×

Key management system

  • US 8,712,044 B2
  • Filed: 03/15/2013
  • Issued: 04/29/2014
  • Est. Priority Date: 06/29/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for cryptographic key management using a network device that is operative to perform actions, comprising:

  • registering at least one administrator that is authorized to create a plurality of keys;

    generating at least one key based on at least one key parameter provided by the at least one administrator;

    generating at least one key manager and at least one key request user, wherein the at least one administrator links the at least one key manager and the at least one key request user to the at least one key;

    activating the at least one key based on data provided by at least two key holders, wherein the provided data includes at least a password provided by each key holder and at least a portion of keying data provided by each key holder, wherein the at least portion of keying data is based on at least one of seeding data, or entropy data;

    storing the at least one key on at least one key exchange server that is separate from the network device; and

    responsive to a request for the at least one key from a key request user, perform further actions including;

    authenticating the key request user that is associated with the request based on at least a portion of the request and at least a portion of a security profile associated with the requested key;

    validating the key request based on the at least one key parameter of at least a portion of the key request; and

    providing the requested key based on the key request to the key request user over the network; and

    responsive to a request to rotate at least one current key, perform further actions, including;

    rotating the at least one key to generate at least one new current key, wherein the at least one rotated key is encrypted and decrypted by the new current key; and

    linking the current key to a plurality of previously rotated keys, wherein each of the plurality of previously rotated keys is encrypted and decrypted by the rotated key that came before it.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×