×

Data security

  • US 7,711,965 B2
  • Filed: 10/20/2004
  • Issued: 05/04/2010
  • Est. Priority Date: 10/20/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • requesting, at a host, at least one key from a remote authority located in a remote server over a communication network, the at least one key being generated and authorized by the remote authority;

    performing cryptographic operations on data using the at least one key, the cryptographic operations being performed in response, at least in part, to a request to store the data in storage of the host or to retrieve the data from the storage;

    receiving, from the remote authority, an indication of revoking the at least one key;

    subsequent to receipt of the indication, receiving an additional request to access the data in the storage; and

    in response to the additional request, issuing a message to indicate that the additional request is unauthorizedwherein the encrypting and/or the decrypting is performed, at least in part, by circuitry in the host, the circuitry being geographically remote from and communicatively coupled to the remote authority in the remote server, the circuitry periodically requesting that the remote authority indicate whether the at least one key has been revoked.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×