×

Encryption key management

  • US 8,539,231 B1
  • Filed: 08/14/2012
  • Issued: 09/17/2013
  • Est. Priority Date: 02/17/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method of performing secure operations, comprising:

  • receiving, at a computing device, a request to perform a secure operation, the request identifying a secure identifier; and

    selecting, based at least in part on the secure identifier and whether the request includes a version number, a secure object to be used in performing the secure operation, the secure object being identified by the secure identifier, being configured to be associated with a particular version number, and being selected such that;

    as a result of the request including the particular version number, selecting the secure object is further based at least in part on the particular version number; and

    as a result of the request not including any version number, selecting the secure object includes selecting a default secure object based at least in part on the secure identifier identifying the secure object.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×