SYSTEMS AND METHODS FOR MANAGING CRYPTOGRAPHIC KEYS
First Claim
Patent Images
1. A method for managing cryptographic keys, the method comprising:
- receiving, at a common interface;
a first request from a first interface in a first interface format to manage at least one cryptographic key stored remote from the first interface; and
a second request from a second interface in a second interface format to manage at least one cryptographic key stored remote from the second interface;
translating each of the first request from the first interface format and the second request from the second interface format to a common interface format;
authenticating the first and second requests by at least verifying that the requests originated from an authorized source; and
executing the first and second translated requests in the common interface format.
4 Assignments
0 Petitions
Accused Products
Abstract
A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated to a common interface format, and then executed remotely from the first interface. Return arguments may then be translated from the common interface format to a format compatible with the first interface and communicated securely to the first interface. The cryptographic keys may be used in connection with a secure data parser that secures data by randomly distributing data within a data set into two or more shares.
-
Citations
15 Claims
-
1. A method for managing cryptographic keys, the method comprising:
-
receiving, at a common interface; a first request from a first interface in a first interface format to manage at least one cryptographic key stored remote from the first interface; and a second request from a second interface in a second interface format to manage at least one cryptographic key stored remote from the second interface; translating each of the first request from the first interface format and the second request from the second interface format to a common interface format; authenticating the first and second requests by at least verifying that the requests originated from an authorized source; and executing the first and second translated requests in the common interface format. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification