×

Signing key log management

  • US 9,992,027 B1
  • Filed: 09/14/2015
  • Issued: 06/05/2018
  • Est. Priority Date: 09/14/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system, comprising:

  • at least one processor; and

    memory including instructions that, when executed by the at least one processor, cause the system to;

    receive a first request to generate a cryptographic key, the first request associated with a user and indicating a type of logging to be performed for use of the cryptographic key;

    authenticate an identity of the user;

    generate the cryptographic key, the cryptographic key including private parameters for a cryptographic signing function, information indicating the identity of the user, and metadata specifying a logging value and a mutability value, the logging value specifying the type of logging, the mutability value specifying how the logging value is changeable over a lifecycle of the cryptographic key;

    provide the user with access to the cryptographic key;

    receive a second request to sign data using the cryptographic key;

    determine the logging value of the cryptographic key;

    determine that the type of logging specified by the logging value is able to be enforced by the system;

    sign the data using the cryptographic key;

    perform the type of logging specified by the logging value for signing the data; and

    transmit the signed data to a destination specified by the second request.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×