×

Data security

  • US 9,135,470 B2
  • Filed: 05/03/2010
  • Issued: 09/15/2015
  • Est. Priority Date: 10/20/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • requesting, at a system, at least one encryption key from a remote authority located in a remote server over a communication network, the at least one encryption key being generated and authorized by the remote authority, the system being geographically remote from and communicatively coupled to the remote authority in the remote server;

    performing, at the system, a cryptographic operation on data using the at least one encryption key, the cryptographic operation being performed in response, at least in part, to a request to store the data in storage of the system or to retrieve data from the storage;

    periodically requesting, at the system, that the remote authority indicate whether the at least one encryption key has been revoked;

    subsequent to receiving, from the remote authority, an indication of revoking the at least one encryption key, not performing, at the system, the cryptographic operation on data using the at least one encryption key;

    prior to performing the cryptographic operation, determining whether the system is able to communicate with the remote authority;

    if the system is able to communicate with the remote authority, requesting by the system, authorization by the remote authority of the at least one encryption key; and

    if the system is unable to communicate with the remote authority, determining by the system whether to permit the cryptographic operation.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×