Data security
First Claim
1. A method comprising:
- requesting, at a system, at least one encryption key from a remote authority located in a remote server over a communication network, the at least one encryption key being generated and authorized by the remote authority, the system being geographically remote from and communicatively coupled to the remote authority in the remote server;
performing, at the system, a cryptographic operation on data using the at least one encryption key, the cryptographic operation being performed in response, at least in part, to a request to store the data in storage of the system or to retrieve data from the storage;
periodically requesting, at the system, that the remote authority indicate whether the at least one encryption key has been revoked;
subsequent to receiving, from the remote authority, an indication of revoking the at least one encryption key, not performing, at the system, the cryptographic operation on data using the at least one encryption key;
prior to performing the cryptographic operation, determining whether the system is able to communicate with the remote authority;
if the system is able to communicate with the remote authority, requesting by the system, authorization by the remote authority of the at least one encryption key; and
if the system is unable to communicate with the remote authority, determining by the system whether to permit the cryptographic operation.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a method is provided that may include one or more operations. One of these operations may include, in response, at least in part, to a request to store input data in storage, encrypting, based least in part upon one or more keys, the input data to generate output data to store in the storage. The one or more keys may be authorized by a remote authority. Alternatively or additionally, another of these operations may include, in response, at least in part, to a request to retrieve the input data from the storage, decrypting, based at least in part upon the at least one key, the output data. Many modifications, variations, and alternatives are possible without departing from this embodiment.
43 Citations
17 Claims
-
1. A method comprising:
-
requesting, at a system, at least one encryption key from a remote authority located in a remote server over a communication network, the at least one encryption key being generated and authorized by the remote authority, the system being geographically remote from and communicatively coupled to the remote authority in the remote server; performing, at the system, a cryptographic operation on data using the at least one encryption key, the cryptographic operation being performed in response, at least in part, to a request to store the data in storage of the system or to retrieve data from the storage; periodically requesting, at the system, that the remote authority indicate whether the at least one encryption key has been revoked; subsequent to receiving, from the remote authority, an indication of revoking the at least one encryption key, not performing, at the system, the cryptographic operation on data using the at least one encryption key; prior to performing the cryptographic operation, determining whether the system is able to communicate with the remote authority; if the system is able to communicate with the remote authority, requesting by the system, authorization by the remote authority of the at least one encryption key; and if the system is unable to communicate with the remote authority, determining by the system whether to permit the cryptographic operation. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus comprising:
- a first circuitry to request at least one encryption key from a remote authority located in a remote server over a communication network, the at least one encryption key being generated and authorized by the remote authority, the first circuitry being geographically remote from and communicatively coupled to the remote authority in the remote server;
a second circuitry to perform a cryptographic operation on data using the at least one encryption key, the cryptographic operation being performed in response, at least in part, to a request to store the data in local storage or to retrieve data from the local storage; a third circuitry to periodically request that the remote authority indicate whether the at least one encryption key has been revoked; and subsequent to receiving, from the remote authority, an indication of revoking the at least one encryption key, not performing by the second circuitry, at the system, the cryptographic operation on data using the at least one encryption key; prior to performing the cryptographic operation, determining whether the system is able to communicate with the remote authority; if the system is able to communicate with the remote authority, requesting by the system, authorization by the remote authority of the at least one encryption key; and if the system is unable to communicate with the remote authority, determining by the system whether to permit the cryptographic operation. - View Dependent Claims (7, 8, 9, 10, 11)
- a first circuitry to request at least one encryption key from a remote authority located in a remote server over a communication network, the at least one encryption key being generated and authorized by the remote authority, the first circuitry being geographically remote from and communicatively coupled to the remote authority in the remote server;
-
12. A system comprising:
- a disk storage device;
a first circuitry to request at least one encryption key from a remote authority located in a remote server over a communication network, the at least one key being generated and authorized by the remote authority, the first circuitry being geographically remote from and communicatively coupled to the remote authority in the remote server;a second circuitry to perform a cryptographic operation on data using the at least one encryption key, the cryptographic operation being performed in response, at least in part, to a request to store the data in the disk storage device or to retrieve data from the disk storage device; a third circuitry to periodically request that the remote authority indicate whether the at least one encryption key has been revoked; and subsequent to receiving, from the remote authority, an indication of revoking the at least one encryption key, not performing by the second circuitry, at the system, the cryptographic operation on data using the at least one encryption key; prior to performing the cryptographic operation, determining whether the system is able to communicate with the remote authority; if the system is able to communicate with the remote authority, requesting by the system, authorization by the remote authority of the at least one encryption key; and if the system is unable to communicate with the remote authority, determining by the system whether to permit the cryptographic operation. - View Dependent Claims (13, 14, 15, 16, 17)
- a disk storage device;
Specification