Cloud Encryption Key Broker Apparatuses, Methods and Systems
First Claim
Patent Images
1. A processor-implemented method for use in cryptographic operations, comprising:
- storing, by one or more data processors, a first portion of a key that is used in a cryptographic operation;
receiving a remote request for retrieval of the first portion of the key;
performing security analysis upon the request; and
transmitting the first portion of the key to the requester after security analysis criteria has been satisfied;
wherein a complete key is generated by combining the first portion of the key with a second portion of a key;
wherein the complete key is used to perform a cryptographic operation.
1 Assignment
0 Petitions
Accused Products
Abstract
Computer-implemented systems and methods are disclosed herein for use in cryptographic operations over a cloud-based service. The cloud-based service securely stores and transmits parts of encryption/decryption keys. Split key processing can include splitting the key in two and storing one of them on a remote secure server.
35 Citations
21 Claims
-
1. A processor-implemented method for use in cryptographic operations, comprising:
-
storing, by one or more data processors, a first portion of a key that is used in a cryptographic operation; receiving a remote request for retrieval of the first portion of the key; performing security analysis upon the request; and transmitting the first portion of the key to the requester after security analysis criteria has been satisfied; wherein a complete key is generated by combining the first portion of the key with a second portion of a key; wherein the complete key is used to perform a cryptographic operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A processor-implemented system for use with cryptographic operations, comprising:
-
a memory; and one or more processors disposed in communication with the memory and configured to issue processing instructions stored in the memory to; store a first portion of a key that is used in a cryptographic operation; receive a remote request for retrieval of the first portion of the key; perform security analysis upon the request; and transmit the first portion of the key to the requester after security analysis criteria has been satisfied; wherein a complete key is generated by combining the first portion of the key with a second portion of a key; wherein the complete key is used to perform a cryptographic operation. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A processor-readable non-transitory medium storing processor-issuable instructions to:
-
store a first portion of a key that is used in a cryptographic operation; receive a remote request for retrieval of the first portion of the key; perform security analysis upon the request; and transmit the first portion of the key to the requester after security analysis criteria has been satisfied; wherein a complete key is generated by combining the first portion of the key with a second portion of a key; wherein the complete key is used to perform a cryptographic operation.
-
Specification