a request to perform a cryptographic operation, the request indicating a first identifier of a logical key that is associated with a plurality of keys that are capable of being used to perform the cryptographic operation; select a first key, based at least in part on a second identifier specific to the first key, from the plurality of keys, the first key to be used in performing the cryptographic operation; and perform the cryptographic operation using one or more computing resources associated with the first key. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification