Systems and methods for providing secure server key operations
First Claim
1. A method for providing secure server key operations in a system comprising a front-end server that is accessible via a global communications network and a back-end server that is coupled to the front-end server via a local communications network, the method comprising:
- generating a public-private key pair for use in connection with performing a cryptographic operation, wherein the public-private key pair includes a private key;
storing the private key on the back-end server; and
performing the cryptographic operation on the back-end server, using the private key, in response to a request from the front-end server to perform the cryptographic operation,wherein the back-end server includes a database server that contains a database, storing the private key comprises storing the private key in the database, and performing the cryptographic operation comprises performing the cryptographic operation on the database server.
2 Assignments
0 Petitions
Accused Products
Abstract
A key management interface that allows for different key protection schemes to be plugged into a digital rights management system is disclosed. The interface exposes the functionality of signing data, decrypting data encrypted using a public key, and re-encrypting data encrypted using the public key exported by the interface to a different authenticated principal (i.e., a different public key). Thus, a secure interface can be provided such that the data does not enter or leave the interface in the clear. Such an interface exports private key operations of signing and decryption, and provides security and authentication for the digital asset server in licensing and publishing. During publishing, a client can encrypt asset keys such that only a specified entity can decrypt it, using a plug-in, for example, that implements the aforementioned interface. During licensing, the license issuing entity can use the interface to decrypt keys for assets and to sign licenses and rights labels such that the asset is protected and consumable by a host digital rights management platform. The interface thus provides an abstraction for key operations.
42 Citations
29 Claims
-
1. A method for providing secure server key operations in a system comprising a front-end server that is accessible via a global communications network and a back-end server that is coupled to the front-end server via a local communications network, the method comprising:
-
generating a public-private key pair for use in connection with performing a cryptographic operation, wherein the public-private key pair includes a private key; storing the private key on the back-end server; and performing the cryptographic operation on the back-end server, using the private key, in response to a request from the front-end server to perform the cryptographic operation, wherein the back-end server includes a database server that contains a database, storing the private key comprises storing the private key in the database, and performing the cryptographic operation comprises performing the cryptographic operation on the database server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for providing secure server key operations for rights management of digital content, the system comprising:
-
a front-end server that is accessible via a global communications network; and a back-end server that is coupled to the front-end server via a local communications network, wherein a public-private key pair is generated for use in connection with performing a cryptographic operation, the public-private key pair including a private key, the private key is stored on the back-end server and used on the back-end server to perform the cryptographic operation in response to a request from the front-end server to perform the cryptographic operation, the back-end server includes a database server that contains a database in which the private key is stored, and the cryptographic operation is performed on the database server. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for providing secure server key operations in a system comprising a front-end server that is accessible via a global communications network and a back-end server that is coupled to the front-end server via a local communications network, the method comprising:
-
generating a public-private key pair for use in connection with performing a cryptographic operation, wherein the public-private key pair includes a private key; storing the private key on the back-end server; and performing the cryptographic operation on the back-end server, using the private key, in response to a request from the front-end server to perform the cryptographic operation, wherein the back-end server includes a database server that contains a database, storing the private key comprises storing the private key in the database, the back-end server includes a crypto server that is communicatively coupled to the database server and to the front-end server, and performing the cryptographic operation comprises initiating, from the crypto server, a stored procedure that causes the cryptographic operation to be performed on the database server. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A system for providing secure server key operations for rights management of digital content, the system comprising:
-
a front-end server that is accessible via a global communications network; and a back-end server that is coupled to the front-end server via a local communications network, wherein a public-private key pair is generated for use in connection with performing a cryptographic operation, the public-private key pair including a private key, the private key is stored on the back-end server and used on the back-end server to perform the cryptographic operation in response to a request from the front-end server to perform the cryptographic operation, the back-end server includes a database server that contains a database in which the private key is stored, and the back-end server includes a crypto server that is communicatively coupled to the database server and to the front-end server, and wherein the crypto server is adapted to initiate a stored procedure that causes the cryptographic operation to be performed on the database server. - View Dependent Claims (25, 26, 27, 28, 29)
-
Specification