×

FEDERATED KEY MANAGEMENT

  • US 20140229737A1
  • Filed: 02/12/2013
  • Published: 08/14/2014
  • Est. Priority Date: 02/12/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of one or more computer systems configured with executable instructions,receiving, from a requestor, a request to perform a cryptographic operation, the request including information and an electronic signature generated based at least in part on a portion of the information, the electronic signature verifiable with a first key of a set of one or more keys corresponding to a second key;

    detecting whether the request specifies a key holder of a plurality of key holders;

    as a result of detecting that the request specifies a particular key holder of the plurality of key holders, causing the particular key holder to at least;

    determine, based at least in part on the information and the first key, whether the electronic signature is valid;

    determine, based at least in part on the information, whether the information satisfies one or more conditions for fulfilling the request;

    as a result of the particular key holder determining that the electronic signature is valid and that the information satisfies the one or more conditions, obtaining, from the particular key holder, response information necessary for fulfilling the request, the response information having been generated based at least in part on one or more cryptographic operations performed using the second key; and

    using the obtained response information to provide, to the requestor, a response to the request.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×