×

System and method for managing cryptographic keys

  • US 9,379,890 B1
  • Filed: 12/07/2015
  • Issued: 06/28/2016
  • Est. Priority Date: 12/07/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method implemented on a first computing device, the method comprising:

  • retrieving, from a memory, encrypted data encrypted using a first key;

    retrieving, from the memory, a fourth key;

    transmitting, to a second computing device, a request for an encrypted first key, wherein the encrypted first key is generated by encrypting the first key using a second key;

    receiving, from the second computing device, the encrypted first key;

    transmitting, to an identity and access management device (IAM), a request for an encrypted second key, wherein the encrypted second key is generated by encrypting the second key using a third key;

    receiving, from the IAM, the encrypted second key;

    transmitting, to the second computing device, a request for an encrypted third key, wherein the encrypted third key is generated by encrypting the third key using the fourth key;

    receiving, from the second computing device, the encrypted third key;

    decrypting the encrypted third key using the fourth key;

    decrypting the encrypted second key using the third key;

    decrypting the encrypted first key using the decrypted second key;

    decrypting the encrypted data using the decrypted first key; and

    deleting, from a cache of the first computing device, the decrypted first key after a period of time.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×