×

Secure key management

  • US 9,306,745 B2
  • Filed: 10/15/2012
  • Issued: 04/05/2016
  • Est. Priority Date: 05/04/2011
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method for secure key creation and management via a secure token, comprising:

  • acquiring, by a secure module comprising a first computer system, a key that was created on a second computer system that is located outside of the secure module;

    acquiring, by the secure module, a section of information associated with the key, the section of information being populated with information relating to how the key was created;

    populating, by the secure module, the section of information with information relating to how the key was acquired by the secure module; and

    binding, by the secure module, the section of information to the key, the key being encrypted when the key is located outside of the secure module;

    the section of information associated with the key comprising a key control information section of a key token, the key token including the key;

    the key control information section and the key being located in the key token when outside the secure module, and the key control information section being not encrypted when outside the secure module;

    the key control information section comprising a key management field; and

    the key management field defining attributes of the key wrapped in the key token, the attributes including;

    what type of key encrypting key can be used to wrap the key, whether the wrapped key is complete or expects more user contributed material, how the key was created, how the key was acquired, and information relating to protection of the key over time.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×