Lightweight cryptographic service for simplified key life-cycle management
First Claim
1. A method for a cryptographic service facilitating asymmetric encryption, the cryptographic service implemented on one or more computer systems, the method comprising:
- receiving, by the cryptographic service, one or more unique identifiers;
determining, by the cryptographic service, whether each of the one or more unique identifiers is valid;
generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid; and
sending, by the cryptographic service, a success reply including a private key for each key pair generation,wherein the key pair enables the cryptographic service to avoid digital certificates or associated key life-cycle management for the encryption of data between a requester and one or more remote system,wherein in the key pair comprises the private key and a public key, the private key being distributed once to a requester and the public key being provided on demand,wherein the method of the cryptographic service provides a success reply including a public key to a remote system upon receiving the unique identifier from the remote system and validating the unique identifier received from the remote system with respect to a get request from the remote system.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for a cryptographic service facilitating asymmetric encryption is provided. The cryptographic service is implemented on one or more computer systems. The method includes receiving, by the cryptographic service, one or more unique identifiers. The method also includes determining, by the cryptographic service, whether each of the one or more unique identifiers is valid. The method includes generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid. The method includes sending, by the cryptographic service, a success reply including a public key for each key pair generation.
-
Citations
12 Claims
-
1. A method for a cryptographic service facilitating asymmetric encryption, the cryptographic service implemented on one or more computer systems, the method comprising:
-
receiving, by the cryptographic service, one or more unique identifiers; determining, by the cryptographic service, whether each of the one or more unique identifiers is valid; generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid; and sending, by the cryptographic service, a success reply including a private key for each key pair generation, wherein the key pair enables the cryptographic service to avoid digital certificates or associated key life-cycle management for the encryption of data between a requester and one or more remote system, wherein in the key pair comprises the private key and a public key, the private key being distributed once to a requester and the public key being provided on demand, wherein the method of the cryptographic service provides a success reply including a public key to a remote system upon receiving the unique identifier from the remote system and validating the unique identifier received from the remote system with respect to a get request from the remote system. - View Dependent Claims (2, 3, 4)
-
-
5. A computer program product for a cryptographic service facilitating asymmetric encryption, the cryptographic service implemented on one or more computer systems, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by at least one of processor of the one or more computer systems to cause:
-
receiving, by the cryptographic service, one or more unique identifiers; determining, by the cryptographic service, whether each of the one or more unique identifiers is valid; generating, by the cryptographic service, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid; and sending, by the cryptographic service, a success reply including a private key for each key pair generation, wherein the key pair enables the cryptographic service to avoid digital certificates or associated key life-cycle management for the encryption of data between a requester and one or more remote system, wherein in the key pair comprises the private key and a public key, the private key being distributed once to a requester and the public key being provided on demand, wherein the method of the cryptographic service provides a success reply including a public key to a remote system upon receiving the unique identifier from the remote system and validating the unique identifier received from the remote system with respect to a get request from the remote system, wherein the key pair enables the cryptographic service to avoid digital certificates or associated key life-cycle management for the encryption of data between a requester and one or more remote system, wherein in the key pair comprises the private key and a public key, the private key being distributed once to a requester and the public key being provided on demand, wherein the method of the cryptographic service provides a success reply including a public key to a remote system upon receiving the unique identifier from the remote system and validating the unique identifier received from the remote system with respect to a get request from the remote system. - View Dependent Claims (6, 7, 8)
-
-
9. A cryptographic service system comprising a processor and a memory storing program instructions for a cryptographic service facilitating asymmetric encryption thereon, the program instructions executable by the processor to cause:
-
receiving, by the cryptographic service system, one or more unique identifiers; determining, by the cryptographic service system, whether each of the one or more unique identifiers is valid; generating, by the cryptographic service system, a key pair per unique identifier of the one or more unique identifiers based on whether the corresponding unique identifier is valid; and sending, by the cryptographic service system, a success reply including a private key for each key pair generation, wherein the key pair enables the cryptographic service to avoid digital certificates or associated key life-cycle management for the encryption of data between a requester and one or more remote system, wherein in the key pair comprises the private key and a public key, the private key being distributed once to a requester and the public key being provided on demand, wherein the method of the cryptographic service provides a success reply including a public key to a remote system upon receiving the unique identifier from the remote system and validating the unique identifier received from the remote system with respect to a get request from the remote system. - View Dependent Claims (10, 11, 12)
-
Specification