Software Service for Encrypting and Decrypting Data
First Claim
1. A method for enabling encryption and decryption of data as a service, said method comprising the steps of:
- providing an encryption/decryption engine;
verifying an identifier;
providing a repository; and
directing the encryption/decryption engine to process requests from a verified source associated with the identifier to encrypt or decrypt data using an appropriate key from the repository.
0 Assignments
0 Petitions
Accused Products
Abstract
A system for making encryption and decryption available to software applications as a service is disclosed. An encryption/decryption server verifies the credentials of human operators, hardware devices, or combinations of operators and hardware devices and determines the cryptographic keys to which they have access, and provides access to said keys. Client software applications send service requests to the encryption/decryption server to encrypt or decrypt data. The server encrypts or decrypts the data as requested if the operator or device has the proper credentials to access the required key. The system may include multiple levels of security access.
92 Citations
20 Claims
-
1. A method for enabling encryption and decryption of data as a service, said method comprising the steps of:
-
providing an encryption/decryption engine; verifying an identifier; providing a repository; and directing the encryption/decryption engine to process requests from a verified source associated with the identifier to encrypt or decrypt data using an appropriate key from the repository. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for transforming data communicated in a first format, said method comprising the steps of:
-
receiving a formatted request with data from an application; identifying a source of the formatted request; determining whether the source is associated with an appropriate access level; and when the source is associated with an appropriate access level and a key for processing data at the access level is available, using an encryption/decryption engine to process the formatted request such that data received in the first format is translated to communicated in a second format that is different from the first format. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification