×

Method for managing cryptographic information

  • US 8,213,620 B1
  • Filed: 11/17/2008
  • Issued: 07/03/2012
  • Est. Priority Date: 11/17/2008
  • Status: Active Grant
First Claim
Patent Images

1. A machine implemented method, comprising:

  • executing an agent at a first encryption device and a second encryption device for communicating with a centralized key manager (CKM) for sending and receiving encryption key objects in a same format while using different encryption key types for encrypting information, where the format of the encryption key objects used by the agent and the CKM to communicate includes an encryption key format identifying a format for wrapping encryption key objects by the CKM and a plurality of attributes of the encryption key objects used by the CKM to process the encryption key objects;

    storing configuration information regarding the first encryption device and the second encryption device by the CKM for processing encryption key objects received from the first encryption device and the second encryption device;

    wherein the configuration information includes a key sharing group label based on which the encryption key objects are replicated by the CKM and shared between other entities;

    policies that define encryption key management for the first encryption device and the second encryption device; and

    format information for presenting the encryption key objects to the first encryption device and the second encryption device;

    inserting a key sharing group label by the CKM in an encryption key object received by the CKM from the first encryption device, based on which the received encryption key object is replicated a certain number of times and shared;

    wrapping the encryption key object by the CKM based on the configuration information stored for the first encryption device;

    wherein the wrapped encryption key object includes encrypted key content and an indicator indicating a format of the wrapped encryption key object; and

    storing the wrapped encryption key object by the CKM using a format defined by the configuration information;

    wherein the encryption key object is received from the first encryption device over a secure connection using a first encryption level; and

    the CKM encrypts content of the encryption key object using a second encryption level, the second encryption level being higher than the first encryption level.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×