KEY USAGE POLICIES FOR CRYPTOGRAPHIC KEYS
First Claim
Patent Images
1. A computer program product for secure key management, the computer program product comprising:
- a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for;
creating a token and populating the token with key material; and
binding key control information to the key material, the key control information including;
information relating to usage of the key material populating one or more key usage fields that define attributes that limit actions that may be performed with the key material.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer program product for secure key management is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for creating a token and populating the token with key material, and binding key control information to the key material. The key control information includes information relating to usage of the key material populating one or more key usage fields that define attributes that limit actions that may be performed with the key material.
-
Citations
21 Claims
-
1. A computer program product for secure key management, the computer program product comprising:
-
a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for; creating a token and populating the token with key material; and binding key control information to the key material, the key control information including; information relating to usage of the key material populating one or more key usage fields that define attributes that limit actions that may be performed with the key material. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8-14. -14. (canceled)
-
15. A system for secure key management, comprising:
-
a computer processor; and an application configured to execute on the computer processor, the application implementing; creation of a token and population of the token with key material; and a binding of key control information to the key material, the key control information including; information relating to usage of the key material populating one or more key usage fields that that define attributes that limit actions that may be performed with the key material. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification