Method and System for Identifying and Managing Keys
First Claim
Patent Images
1. A method of controlling use of an encryption key, wherein the encryption key resides in one or more key management servers in a key management system, the method comprising:
- disabling the encryption key, wherein the disabling comprises;
deleting the encryption key from all cryptographic units; and
isolating the encryption key within the key management servers in the key management system, wherein isolating the encryption key comprises barring all access to the disabled encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for managing encryption keys, wherein one of more of they keys incorporates a disabled state, and wherein the system further incorporates a namespace.
291 Citations
22 Claims
-
1. A method of controlling use of an encryption key, wherein the encryption key resides in one or more key management servers in a key management system, the method comprising:
-
disabling the encryption key, wherein the disabling comprises; deleting the encryption key from all cryptographic units; and isolating the encryption key within the key management servers in the key management system, wherein isolating the encryption key comprises barring all access to the disabled encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
8. A method of identifying an object within a key management system, the method comprising:
-
creating a GUID for the object, wherein the GUID is represented by a URI, the URI comprising a prefix, a realm element, an object element, and a path element; mapping the URI to one or more key management servers in the key management system; and storing the object on the one or more key management servers in the key management system.
-
-
21. A method of retrieving an object within a key management system, the method comprising:
-
receiving a URI for the object; mapping the URI to one or more key management servers in the key management system; and retrieving the object from one of the one or more key management servers in the key management system. - View Dependent Claims (22)
-
Specification