×

Data security with a security module

  • US 9,367,697 B1
  • Filed: 02/12/2013
  • Issued: 06/14/2016
  • Est. Priority Date: 02/12/2013
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for key management, comprising:

  • under the control of a computer system configured with executable instructions,storing a plurality of keys in memory of the computer system;

    storing a first set of information in volatile memory without storing the first set of information in non-volatile memory, the first set of information comprising a key used to encrypt the plurality of keys and being sufficient to access the plurality of keys in plaintext form;

    using keys from the plurality of keys to respond to requests to perform cryptographic operations;

    detecting an event, the event triggering a transition of the computer system into an administrative mode in which one or more administrative operations are permissible as a result of being in the administrative mode;

    deleting the first set of information from the computer system by at least removing power to the volatile memory so that the plurality of keys is inaccessible to the computer system in plaintext form while the computer system is in the administrative mode;

    after deleting the first set of information, enabling the administrative mode;

    entering and subsequently leaving the administrative mode;

    after leaving the administrative mode, obtaining a second set of information usable to restore access to the plurality of keys, so that the plurality of keys is accessible to the computer system in plaintext form; and

    using the obtained second set of information to access at least one key from the plurality of keys.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×