Method and apparatus for managing a key management system
First Claim
Patent Images
1. A computer readable medium comprising computer executable instructions for retrieving a value secured in a key management system, the instructions, when executed, causing a processor to perform method steps of:
- obtaining a decoded key list by decoding an encoded key list, wherein the decoded key list comprises a key corresponding to the value;
receiving a request for the value secured in the key management system from a requesting application, wherein the request comprises the key;
in response to the request for the value, searching for the key in the decoded key list;
determining the key corresponding to the value is in the decoded key list;
obtaining an encrypted tuple, encrypted using a key encryption key associated with a key decryption key, from the key management system using the key, wherein the encrypted tuple comprises the key and the value;
obtaining a tuple corresponding to the value by decrypting the encrypted tuple using the key decryption key;
and providing the tuple corresponding to the value to the requesting application.
2 Assignments
0 Petitions
Accused Products
Abstract
A network system for key management, including a server, a key management system providing process logic for key management system management located on the server, a key management system storage providing a secure data storage for the key management system, an application using the key management system to manage an application key, and an interface providing a means for managing the key management system.
-
Citations
6 Claims
-
1. A computer readable medium comprising computer executable instructions for retrieving a value secured in a key management system, the instructions, when executed, causing a processor to perform method steps of:
-
obtaining a decoded key list by decoding an encoded key list, wherein the decoded key list comprises a key corresponding to the value; receiving a request for the value secured in the key management system from a requesting application, wherein the request comprises the key; in response to the request for the value, searching for the key in the decoded key list; determining the key corresponding to the value is in the decoded key list; obtaining an encrypted tuple, encrypted using a key encryption key associated with a key decryption key, from the key management system using the key, wherein the encrypted tuple comprises the key and the value; obtaining a tuple corresponding to the value by decrypting the encrypted tuple using the key decryption key; and providing the tuple corresponding to the value to the requesting application. - View Dependent Claims (2, 3)
-
-
4. A key management system comprising:
-
a processor; a memory comprising computer executable instructions for retrieving a value secured in the key management system, the instructions, when executed, causing the processor to perform method steps of; obtaining a decoded key list by decoding an encoded key list, wherein the decoded key list comprises a key corresponding to the value; receiving a request for the value secured in the key management system from a requesting application, wherein the request comprises the key; searching for the key in the decoded key list in response to the request for the value; determining the key corresponding to the value is in the decoded key list; obtaining an encrypted tuple, encrypted using a key encryption key associated with a key decryption key, from the key management system using the key, wherein the encrypted tuple comprises the key and the value; obtaining a tuple corresponding to the value by decrypting the encrypted tuple using a key decryption key; and providing the tuple corresponding to the value to the requesting application. - View Dependent Claims (5, 6)
-
Specification