KEY GENERATION AND RETRIEVAL USING KEY SERVERS
First Claim
Patent Images
1. A computer-implemented method for key generation and retrieval, comprising:
- storing unique identifiers of two or more key servers, wherein each key server is capable of generating keys for encryption of data and of returning keys for decryption of data;
receiving a key request;
identifying a technique for selecting one of the key servers to which the key request is to be forwarded;
selecting one of the key servers using the Identified technique; and
sending the key request to the selected key server.
1 Assignment
0 Petitions
Accused Products
Abstract
Provided are techniques for key generation and retrieval. Unique identifiers of two or more key servers are stored, wherein each key server is capable of generating keys for encryption of data and of returning keys for decryption of data. A key request is received. A technique for selecting one of the key servers to which the key request is to be forwarded is identified. One of the key servers is selected using the identified technique. The key request is sent to the identified key server.
32 Citations
42 Claims
-
1. A computer-implemented method for key generation and retrieval, comprising:
-
storing unique identifiers of two or more key servers, wherein each key server is capable of generating keys for encryption of data and of returning keys for decryption of data; receiving a key request; identifying a technique for selecting one of the key servers to which the key request is to be forwarded; selecting one of the key servers using the Identified technique; and sending the key request to the selected key server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer program product comprising a computer useable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to:
-
store unique identifiers of two or more key servers, wherein each key server is capable of generating keys for encryption of data and of returning keys for decryption of data; receive a key request; identify a technique for selecting one of the key servers to which the key request is to be forwarded; selecting one of the key servers using the identified technique; and send the key request to the selected key server. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A system for key generation and retrieval, comprising:
logic capable of performing operations, the operations comprising; storing unique identifiers of two or more key servers, wherein each key sewer is capable of generating keys for encryption of data and of returning keys for decryption of data; receiving a key request; identifying a technique for selecting one of the key servers to which the key request is to be forwarded; selecting one of the key servers using the identified technique; and sending the key request to the selected key server. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
Specification