×

Data security using request-supplied keys

  • US 9,311,500 B2
  • Filed: 09/25/2013
  • Issued: 04/12/2016
  • Est. Priority Date: 09/25/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method, comprising:

  • under the control of one or more computer systems of a service provider, the one or more computer systems configured with executable instructions,receiving, from a requestor corresponding to a customer of the service provider, a request whose fulfillment involves performance of one or more cryptographic operations on data provided with the request and use of a cryptographic key that is encrypted by another key and supplied in the request, the service provider lacking access to the cryptographic key for an amount of time until receipt of the request, wherein the cryptographic key is a public key of a public-private key pair for which the service provider lacks access;

    causing the request to be fulfilled by using the supplied cryptographic key as part of performing the one or more cryptographic operations on the specified data, wherein;

    performing the one or more cryptographic operations includes causing the cryptographic key supplied in the request to be decrypted, thereby resulting in a decrypted supplied cryptographic key, and the one or more cryptographic operations include performance of an asymmetric algorithm using the public key; and

    using the decrypted supplied cryptographic key to perform the one or more cryptographic operations;

    providing a result of performing the one or more cryptographic operations to a data storage system; and

    at a time after performing the one or more cryptographic operations, performing one or more operations that cause the service provider to lose access to the cryptographic key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×