Electronic information and cryptographic key management system
First Claim
1. A method of securing electronic information, comprising the steps of:
- associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing;
enabling a function responsive to said step of confirming; and
securing electronic information.
3 Assignments
0 Petitions
Accused Products
Abstract
A systems and method of electronic information securement. The invention provides for the securement of electrical information and cryptographic keys through cryptographic key management systems (52) providing for the confirmation that one or a plurality of cryptographic keys (58) have been secured to the key management system. Confirmation provided by the key management system enables other systems to perform cryptographic and electronic information functions such as encryption, decryption, saving, and transferring of information. Further systems are provided having at least one client system (54), at least one cryptographic key management system (52), and at least one electronic information storage system (56), whereby the key management system enables functionality of the system after providing securement confirmation of keys and data.
38 Citations
220 Claims
-
1. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing;
enabling a function responsive to said step of confirming; and
securing electronic information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99)
-
-
100. An electronic information securement system, comprising:
-
at least one cryptographic key management system configured to confirm securing of a cryptographic key;
wherein said electronic information securement system is enabled to perform a function in response to a confirmation from said at least one cryptographic key management system and is configured to secure electronic information. - View Dependent Claims (101, 102, 103, 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157, 158, 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 184)
-
-
173. A method of cryptographic key management, comprising the steps of:
-
securing at least one cryptographic key;
confirming said step of securing; and
enabling a function responsive to said step of confirming. - View Dependent Claims (174, 175, 176, 177, 178, 179, 180, 181, 182, 183)
-
-
185. A cryptographic key management system configured to confirm the securing of at least one cryptographic key;
- wherein said cryptographic key management system is configured to enable a function in response to a confirmation of the securing of said at least one cryptographic key.
-
186. A method of cryptography, comprising the steps of:
-
associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing; and
securing said electronic information. - View Dependent Claims (187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197)
-
-
198. A cryptography system, comprising:
-
at least one cryptographic key management system configured to confirm securing at least one cryptographic key;
wherein said cryptography system is enabled to secure electronic information in response to a confirmation from said at least one cryptographic key management system.
-
-
199. An electronic information securement system, comprising:
-
a client system;
a cryptographic key management system communicatively coupled to said client system and configured to confirm securing of at least one cryptographic key; and
an electronic information storage system communicatively coupled to said client system and said cryptographic key management system;
wherein at least one of said client system and said electrical information storage system are responsive to a confirmation from said cryptographic key management system.
-
-
200. A method of securing electronic information, comprising the steps of:
-
securing at least one cryptographic key;
confirming by a cryptographic key management system said step of securing;
providing a response of at least one of said client system and said electronic information storage system responsive to said step of confirming; and
securing electrical information. - View Dependent Claims (201, 202, 203, 204, 205, 206)
-
-
207. An electronic information securement system, comprising:
-
a client system;
a electronic information storage system communicatively coupled to said client system; and
a separate cryptographic key management system communicatively coupled to said client system and said electronic information storage system. - View Dependent Claims (208, 209)
-
-
210. A method of securing electronic information, comprising the steps of:
-
securing at least one cryptographic key;
separately confirming said step of securing; and
securing electronic information responsive to said step of confirming. - View Dependent Claims (211, 212)
-
-
213. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing;
enabling the encryption of electronic information responsive to said step of confirming; and
securing electronic information.
-
-
214. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing;
enabling the decryption of electronic information responsive to said step of confirming; and
securing electronic information.
-
-
215. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing;
enabling the transfer of electronic information responsive to said step of confirming; and
securing electronic information.
-
-
216. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing;
enabling the saving of electronic information responsive to said step of confirming; and
securing electronic information.
-
-
217. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing;
enabling electronic information to be read responsive to said step of confirming; and
securing electronic information.
-
-
218. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing;
enabling electronic information to be rewritten responsive to said step of confirming; and
securing electronic information.
-
-
219. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing;
enabling electronic information to be created responsive to said step of confirming; and
securing electronic information.
-
-
220. A method of securing electronic information, comprising the steps of:
-
associating at least one cryptographic key with electronic information;
securing said at least one cryptographic key;
confirming said step of securing;
enabling electronic information to be manipulated responsive to said step of confirming, and securing electronic information.
-
Specification