Systems and methods for managing cryptographic keys
First Claim
Patent Images
1. A method for managing cryptographic keys, the method comprising:
- receiving, from a first interface, a request to manage at least one cryptographic key stored remote from the first interface;
translating the request from a first interface format to a common interface format;
authenticating the request by at least verifying that the request originated from an authorized source;
executing the translated request in the common interface format; and
securing a data set using the at least one key, wherein the securing the data set comprises;
encrypting the data set using the at least one cryptographic key;
generating a random or pseudo-random value;
distributing, based, at least in part, on the random or pseudorandom value, the encrypted data in the data set into two or more shares; and
storing the two or more shares separately on at least one data depository.
4 Assignments
0 Petitions
Accused Products
Abstract
A common interface for managing cryptographic keys is provided. A request to manage a cryptographic key may be received in a first interface format, translated to a common interface format, and then executed remotely from the first interface. Return arguments may then be translated from the common interface format to a format compatible with the first interface and communicated securely to the first interface. The cryptographic keys may be used in connection with a secure data parser that secures data by randomly distributing data within a data set into two or more shares.
207 Citations
14 Claims
-
1. A method for managing cryptographic keys, the method comprising:
-
receiving, from a first interface, a request to manage at least one cryptographic key stored remote from the first interface; translating the request from a first interface format to a common interface format; authenticating the request by at least verifying that the request originated from an authorized source; executing the translated request in the common interface format; and securing a data set using the at least one key, wherein the securing the data set comprises; encrypting the data set using the at least one cryptographic key; generating a random or pseudo-random value; distributing, based, at least in part, on the random or pseudorandom value, the encrypted data in the data set into two or more shares; and storing the two or more shares separately on at least one data depository. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification