×

Data security

  • US 9,654,464 B2
  • Filed: 06/22/2015
  • Issued: 05/16/2017
  • Est. Priority Date: 10/20/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • requesting, at a system, at least one encryption key from a remote authority located in a remote server over a communication network, the at least one encryption key being generated and permitted by the remote authority, the system being geographically remote from and communicatively coupled to the remote authority in the remote server;

    performing, at the system, a cryptographic operation on data using the at least one encryption key, the cryptographic operation being performed in response, at least in part, to a request to store the data in storage of the system or to retrieve data from the storage;

    prior to performing the cryptographic operation, determining whether the system is able to communicate with the remote authority;

    if the system is able to communicate with the remote authority, requesting by the system, permission from the remote authority to use the at least one encryption key;

    if the system is unable to communicate with the remote authority, determining by the system not to permit the cryptographic operation;

    periodically requesting, at the system, that the remote authority indicate whether the at least one encryption key has been revoked; and

    upon receipt, from the remote authority, an indication of revoking the at least one encryption key;

    ceasing performing, at the system, the cryptographic operation on data using the at least one encryption key, andupon receiving additional data for the cryptographic operation, issuing a message indicating an error or indicating that the requested operation is unauthorized.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×