×

Key creation and rotation for data encryption

  • US 8,879,728 B2
  • Filed: 04/08/2013
  • Issued: 11/04/2014
  • Est. Priority Date: 12/08/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method for cryptographic processing of data using a network device that is operative to perform actions, comprising:

  • responsive to receiving a request to rotate at least one current key, performing further actions, including;

    generating at least one transitional key by encrypting the at least one current key using at least one system key;

    generating at least one new key based on at least one determined key parameter;

    activating the at least one new key based on provided data provided by from at least two key holders, wherein the provided data includes at least a password provided by each of the at least two key holders and at least portion of keying data provided by the at least each two key holders, wherein the at least portion of keying data is encrypted and is based on at least one of seeding data or entropy data, and wherein the at least portion of keying data is decrypted with the password provided by the at least two key holders;

    generating at least one new current key based on the at least one activated key, wherein the at least one new current key is stored at least in volatile memory; and

    encrypting the at least one transitional key using the at least one new current key and storing it in at least one key array;

    receiving at least one encrypted client data from at least one client device;

    decrypting the at least one encrypted client data to form decrypted client data, wherein the decrypted client data includes at least one identifier, wherein the at least one identifier identifies at least one key within the key array;

    retrieving at least one other key from the at least one key array based on at least one key array index;

    determining if the at least one identifier identifies the at least one other key;

    sending at least a portion of the decrypted client data to the at least one client device upon determining that the at least one identifier identifies the at least one other key;

    advancing the at least one key array index to the next available key in the at least one key array upon determining that the at least one identifier is unable to identify the at least one other key.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×