Supporting a fixed transaction rate with a variably-backed logical cryptographic key
First Claim
Patent Images
1. A computer-implemented method, comprising:
- receiving a request to perform a cryptographic operation, the request identifying a plurality of keys where a usage rate of an individual key in the plurality of keys is limited at an associated individual usage rate;
selecting a key from the plurality of keys according to a distribution scheme that distributes requests over the plurality of keys, the distribution scheme allowing the plurality of keys to be used at an aggregate rate greater than each associated individual usage rate limit; and
performing the cryptographic operation on one or more hardware processors using the key.
1 Assignment
0 Petitions
Accused Products
Abstract
A request a request to perform a cryptographic operation is received, the request including a first identifier assigned to a key group, the key group comprising a plurality of second identifiers, with the plurality of second identifiers corresponding to a plurality of cryptographic keys. A second identifier is determined, according to a distribution scheme, from the plurality of second identifiers, and the cryptographic operation is performed using a cryptographic key of the plurality of cryptographic keys that corresponds to the second identifier that was determined.
179 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving a request to perform a cryptographic operation, the request identifying a plurality of keys where a usage rate of an individual key in the plurality of keys is limited at an associated individual usage rate; selecting a key from the plurality of keys according to a distribution scheme that distributes requests over the plurality of keys, the distribution scheme allowing the plurality of keys to be used at an aggregate rate greater than each associated individual usage rate limit; and performing the cryptographic operation on one or more hardware processors using the key. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system, comprising:
-
one or more processors; and memory including instructions that, as a result of execution by the one or more processors, cause the system to; receive a request to perform a cryptographic operation, the request identifying a plurality of cryptographic keys where a usage rate of an individual key in the plurality of cryptographic keys is limited at an associated individual usage rate; select a key from the plurality of cryptographic keys according to a distribution scheme that distributes requests over the plurality of cryptographic keys, the distribution scheme allowing the plurality of cryptographic keys to be used at an aggregate rate greater than each associated individual usage rate; and perform the cryptographic operation using the key. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by one or more processors of a computer system, cause the computer system to at least:
-
receive a request to perform a cryptographic operation, the request identifying a plurality of cryptographic keys where a usage rate of an individual key in the plurality of cryptographic keys is limited at an associated individual usage rate; select a key from the plurality of cryptographic keys according to a distribution scheme that distributes requests over the plurality of cryptographic keys, the distribution scheme allowing the plurality of cryptographic keys to be used at an aggregate rate greater than each associated individual usage rate; and perform the cryptographic operation using the key. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification