×

Multi-tiered encryption system for efficiently regulating use of encryption keys

  • US 9,172,532 B1
  • Filed: 11/19/2013
  • Issued: 10/27/2015
  • Est. Priority Date: 11/19/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of encrypting data, the method comprising:

  • receiving, from a requesting device, a first request to encrypt data, wherein the first request comprises the data;

    determining whether a first key can be used to encrypt the data;

    requesting, in response to determining that the first key can be used to encrypt the data, an encrypted version of the first key from a first data store associated with a first node, wherein the first node is associated with a first tier of keys;

    receiving the encrypted version of the first key and a parent key identifier from the data store, wherein the parent key identifier identifies a parent key stored in a second data store associated with a second node configured to decrypt the encrypted version of the first key, and wherein the second node is associated with a second tier of keys;

    transmitting, to the second node, a second request to decrypt the encrypted version of the first key, wherein the second request comprises the encrypted version of the first key and the parent key identifier;

    receiving, from the second node, a decrypted version of the first key, wherein the second node generates the decrypted version of the first key using the parent key after the parent key is retrieved from the second data store;

    encrypting the data using the decrypted version of the first key;

    generating a key identifier associated with the first key; and

    transmitting, to the requesting device, the encrypted data and the key identifier.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×