SECURE KEY MANAGEMENT
First Claim
Patent Images
1. A method for secure key management, comprising:
- populating a section of information associated with a key, the section of information being populated with information relating to how the key was created;
populating the section of information with information relating to how the key was acquired by a secure module; and
binding the section of information to the key, wherein the key is encrypted.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one embodiment, a method for implementing secure key management is provided. The method includes populating a section of information associated with a key, the section being populated with information relating to how the key was created. The method also includes populating the section with information relating to how the key was acquired by a secure module; and binding the section to the key, wherein the key is encrypted.
-
Citations
9 Claims
-
1. A method for secure key management, comprising:
-
populating a section of information associated with a key, the section of information being populated with information relating to how the key was created; populating the section of information with information relating to how the key was acquired by a secure module; and binding the section of information to the key, wherein the key is encrypted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification